Teach you to find the hidden black hand hidden in the computer (2)

  

10 Teach you to find hidden invaders in the computer

11 Right click on "My Computer" → Event Viewer to view the security log, see See if there is any suspicious content inside.

12 Enter NET USER under CMD to see if there are any suspicious users. If you have a user who has not set up, delete it with NET USER ABCD /DEL (the ABCD here is the username, just change it) As a user who wants to delete, you can go to the next check for user clones and other tools that can help you. Some users who have established hackers can't see them in general. You should pay attention.) Br>

Copyright © Windows knowledge All Rights Reserved