In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
This article introduces the relevant knowledge of "what Trojan virus looks like in computer". In the operation process of actual cases, many people will encounter such difficulties. Next, let Xiaobian lead you to learn how to deal with these situations! I hope you can read carefully and learn something!
The symptoms of Trojan virus in the computer are: 1. Files or folders disappear for no reason;2. There is no response to running applications;3. The computer startup item contains suspicious startup items;4. The computer runs extremely slowly;5. Antivirus software fails;6. The computer runs abnormally;7. The system language is changed to other languages;8. The blue screen is black;9. The homepage is tampered with, etc.
Operating environment: Windows 7 system, Dell G3 computer.
Symptoms of Trojan viruses in computers
(i) Files or folders disappear without cause:
When you find that some files or folders in your computer disappear for no reason, you can determine that your computer has been infected with a virus. Some computer viruses hide files or folders, then forge hidden files or folders and generate executable files. When users click on such disguised files with virus programs, they will directly cause the virus to run, thus causing the disclosure of user information.
(ii) No response to running the application:
Some computer viruses use image hijacking technology to change the running path of commonly used applications to the virus running directory, so that when we try to run normal programs, we actually run virus programs, causing computer viruses to start.
(iii) Computer startup items contain suspicious startup items:
Check the "System Configuration Implementation Program" window and if you find an unknown executable directory, you can determine that your computer has been infected with a virus. Of course, more often virus programs use modified registry entries to add self-starting entries.
(iv) Extremely slow computer operation:
When a computer becomes noticeably slower, it may be caused by a virus in the computer. Viruses in computers, through virus programs will continue to run in the background, and the vast majority of viruses will occupy too much CPU and memory, and Trojan viruses will mostly spread user privacy information through the network.
(v) Failure of antivirus software:
Antivirus software is used to protect the system, so when the anti-virus software can not run normally for anti-virus operation, you can be sure that the computer has been infected with viruses, at this time we need to use the network to implement online anti-virus operation. Most of the security protection software such as 360, Jinshan guards, QQ housekeeper these three more mainstream domestic security protection software have independent defense module, and virus or Trojan first attack is the security protection software independent defense module. If you find that the active defense module is turned off or the security protection software directly fails to start or has a memory error, it is likely that the security protection software cannot withstand this powerful virus and is paralyzed.
(vi) Abnormal computer operation:
Viruses can take up too much system performance, cause file damage, and even seriously affect the stability of the system. When the computer appears blue screen for no reason, abnormal running programs, too slow running speed and a large number of suspicious background running programs, it is necessary to pay attention to the possibility that the computer has been infected.
(vii) Change of system language to other languages
The default language of your computer system is simplified Chinese. If you find that the language of the rapid Aji system has been modified to other languages after booting, it is very likely that you have been infected with malicious viruses. You can try the security protection software to scan and remove viruses.
(VIII) Blue screen and black screen
Black screen is rare, blue screen is more common. In the inexplicable malicious virus may be running a game or a certain software suddenly computer blue screen, blue screen code may be a common code, may be said that the computer in order to protect the system automatically forced restart.
(9) Homepage tampering, forced refresh or jump to web pages, frequent pop-up advertisements
Homepage tampering is the main target of early viruses. After computer operating system poisoning, browser homepage tampering generally occurs, so IE companion, a small software to repair homepage tampering, was very popular. If it is accompanied by repeated loading/refreshing of browser pages or pop-up advertisements for no reason, it is likely to be poisoned.
(x) Application icons are tampered with or blank
The shortcut icon of the program on the computer desktop or the icon of the main exe file of the program directory is tampered with or blank, then it is very likely that the exe program of this software is infected by virus or Trojan horse. Worms make such infection modifications
A simple way to deal with viruses in computers
1. Users who are surfing the Internet should disconnect immediately if they find any abnormality.
If you notice IE asking you frequently whether to run certain ACTIVEX controls, or generate odd files, debug scripts, etc., be wary, you may have been fooled. There are two typical cases of Internet intrusion:
1, is to browse some pages with malicious code was modified browser default home page or title, this is light; there is a hard disk can be formatted or make your windows keep opening windows, until exhausted resources crash?? The situation is much worse, and both your unsaved and your data already on the hard drive may suffer partial or total loss.
2, is the hacker's potential Trojan attack, or worm virus attack, let your machine constantly send your privacy to the outside world, or use your name and email address to send garbage, further spread the virus; there is also the hacker's manual invasion, spy on your privacy or delete your files.
Solution: Disconnect immediately, so that you can reduce your losses and avoid the virus spreading to more online computers.
II. After poisoning, backup transfer documents and emails should be immediately taken.
Running antivirus software to clean up after poisoning is no problem, but in order to prevent antivirus software from killing or deleting documents and important emails you have not finished processing, you should first transfer them to other storage media. Some files with long file names and unprocessed emails require backup under windows, so the first point here is that I suggest you not quit windows first, because once the virus attacks, you may not be able to enter windows.
Whether these files are poisoned or not, you should make copies and label them as pending. Because some viruses are designed specifically for a certain antivirus software, a run will destroy other files, so backup is just in case. It is better to analyze and process these extra backup files slowly after you have cleaned the virus on your hard disk.
Third, you need to run the software that kills CIH under windows first (even if it is a poisonous environment)
If CIH virus is found, pay attention not to completely follow the measures recommended in newspapers and manuals at ordinary times, shut down first, use the system disk to guide and then disinfect, and run the software that specifically kills CIH in a poisonous environment. In doing so, the antivirus software may report that some files cannot be cleaned up under read and write protection, but the actual purpose of running with virus is not to completely remove the virus, but to minimize the damage of CIH when it is next booted, in case it is booted again to destroy the BIOS hardware of the motherboard, then it will be black, so that your next antivirus cannot be carried out.
Fourth, you need a clean DOS boot disk and DOS below for antivirus
By now, it should be done step by step according to the standard manual of many anti-virus software, that is, cold start after shutdown, boot with a clean DOS boot disk is not less; in addition, due to poisoning, windows may have been destroyed. Some key files will be operated illegally frequently, so the anti-virus software under windows may not be able to run. So please prepare a DOS antivirus software below just in case.
Even if you can run antivirus software under windows, please use more than two tools to cross-clean. In most cases windows will probably have to be reinstalled because viruses can destroy parts of the file system slowing down or causing frequent illegal operations. Microsoft's Outlook email program, for example, is slow to respond even after CIH is killed. It is recommended not to have prejudice against certain anti-virus software. Due to different emphases and different anti-virus engines used during development, various anti-virus software have their own strengths and weaknesses, and the cross-use effect is ideal.
5. If there is a backup of Ghost and partition table and boot area, it is the safest way to restore it once.
If you make a Ghost backup of Windows on a regular basis, use it to mirror it once, and the OS you get is the safest. This way even the potential not to kill the Trojan also cleaned up by the way, of course, this requires your GHOST backup is absolutely reliable, ha ha, if the time for Ghost trojan also "backup" on…
6. After restoring the system again, change your network-related password
Including login network user name, password, mailbox password and QQ, etc., to prevent hackers from knowing your password in the last invasion process. Also, because many worm outbreaks randomly send out your messages, appropriate changes are necessary.
"What is the appearance of Trojan virus in the computer" is introduced here, thank you for reading. If you want to know more about industry-related knowledge, you can pay attention to the website. Xiaobian will output more high-quality practical articles for everyone!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.