How to remove the hidden danger hidden in the computer


The general hacker will not invade the ordinary person's computer because it is of little value, but if you have valuable information in your computer, then it may become the target of the hacker, and in the computer Some hidden dangers may be the key to being invaded at that time. When you use your computer, you may encounter a situation where the computer suddenly crashes and sometimes restarts automatically. There are fewer files on the endless end. It is found that the desktop is slow to refresh, there is no big program running, and the hard disk is desperately reading and writing. The system also inexplicably searches the floppy drive, anti-virus software and firewall alarms, and finds that the system is getting slower and slower. You should be careful at this time.

The first time reaction (to develop a good habit to the bowl can reduce the loss): Use CTRL + ALT + DEL to call up the task table to see what programs are running, such as the discovery of strange programs It is necessary to pay more attention. Generally speaking, any program on the task manager will not have a negative impact on the basic operation of the system (note: here is the basic operation, first explain to everyone, about this article I am On the network about the results of this study), so you can close some suspicious programs to see if some abnormal conditions have returned to normal, then you can initially determine that it is a Trojan, and found that there are multiple names with the same name. The program is running, and it may increase with time. This is also a suspicious phenomenon. Pay special attention to it. If you find these phenomena after connecting to the Internet or LAN, don't doubt, do it. Let's take a look!, (Note: There may be other viruses at work)

1 Upgrade the anti-virus software to the latest, and perform a comprehensive inspection scan of the system.

2 Click Tools → Folder Options → View Hide hidden protected operating system files (recommended) and hide extensions of known file types. The two preceding hooks are removed for easy viewing.

3 Look at the first few lines in the WIN.INI file in the Windows directory: [WINDOWS] load= ren= Here is the program to start Windows automatically, you can look at the comparison.

4 Look at the lines in the SYSTEM.INI file in the Windows directory: [386Enh] device= This is where the system itself and the added drivers are placed. The added driver generally uses the full path, such as: device=c:windowssystem32tianyangdemeng.exe (here is just an analogy)

5 View "Program" → "Start" in the start menu. Here is also the program to start Windows automatically, if it is, it is placed in C: WindowsStart MenuPrograms, save it in a safe place and then delete, you need to restore it when you need to recover.

6 Enter ""MSCONFIG" in "Start" → "Run" to see if there are suspicious startup items. You may ask, isn't that said before? In fact, the two methods are different. If you look at these two methods separately, you will find a difference. As for the deeper point, I don’t know what to say. Oh, don't laugh, I hope the experts come out to answer it!

7 Check the registry and type ""REGEDIT" in "Start" & "rar".

Make a backup of the registry before you can view it. (Be sure to develop a habit. When you modify the wood file, you need to make a backup first if you are not sure about it.)

Copyright © Windows knowledge All Rights Reserved