Using Antiy Ghostbusters to Stop Trojan Intrusion System

  
When we are playing online games, the screen is suddenly horrible due to the invasion of computer viruses or Trojans, which not only affects the mood of playing games, but also gives computers and networks. The system caused serious damage. To this end, the system home deliberately invited a "caught ghost team" for your computer!

Software name: AntiyGhostbusters

Software Version: 3.12 Simplified Chinese version

Software Size: 6149KB ​​

a software Features

AntiyGhostbusters is a professional-grade Trojan horse detection tool, which is called "Ghost Hunting Team" by netizens. The software scans drives, memory processes and directories to accurately detect and completely eliminate programs that pose security threats to user systems, such as Trojan, Backdoor, Worm, Keylog, etc. . Not only can the known Trojans be removed, but some unknown Trojans can also be found, and the modification of the IE settings by malicious web pages can also be restored.

Second, Trojan monitoring software will appear

two shortcut icon on the desktop after installation is a software management program, and the other is a monitor program. Run monitor mode, a monitor flag appears in the system tray, click to select three of them, it monitors the file operations of the system and process.

fact, this monitor is not a firewall, it does not support ICMP /IGMP protocol, but he is more than Youyuezhichu firewall, the firewall can only be managed for IP and port, but not for specific programs Perform network control. Whether it is the earliest backdoor.bo and other backdoors that use open listening ports to wait for connections, or today's popular package rebounding Trojans will be captured by the software's monitor. In addition, we can find the source of the virus in the "process port association" and "network connection status" of the "Tools" of the software management interface, and further prevent it in time, as shown in the figure.

Third, Trojan scan function

into the "Monitor Settings" Settings panel, where the "scan", "Tools" and "Configuration" three columns. The "scan" feature is used to detect and destroy Trojans, which is the most important feature of AntiyGhostbusters, which can detect and remove known and unknown malicious programs. Double-click "Detect in-memory processes", which will detect all memory processes and all threads of each process, it will find active Trojans in memory. The Scan Sensitive Zone will detect the location of malicious programs that are often parasitic, while the Scan Folder will pop up a dialog box for the user to select the disk or directory object to be detected.

four, the network filtering

"monitor set" and "Configuration", there are "Options" and "Application Network Management Rules" two features, "Software "Settings" are used to set the scanning mode of the Trojan and the operation after scanning. These settings are very simple. In "Application Network Rule Management" is actually used to set the network filtering rules, AntiyGhostbusters and Jinshan network darts. For some virus-like programs, as long as they are executed on the computer, the software will pop up a warning window indicating that the running program is in a suspicious state, whether you are denied access or accept execution, and each of your execution actions is logged to the network. In the rules, the software will automatically execute the program according to your first action. Here, you can also freely add, edit, and delete restricted programs. This greatly enhances security and management.

Copyright © Windows knowledge All Rights Reserved