What kind of viruses are these!? What software can I use to remove it!?

Updated on technology 2024-06-05
10 answers
  1. Anonymous users2024-02-11

    Consider that your virus remains in a temporary folder.

    It is recommended to deal with it as follows.

    Pay attention to emptying the temporary folder.

    Hello, don't worry;

    Since the antivirus software can find out, it will definitely be able to kill, if it can't be killed, it is because the virus is running; Running programs cannot be modified or deleted.

    Then it is recommended that you deal with it as follows.

    Reboot, press and hold F8, enter safe mode, and then launch the antivirus software from safe mode to easily kill virus.

    Also, be sure to clean up your temporary folders.

    How do I clean up a temporary folder?

    It is also possible to use Super Bunny to clean up system junk. More convenient.

    This is because there are a lot of virus main programs hidden in the temporary folder, and you can't completely delete them when you kill the virus.

    2007-1-18 Super Bunny.

    It is recommended that you use the latest version of the mainstream antivirus software in safe mode.

    There is today's latest Rising Star.

  2. Anonymous users2024-02-10

    These are not virus names, but the names of files that are infected with viruses.

  3. Anonymous users2024-02-09

    When a computer virus is found, the most thorough way to remove it is to "format the disk". Formatting the disk will erase all files on the disk, including hidden files.

  4. Anonymous users2024-02-08

    The iPhone is jailbroken, the smartphone gets rooted and the software is removed.

  5. Anonymous users2024-02-07

    Mobile phone poisoning may lead to risks such as theft of online banking accounts, account leakage, privacy theft, etc., if you suspect mobile phone poisoning, please follow the steps below:

    To install security software (e.g., Phone Manager), take Phone Manager as an example, open Phone Manager, and click the One-Click Kill button to perform a complete scan of the phone.

    For system-level software, please obtain root privileges and perform a deep clean. You can click "Function Customization" at the bottom of the main interface of Phone Manager to add a one-click root module to root your phone.

    If the user can't handle it on their own, try sending the phone to the phone after-sales service for system maintenance.

  6. Anonymous users2024-02-06

    Then root first. Then use your mobile phone to clean it up.

  7. Anonymous users2024-02-05

    First of all, it is recommended that you get root permission for your mobile phone, which can achieve the purpose of retaining software functions and blocking malicious behaviors. It also ensures that the phone is completely unloaded with malware.

    3. Deal with malware. If you want to see which software has malicious behavior, you can go to the details page and then you can handle it. Such as:

    Click [Get Contact] to view which software is currently using your contact information, then select "Forbidden" to block its malicious behavior at one time, and the software can also be used normally; If you don't want to keep the software, you can also go to the "Software Management" of the system or the housekeeper to delete it

    Similarly, you can also view the corresponding software that is using this permission according to the categories of [Call Log], [Mobile Phone Location], [SMS], etc., and deal with it:

    In addition, you can also directly click the trust button behind the software to add the software as a trust, then the housekeeper will not monitor all the operations of the software:

    Finally, in the upper right corner of Permissions Management, click the pinion to turn on the main switch to turn off Permissions Management and view the monitoring logs

  8. Anonymous users2024-02-04

    Formatted quilt, and if it doesn't work, you will spend money to flash the machine.

  9. Anonymous users2024-02-03

    If you want to delete the phone, you have to root

  10. Anonymous users2024-02-02

    Obtain root privileges first, and then uninstall them.

Related questions
5 answers2024-06-05

Radio010: Jay Sean's Ride Itradio012: Jack White's Love Interruption >>>More

9 answers2024-06-05

Xinlei (Qing) Zhang Weiping.

Creation is silent but affectionate, and every time it is cold, it is born in spring. >>>More

25 answers2024-06-05

AMD Athlon64 x2 4200+ AM2 (Box) This is the CPU (processor) that runs at a speed where it lies. >>>More

11 answers2024-06-05

is prepared to see your subsequent performance, and then decide whether you are suitable or not, so she leaves a lot of room for speech, on the one hand, she does not let you break your thoughts, and on the other hand, she does not give you a definite promise. There may be two kinds: one is to see if you can really be nice to her, or if it's worth choosing from a bunch of boys; The other is that she doesn't know you yet, doesn't know if she's a good fit for you, or isn't sure how she feels about you right now. >>>More

16 answers2024-06-05

Trojan with ewido, (this is currently the most effective and powerful anti-trojan tool, the nemesis of horse players,) >>>More