Extortion virus virtual currency mining wannacry
Publish: 2021-05-24 12:02:21
1. Version 3.0 embodies further decentralization and bottom-up thinking. If this meaning and function is concerned, it mainly embodies a four set idea of the whole person, or a person's whole idea, um, some ideas about the private science.
2. There are many reasons for computer poisoning, such as: surfing the Internet, downloading software files, accepting things from others, connecting U disk mobile phone, playing CD, the vulnerability is not fixed, leading to virus invasion.. Anyway, the virus is everywhere, want the computer not poisoned, unless your computer is not connected to the Internet. Or regular antivirus, Tencent computer housekeeper can, resource occupancy is small, cloud killing Trojan horse is very awesome, loophole killing, system repair, and inherited Tencent in anti phishing, malicious web site for more than ten years of experience and gene protection. Tencent computer housekeeper is easy to operate, the interface is fresh, and the garbage cleaning is more comprehensive. Also remember to fix the loophole, the virus will not be able to drill the loophole into the computer.
3. Try Tencent computer housekeeper protection, more comprehensive in function, more intelligent, more intimate
the main functions include security protection, system optimization and software management, which are suitable for Internet users to use every day
real time protection to protect computer security, such as system firewall: computer manager system firewall selects the key locations vulnerable to virus Trojan horse attacks, covering the registry, system services, system files, processes and other protection locations, to protect your system security in an all-round way
Internet Security Firewall: the housekeeper web firewall can monitor the network in real time and effectively intercept the attacks of the Pegasus website on the system. All round guarantee your Internet security
entrance firewall: real time monitoring of USB flash disk can effectively prevent virus Trojan horse from invading the system through USB flash disk.
the main functions include security protection, system optimization and software management, which are suitable for Internet users to use every day
real time protection to protect computer security, such as system firewall: computer manager system firewall selects the key locations vulnerable to virus Trojan horse attacks, covering the registry, system services, system files, processes and other protection locations, to protect your system security in an all-round way
Internet Security Firewall: the housekeeper web firewall can monitor the network in real time and effectively intercept the attacks of the Pegasus website on the system. All round guarantee your Internet security
entrance firewall: real time monitoring of USB flash disk can effectively prevent virus Trojan horse from invading the system through USB flash disk.
4. Wanacry: wannacry, a 3.3mb "worm like" blackmail software, is spread by criminals using the dangerous vulnerability "eternal blue" leaked by NSA (National
Security Agency)
the malware will scan the TCP 445 port (server message
block / SMB) on the computer, spread in a worm like way, attack the host and encrypt the files stored on the host, and then ask for ransom in the form of bitcoin. The amount of extortion ranged from $300 to $600
on May 14, 2017, a variant of wannacry extortion virus appeared: wannacry 2.0, killing switch was canceled, and the transmission speed was faster or faster. As of May 15, 2017, wannacry has caused cyber attacks in at least 150 countries, which has affected the financial, energy, medical and other instries, causing serious crisis management problems. Some windows operating system users in China are infected. Campus network users bear the brunt of the infection. A large number of laboratory data and graation projects are locked and encrypted
at present, the security instry has not been able to effectively break the malicious encryption behavior of the blackmail software. Brad Smith, President and chief legal officer of Microsoft, said that the U.S. national security agency did not disclose more security loopholes, which gave criminal organizations an opportunity to take advantage of and eventually brought the blackmail virus that attacked 150 countries this time
wannacry blackmail virus prevention method:
1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
Security Agency)
the malware will scan the TCP 445 port (server message
block / SMB) on the computer, spread in a worm like way, attack the host and encrypt the files stored on the host, and then ask for ransom in the form of bitcoin. The amount of extortion ranged from $300 to $600
on May 14, 2017, a variant of wannacry extortion virus appeared: wannacry 2.0, killing switch was canceled, and the transmission speed was faster or faster. As of May 15, 2017, wannacry has caused cyber attacks in at least 150 countries, which has affected the financial, energy, medical and other instries, causing serious crisis management problems. Some windows operating system users in China are infected. Campus network users bear the brunt of the infection. A large number of laboratory data and graation projects are locked and encrypted
at present, the security instry has not been able to effectively break the malicious encryption behavior of the blackmail software. Brad Smith, President and chief legal officer of Microsoft, said that the U.S. national security agency did not disclose more security loopholes, which gave criminal organizations an opportunity to take advantage of and eventually brought the blackmail virus that attacked 150 countries this time
wannacry blackmail virus prevention method:
1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
5. Yes, it seems that a bitcoin costs 10000 yuan. Do you think it's worth it?
6. Download the latest driver, and then rece the frequency in overclock. Or in another way
1, download a Chinese version of NVIDIA inspector 1.91
2. Open the main interface of the software to display the overclocking column, and click open to display the overclocking
3. The frequency setting column is divided into four main areas to adjust the core, video memory, shader frequency and voltage respectively
point at the frequency - as much as possible. According to their own needs, adjust the frequency of their own Ruyi look on it.
1, download a Chinese version of NVIDIA inspector 1.91
2. Open the main interface of the software to display the overclocking column, and click open to display the overclocking
3. The frequency setting column is divided into four main areas to adjust the core, video memory, shader frequency and voltage respectively
point at the frequency - as much as possible. According to their own needs, adjust the frequency of their own Ruyi look on it.
7.
1. Taking n card as an example, this paper introces the specific steps to rece the frequency of the graphics card, which is the opposite of overclocking. You can use the N card overclocking software NVIDIA inspector to complete:
2. Search NVIDIA inspector software to download and install
3. Run the installed software and click the display at the bottom of the main interface to see the overclocking interface, which is basically displayed in Chinese. Most people who have some knowledge of hardware can understand it
Hot content