Be wary of the Trojan virus in the registry!

  

Although anti-virus software is already powerful enough, it still seems to be unable to withstand the intrusion of viruses and Trojans, especially the registry, where hackers or viruses can enter the system to damage our property, so be alert to the registry. Viruses and Trojans, but how to check and kill?

How is a good anti-virus software and security software made?

According to the behavior of rogue software and virus Trojans Analysis, to prevent possible exploitation of vulnerabilities or hidden places.

How is a malware Trojan that is "toxic" developed?

It was developed based on the negligence or availability of Windows systems or security software. For the veteran of the computer, everyone is recommended to use Windows7, Vista instead of continuing to use XP, why Microsoft has repeatedly recommended users to upgrade to the latest browser, because Microsoft gradually fills in and prevents these negligence in the new version of the software.

The following soft media editor and everyone is talking about the anti-virus software security software and malware are fighting each other, in the Windows registry, there are 7 dens of malware to love, more than The three caves of Rex Rabbit ——

The popularity of computers today can be said to be universal in the whole society, but the computer virus problem that has followed has become a social problem, despite antivirus The software is updated every day, and the virus grandfathers who scan against anti-virus software and detection tools are constantly updated, and some of them even turn off anti-virus software and detection tools. I have encountered a firewall being shut down and a WOW account stolen. Despite the popularity of computers, the vast majority of users know very little about software reading and writing, and it is difficult to tell where they are hiding. In this case, anti-virus software and security tools cannot run. At this time, if you want to delete the virus, you must know where it is hidden and what is the virus. Here is a list of detection locations for some common anti-killing viruses.

1. The famous AV Terminator variant program starts the dual process and shuts down the anti-virus program at boot time. In general, if the firewall is shut down, it may be that it is coming. Check if HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run has its trace. This is a regular startup item, and many programs will be written here.

2, if the anti-virus software is difficult to clean up, or the anti-virus program is closed, it may be linked. At this time, HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\ShellExecuteHooks should be detected. A large amount of malware and viruses will be written here. Because very few normal programs are written here, the chances of viruses are very high.

3, sometimes, the security mode is also loaded, the anti-virus program is closed. This may be a new variant of the robot dog or a variant of the disk drive. Focus on HKLM\\SOFTWARE\\Microsoft\\WindowsNT\\CurrentVersion\\Windows\\Appinit_Dlls. Few normal programs write to this location, and the chances of viruses are extremely high.

4, gray pigeon is a very famous virus, and now think about its variants, and difficult to find and clean up, you can close the anti-virus program. Because the virus is written to the underlying service and the rootkits driver, it is difficult to clean up. Users can focus on checking HKLM\\System\\CurrentControlSet\\Services.

Copyright © Windows knowledge All Rights Reserved