Position: Home page » Pool » When will the Troy mine be restored

When will the Troy mine be restored

Publish: 2021-05-13 16:11:42
1. If you have this folder, it's a temporary folder. It's available in the system. It's OK to re install the system, but there are also some points that need to be paid attention to. First of all, before re installing the system, you should use the super patrol U disk to immunize the whole disk. When you shut down the computer, you must shut down the computer. If you restart, there may be viruses in the memory, After that, you can boot up and install the C disk system, or restore the system. After entering the system, you must pay attention not to move other disks. You can download the antivirus software directly from the Internet, and you need to pay attention to the whole antivirus. Don't say that I downloaded it before and put it on other disks, which may activate the virus. The installation package of the antivirus software may be infected by the virus, Or some files infected by the virus are activated.
2. Because Trojans generally have services or drivers to protect them. It's not that your antivirus software is bad, but these Trojans are too stubborn / difficult to eradicate
therefore, the best tool to kill Trojans is to kill them! You can try to use your anti-virus software or tools in the safe mode first. In this way, the anti-virus will be more thorough, and some viruses can be removed. Restart, press F8 to enter safe mode and open antivirus software for antivirus. The following are specific methods and tools
solution: check and kill in safe mode! Restart the computer -- press F8 -- Security Mode -- Open antivirus software -- check and kill all
(1) tool method:
1: it is recommended that you first use 360 security guard's Trojan cloud killing and antivirus software to kill in safe mode, because the killing effect is the best in safe mode
2: download address of windows malware cleanup assistant: http://www.ote.com/soft/7513.html
a software cleaning tool that users have full control over: unique cleaning technology, which can thoroughly clean up Malware with driver protection; The engine and script are separated, and the clean-up operation is completely transparent to users User defined killing rules, the control is completely controlled by the user Open user interface can meet your personalized cleaning needs, user-defined script file, realize the cleaning of some special software, and share it with all users Real time update script library, so that you have more powerful cleaning ability!! 3: When the computer is infected with Trojan, if it can't run, please change its name: "ASD" ha ha
download address: http://www.360.cn/ (360 stubborn Trojan killing must be online to check and kill) 4: use shell Trojan to kill shell official website download address: http://www.beike.cn/
shell trojan is green software, Just double click to run it.
360 is good, but it has no immunity to the new Trojan horse.
shell is mainly designed for the new trojan virus. 5: AV terminator Trojan killing tool download address: http://mirc.ys168.com/
clear AV terminator / 8749 virus; Fix "image hijacking"; Fix autorun.inf; Fix security mode. 6: micro active defense software, http://dl.pconline.com.cn/html_ 2 / 1 / 66 / id = 10993 & PN = 0. HTML (charging) system virus in hacker backdoor tool. It can make the self-protection and monitoring of some anti-virus software invalid
it's easy to kill if the network is disconnected into safe mode. Now mainstream antivirus software can do it. The simplest is this
open my computer
open the menu "tools / Folder Options" in turn
then switch to the view page in the pop-up Folder Options dialog box
remove the check in front of "Hide protected operating system files (recommended)" and make it unselected
in the "advanced settings" list box below, change the "do not show hidden files and folders" option to "show all files and folders" option
remove the check in front of "Hide extensions of known file types" and make it unselected
finally, click OK 2 : manual method
1: open start / run, enter regedit and click OK to open the registry editor and enter HKEY_ LOCAL_ MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Under the run key, in the right column, find a column named "; If you find the value of "rundll", please double-click to open it, view and write down the file and path name indicated in "numerical data", which is generally "C: &# 92; WINNT\ System32\ The form of "XXX. Exe" (but not fixed, which depends on the specific environment). Note that "XXX. Exe" represents any value, not fixed, instead of four X's, so at this time, be sure to remember the file name represented by "XXX. Exe", and then delete this "X" from the registry; Rundll value; 2: Press the "Ctrl + Alt + Del" key to pop up the task manager, and find the process of "XXX. Exe" recorded in the second step above (note that the name of XXX. Exe here is a specific name, not four XS). After finding the same process, select it and click "end process" to end the Trojan process; 3: Open the resource manager and enter the system directory; Winnt\ System 32 (if your WIN2000 / NT / XP is installed on C disk, it is C: &# 92; Winnt\ System32 Find the files of xxx.exe and xxxx.dll, and then delete them directly (of course, the name of XXX here is not the four X's, but the specific name); If it is found in the process of deletion that the file cannot be deleted, but reports that "the file is in use and cannot be deleted", you can log off or restart the computer, and then click this method to find and delete it. 4: Press the "Ctrl + Alt + Del" key to pop up the task manager, and find the process of "XXX. Exe" recorded in the second step above (note that the name of XXX. Exe here is a specific name, not four XS). After finding the same process, select it and click "end process" to end the Trojan process; 5: Open the resource manager and enter the system directory; Winnt\ System 32 (if your WIN2000 / NT / XP is installed on C disk, it is C: &# 92; Winnt\ System32 Find the files of xxx.exe and xxxx.dll, and then delete them directly (of course, the name of XXX here is not the four X's, but the specific name); If it is found in the process of deletion that the file cannot be deleted, but reports that "the file is in use and cannot be deleted", you can log off or restart the computer, and then click this method to find and delete it< (3) manual deletion:
give the file name and path corresponding to the virus according to the killing software, start -- run -- regedit, open the registry, select "my computer" in the registry with the cursor, menu -- edit -- search, search the items of the file from beginning to end, right-click -- delete, F3 continue until the end of the search and deletion.
finally, delete the hard disk file, If you are not allowed to delete, use icesword's file and registry functions to delete
icesword download address: http://www.onlinedown.net/soft/53325.htm
if it is difficult to clear manually, you can download and install an Unlocker, which will be automatically added to the right-click menu, The next operation can be done without a teacher. Unlock download address: http://www.newhua.com/soft/24732.htm It's better to do some basic protection, turn off the system restore and its service
clear all temporary folders in safe mode (there are batch processing on the Internet, and you can also use super rabbit's file cleaning)
close some useless services super rabbit: http://www.skycn.com/soft/2993.html
3. Use Kaba and 360 guard to kill in safe mode. If not, reload the system
4.

The cause of the Trojan War was to fight for a peerless beauty. Paris, the son of the God of heaven, fell in love with the queen of Sparta. Using the stratagem, Paris successfully snatched the queen. When the king of Sparta knew that his beloved wife had been robbed, he was very angry and went to his brother for help. His brother recruited many heroes. In order to get back the queen, Paris and Sparta started a ten-year war based on the city of Troy

because the city of Troy was strong, easy to defend and difficult to attack, the hero Odysseus finally offered a clever plan, and the window of Jinzhong made all the Greek soldiers board the warship, making a false appearance of withdrawal, and deliberately left a huge Trojan horse in front of the city. The Trojans happily carried the horse into the city as booty

that night, just as the Trojans in Jinzhong window were inlging in wine and dancing, 20 Greek soldiers hidden in the belly of the Trojan horse came out and opened the city gate to deal with internal and external affairs. Troy was immediately captured, plundered and destroyed by fire. As a result, Greece won the final victory

Modern historians believe that the cause of the Trojan War was economic factors, and that the Greeks and Asia Minor fought for the control of the Dardanelle Strait, the throat of the Black Sea trade, for the sake of commercial interests, and finally had to fight against each other. Helen is not the only reason for the Trojan War. If this war really happened, Helen was just an excuse for the Greek commander

The strategic position of Troy is very important at the entrance of the Black Sea. By occupying Troy, the Greeks could dominate the Aegean Sea and enter the Black Sea. In the past, the role of Troy was to buy and sell the goods of Greece. Through him, the goods of Greece were sold to the countries of the two river basins, and the materials of the two river basins and even East Asia had to go through Assyria to get to Greece. Now that Assyria is down, Greece can do business directly with the eastern countries

5. Enter the safe mode to kill the virus
or the next special killing tool
hang out the virus and show it to us
or how can we know what the anti-virus software can't be opened?

What's the situation? Or is your anti-virus software pirated? If you can't open it, you will win the AV terminator. If you always show windows pirated verification every time you open it, you will suffer Blood ghost, first tell us your specific situation, and then help you solve it
6. In the vicious Trojan horse

antivirus software is not very good at killing Trojans

it's best to use professional Trojan killing software: Super patrol and ewido

it should be OK

of course, if you want to be simple,

delete it manually and do not want it to appear after restart...

use the powerrmv recommended by Mr. Cui yanqu

Data virus Trojan horse to kill Tianwang and completely delete the found files

it can not only kill, but also inhibit the re generation of Trojan horse

absolutely effective

(please shut down the system before killing)

I wish you success^_^
7. As long as you install antivirus software, keep the virus library up to date. Firewall settings: dangerous programs are forbidden to use, security programs through. And use Jinshan or rising's "vulnerability scanning tool" to download security patches. Use genuine software. Don't go into some boring websites. Back up regularly. Search the memory every day when you connect to the network. If you find something abnormal, turn on the "system restore" in the "attachment", and then turn off the system restore when the situation gets better (do not install things into disk C ring the period of turning on the system restore). In this way, if there is another virus, you can change a computer.
8. This is how I lose weight! At school! No recipes! No time to exercise! Because it's the third year of high school! I'm less than 3 months from 140 to 110. This is the way many people lose weight! It doesn't take a month. If you insist on it, you can lose about 10 Jin in 20 days! Be sure to eat well in the morning! Lunch can also be full, but not too oily! But don't eat at night! At the beginning, if you are not used to it, you can have a fruit or something at night! But not many! be careful! Must not eat snacks! No snacks! Don't insist on eating at night! Don't think one day doesn't matter! You can try it first! It'll work in a week! A friend of mine used to be more than 130, now 110! We can have dinner after the rection! You can also eat less snacks! But there are not many dinners and snacks. Pay attention to the KFC boiled fish hot pot, so don't eat it. Don't you mind if you don't eat dinner? You can eat kiwi, apple and tomato! Not only can you lose weight, but also good for your skin and good for your health
9. Hello,
1. This can only suggest you to find a data recovery software on the Internet
2. Search for a tutorial, take a look, and then follow suit
for those within 3 and 50m, you can also try 360's recovery tool, but for those larger than 50m, you can't.
10. Trojan horse means to put a program on your machine. After it runs, it will connect with the server, and then connect your computer with the server's computer to control you or steal files.

your situation is that the Trojan horse has not been killed completely. It is suggested to change the anti-virus software and upgrade the anti-virus software every day,
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750