Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to deal with computer poisoning

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)05/31 Report--

This article mainly explains "how to deal with computer poisoning". Interested friends might as well take a look. The method introduced in this paper is simple, fast and practical. Let's let the editor take you to learn how to deal with computer poisoning.

First, users who are surfing the Internet should disconnect immediately if they find something unusual.

If you find that IE often asks you if you are running certain ACTIVEX controls, or generates inexplicable files or asks about debugging scripts, be careful, you may have been hit. There are two typical situations in which the Internet is hacked:

1. When browsing some web pages with malicious code, the default home page or title of the browser is modified, which is light; and it is encountered that you can format the hard disk or make your windows keep opening windows until you run out of resources. This situation is much worse, and you may lose some or all of the data you have not saved and what you have already put on your hard drive.

2. Potential Trojan horse attacks, or worm-like attacks, make your machine constantly send your privacy to the outside world, or use your name and e-mail address to send spam to further spread the virus; there is manual intrusion, snooping on your privacy or deleting files that destroy you.

Solution: disconnect immediately, so that you can reduce your losses and prevent the virus from spreading to more online computers. Please do not restart the system or shut down immediately. For further measures, please refer to the following section.

After poisoning, backup and transfer documents and e-mails should be backed up immediately.

It's okay to run antivirus software to clear after poisoning, but in order to prevent antivirus software from killing or deleting documents and important emails that you have processed, you should first transfer them to other storage media. Some files with long filenames and unprocessed emails are required to be backed up under windows, so the author suggests that you do not exit windows yet, because once the virus breaks out, you may not be able to enter windows.

Whether these files are poisoned or not, you should back them up and mark them with label paper for inspection. Because some viruses are specifically designed for a certain antivirus software, as soon as they run, they will destroy other files, so backing up first is a precaution. After you have cleared the virus from your hard drive, it is better to analyze and deal with these extra backup files slowly.

Third, you need to run the software that kills CIH under windows (even in a poisonous environment)

If the CIH virus is found, it should be noted that it is not possible to completely follow the measures recommended by newspapers and manuals, turn off the computer first, use the system disk to guide and then kill the virus, and then run the software that kills CIH in a virus-carrying environment. In doing so, antivirus software may report that some files cannot be cleaned under read and write protection, but the actual purpose of running with virus is not to completely remove the virus, but to minimize the damage caused by CIH the next time it boots up, in case it starts again to damage the BIOS hardware of the motherboard, then the screen will be blackened, making your next step of antivirus impossible.

Need a clean DOS boot disk and antivirus software under DOS

By now, it should be done step by step according to the standard manual of many antivirus software, that is, cold start after shutdown, it is indispensable to boot with a clean DOS boot disk; in addition, because windows may have been destroyed some key files after poisoning, it will frequently operate illegally, so the antivirus software under windows may not be able to run. So please also prepare an antivirus software under DOS just in case.

Even if you can run antivirus software under windows, please use two or more tools to cross-clean. In most cases, windows may have to be reinstalled because the virus destroys some files and slows down the system or frequent illegal operations. For example, Microsoft's OUTLOOK email program is slow to respond even if it kills CIH. It is recommended not to be biased against certain antivirus software. due to different emphasis in development and different antivirus engines used, all kinds of antivirus software have their own advantages and disadvantages, and the effect of cross-use is ideal.

Fifth, if there is a backup of GHOST, partition table and boot area, it is the safest to restore it.

If you make a GHOST backup of windows and use it to mirror it once, the operating system you get is the safest. In this way, even the potential unkilled Trojans have been cleaned up by the way, of course, this requires that your GHOST backup is absolutely reliable, hehe, if you also "back up" the Trojan horse when making GHOST.

Change your network-related password after restoring the system again

Including the login network user name, password, mailbox password and QQ, and so on, in case your password has been known during the last intrusion. In addition, because many worm attacks send your messages out at random, appropriate changes are necessary.

At this point, I believe you have a deeper understanding of "how to deal with computer poisoning". You might as well do it in practice. Here is the website, more related content can enter the relevant channels to inquire, follow us, continue to learn!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report