The undercover software in the system has a trick

  

A lot of friends especially like to watch spy war films. The undercovers of both sides of the enemy and the enemy are fighting for intelligence in each other's camps. These undercovers are generally hidden. Similarly, there are a lot of "undercover" in our system, but these "undercover" sources are not the same, they are caused by our misuse, and some are software generated, There may be a back door for hackers. No matter what the situation is, "undercover" has brought great hidden dangers to our system, then we need to use tricks to find out these hidden under the system "undercover"!!

Outsole software tips in the system:

1. Clean up the machine as much as possible before using a commercial or free software tool. Run an anti-virus or anti-spyware scan and immediately remove some unusual items. There is a lot of content on this topic on the web. It should be noted that before entering the next step, Xinle Network strongly recommends using and running more than one anti-virus and anti-spyware scan in order to achieve thorough cleaning.

2. Create a checkpoint or make a backup of the system. If you're using Windows XP, it's so convenient, so you can quickly create a system recovery point (click Open: Start Menu -> Help and Support -> Use System Restore to restore changes to the system, then click Create a button to restore points). Of course, there are other ways (the only way for those who use other Windows operating systems) is to create a complete system backup, including system status information (if other methods are not feasible, you can use NTBackup.exe File; he contains information for all new versions of Windows). In this case, if something goes wrong in the next step, you can restore the system to the previous correct state.

3. Close all unnecessary applications. Some anti-spyware software looks for signs of abnormality from all threads and the registry running on the computer, so it can save a lot of time by exiting all applications and then launching the anti-spyware run check.

4. Run the anti-spyware program. In this step, use Hijack This software. Extract the downloaded Zip file to the directory you want, then double-click the HijackThis.exe executable file, and a window with the prompt “Do a system scan and save a logfile.” will pop up. By default, the log file will be saved in “My Documents", it is useful to include date and time information in the saved log file name, so that a file named hijackthis.log is renamed hijackthis-yymmdd :hh.mm.log (hh.mm is a few points of the 24-hour system). In this case, run Hijack This again at any time in the future (once you start running, it will automatically clear the previous log), you don't have to worry about losing the previous log. Therefore, time stamping is a good method, which is very useful for future log file analysis.

5. View the scan results displayed in the Hijack This results window. This result is the same as the information written to the log file, and you will find a checkbox to the left of each item. If you have selected certain items, press the “Fix Checked“ button and Hijack This will completely remove them. You'll find a lot of files that look secret, and you can quickly scan them to decide what to do at this point. In fact, the real problem is to identify which files have potential threats, which ones are necessary, and which ones are irrelevant. At this point, the analysis tool can help us a lot. Remember, don't close Hijack This's search results window now, and you don't need to check it, because it will be returned in the next steps.

Copyright © Windows knowledge All Rights Reserved