Position: Home page » Equipment » Computers mined by others

Computers mined by others

Publish: 2021-05-14 07:10:31
1. Change the computer (manual funny)
antivirus, if you can't kill it, you can check the program with high CPU or GPU occupation and manually delete it. If you can't, you can't change the hard disk (the disk where the mining program is located)... Change the computer
2. Those with traps can fall down... 65535 may drop hundreds of layers at a time... But this will also hurt one level of physical strength
then go to Laojin ~ ~ ~ 1239f056 0000fffe. After entering the super high grade mine, push off the golden finger, and then go to the next level

s * * t can't log in at home, but can only answer anonymously
3. Normally, this will not be displayed. Do you think there are any other problems? If there are, you can kill the virus. If you can't kill it, it may be caused by the software. If you can't get used to it, you can dismantle the software. If you can't find it, you can consider reloading the system
4. I think you should be in someone else's Trojan Horse & lt; Grey pigeon, zombie & gt; Such remote control software
it is recommended that you re install the system once
and then build an invulnerable system.
the details are as follows:

first, if you are a new system (or you can confirm that your system is currently non-toxic),

it would be better, Open it now:

"start → program → management tool → computer management → local user and group → user"

first of all, change the super administrator password to more than ten digits, then create a user, set the password of

to more than ten digits, and promote it to super administrator. The purpose of this is to

double insurance: if you forget one of the passwords, there is still room for you to log in with another password, so that you will not be rejected from the system; Moreover, hackers on the Internet can no longer get control of your system remotely by guessing

the password of your system

then add two users, such as user1 and user2

and specify that they belong to the user group. OK, all the preparations are completed here

in the future, except for the necessary maintenance of the computer, you should not use super administrator and user2 to log in. Just use

user1 to log in. After logging in, find IE and create a shortcut for it. Right click the shortcut and select "run as other users" and click OK<

click this shortcut when you want to access the Internet, it will ask you for the user name and password

at this time, you can enter the user name and password of user2

OK, now you can use this open window to surf the Internet. You can browse any malicious, malicious, website or webpage at ease, and you don't have to worry about winning

because your current system active user is user1. When we use the inactive user

to surf the Internet, no matter how smart the website is, the information obtained through IE will make it think that user2 is your current active user. If it wants to destroy your system with malicious code when you browse, it will not work at all, Even if it works, only a configuration file of use2 will be modified. However, many malicious code and virus attempts to destroy the system through user2 will fail because user2 is not running at all. How can we get the operation right of the system

since I can't take it, I have nothing to do with you. And they are more unlikely to operate across users

because Microsoft has to configure that each user is independent, just like other people can't go to my

home and occupy my bed, they can't occupy the position of user1! So as long as you can protect the

certificate, you always use the user2 user as an agent to access the Internet (but don't use user2 to log in to the system, because in that case, if there is any web virus in user2 before, they are likely to be activated when user2 logs in!), No matter how many web viruses you have, all

will not work or be loaded by your current user1 user, so your current system will never be toxic

but there are always times of negligence. What should a person do if he is poisoned accidentally

don't worry, now we can enjoy the performance of shelling technology<

start to get rid of the golden cicada's shell:

restart the computer and log in with the super administrator - after entering the system, do not run any programs

you will be surprised to find that the system in is completely non-toxic!!, Then

can't be better. Open it immediately:

"start → program → management tool → computer management → local users and groups → users"

delete the two user rights of user1 and user2. You only need to delete them so gently. Then the virus that existed with these two users will go to sleep together with the disappearance of these two users -- (it seems to be buried with you, ha ha!). After doing this, I guarantee that your Win2K is just like a newly installed one, and any system files and system processes are completely free of viruses

good! Now repeat the steps at the beginning to create two new users, user1 and user2, and let them come back to life

when they come back to life, they come back to life, but the virus that once followed them has no chance, because Win2K

when users are re established, they will be reassigned with a new configuration, And this configuration is brand new,

also can't contain virus!!! After the establishment, log off the super administrator immediately, log in with user1 and continue what you do. You will find that your system is brand new

the above methods can be used over and over again, and with frequent Microsoft patches, you can almost always

ensure that your operating system is non-toxic! As long as you can follow the following rules:

1. Never log in as a super administrator at any time unless you need to do system level update and maintenance, use super administrator identity or add or delete users< Second, when you have to use the super administrator to log in, make sure that you don't use and run anything except the tools and programs of the operating system. Moreover, all maintenance is only done through the options of

in the start menu, and you can't even use the resource manager to browse the hard disk! Just do the management and maintenance of users and systems, then quit immediately, and never stay more This is also the requirement of Microsoft. Micro

software knows its own best, and his suggestion is correct. Browsing the hard disk, you have a lot of opportunities for other users,

but you still don't want to be a super administrator!! This should be able to

completely

if you have done all of the above, then excluding the causes of hardware and misoperation, viruses and system paralysis, you will have no chance to do it.......
5. The most direct way is to reload the operating system and install the firewall< How do you know that your computer is regarded as a broiler? The so-called "broiler" is your computer hackers as a springboard to invade other computers. The purpose is to cover up the hacker's real IP.)
6. Dwmapi.dll and aoltb.dll are not necessarily Trojan horse programs. However, both programs may be tampered by Trojan horse programs. Don't worry. Even if they are tampered, they are just executive programs. If the owner of the building is arrested, there must be other accounts in the administrator group. You can start DOS in safe mode to check if there are any exceptions& gt; Run & gt& gt; If you have only one administrator account in the control panel, it will be OK. If not, go to the account used in the control panel (vista system may have another name, I can't remember) to disable the account. Then look for computer management in the management tool in the control panel& gt; Local users and groups. Delete the administrator account you found. Judging from the symptoms you said, it is indeed a Trojan horse. If you suspect the above two programs, you can delete them manually. Of course, it is still in safe mode. If 360 scan fails in safe mode, it proves that your system is safe. It is suggested to reload Jinshan
7. In addition to antivirus, you can often use the user task manager to see how many times your network applications are running. The premise is that you turn off all the applications that occupy network resources and see if the application rate is zero. If there is any application rate, it will be dangerous.
8. Yes. What I want to tell my friends at night is that preventing your computer from becoming someone else's "broiler" is as simple and effective as an attacker catching "broiler". As long as you realize that if you become a hacker's "chicken", it will be very hurt, you must refuse to be controlled by anyone. Do the following, the attacker want to catch you, there is no way
to get down to business and prevent you from becoming a "broiler", you need to pay attention to the following points:
point 1: there is a huge risk in pirating Windows XP, and its security needs to be improved immediately
if your operating system is installed by someone from a three legged cat computer store, or it may be pirated XP, such as tomato garden XP, rain forest wind XP, tornado XP, etc. Many of these systems are installed unattended. The installation procere is very simple. You put the CD into the computer, go out for tea, and then you may find that the system has been installed
What are the biggest defects of such a system? However, the administrator password of this system is empty, and it is automatic login. That is to say, anyone can try to log in your system with an empty password, and there is no obstacle for the Internet
modification method:
modify the administrator user password immediately. The password uses a combination of letters and other special characters with a length of no less than 8 digits
to change the login mode, you must press Ctrl + Alt + Del to login
point 2: if you leave your computer at any time, it is recommended to unplug the network cable. If you can't disconnect the computer, it is recommended to lock it immediately. Don't go on the Internet endlessly for 24 hours, and try not to let strangers physically touch your computer, such as using USB flash disk
you can easily find a Windows PE CD (deep mountain red leaf repair tool disk, etc.) and use this CD to guide you. You can easily modify your administrator login password, modify your registry information, and of course, write viruses, and then start the virus program
there have been many examples, such as online banking in Shanghai, which was once transferred 100000 yuan by hackers in Yunnan. For the general online banking, the popular version usually limits the withdrawal of about 1000 yuan a day, which is a small payment. Once the account number is lost, the loss will not be particularly huge. For professional online banking, if the digital certificate is stored in the local computer, when you leave your computer for a long time, the attacker can remotely control your computer and transfer property on your computer. This is no different from your local online banking business. For online banking users who use mobile digital certificate, please pay attention to unplug the digital certificate after using it, and do not give attackers any chance
solution:
when you need to leave the computer for a long time, lock the computer or unplug the network cable
point 3: make sure to enable the network firewall
for Internet users, the network firewall (note, here refers to firewall, not many people think of the virus real-time monitoring) is a gateway to isolate you from the outside world. Correctly enabling and configuring the firewall will rece your chances of directly facing attacks. When there are loopholes in your system that are not fixed, the firewall may be the only solution to protect your computer
however, don't think that if you turn on the firewall, everything will be OK. The firewall basically only intercepts the communication from outside to inside (from the Internet to the local computer), while the access from inside to outside is easy to cheat by various means. This is how the Trojan horse evades the firewall to complete the task of theft
although firewalls are not always effective, they are much better than none and must be enabled
key point 4: pay close attention to security vulnerability information, and use various patch repair tools in time to improve system security
system vulnerabilities are usually exploited by hackers for a long time before they are officially announced, which is commonly known as 0day attack, and such attacks are becoming more and more common. The vulnerability involves windows operating system files and other application software, but the biggest risk is still windows system vulnerability. The exploitation of application software vulnerability will be restricted by more environment, and the risk is usually relatively low
recently, flash player vulnerability has been widely concerned, which can be used by attackers to run arbitrary code
solution:
if you can use windows update, you must use it to let windows update automatically. See the icon in the lower right corner where windows update is working. Don't stop it
if some pirated users cannot use windows update or Microsoft Update normally, it is recommended to use a third-party vulnerability repair tool
point 5: install and use anti-virus software, and often check whether it works normally and whether it can update virus features
don't leave security issues to anti-virus software. Security is a system engineering, and anti-virus software is only one part of it. There is always a virus first, there will be antivirus software updates. In many cases, after the installation of anti-virus software, there will be a variety of viruses. But it doesn't mean that antivirus software is unnecessary. On the contrary, antivirus software is very important. Without antivirus software, your system may be worse. Do not recommend you install rising, Jiangmin, drug bully Oh! It's better to install feltost security
in order to invade your system, more and more viruses will first try to discard the antivirus software. It may be easier to destroy the function of antivirus software than antivirus software to deal with virus. Because the target of the destroyer is very clear, that is, the most popular software on the market, it is very easy to tamper with these kinds of security software. Moreover, unlike antivirus software, virus makers must consider the compatibility problems brought by each update. Attackers only focus on the tasks that Trojans need to complete. Virus makers do not have to spend a lot of effort to consider other consequences
the makers of Trojans hate antivirus software so much that after a considerable number of Trojans invade, they will destroy the antivirus software first. As long as the destroyer is willing, targeted destruction of antivirus software can always be done. Users should not expect the antivirus software itself to be an iron wall. Even the operating system can be destroyed, not to mention antivirus software
we can also use the working state of anti-virus software as another inspection tool: as long as you observe that the anti-virus software suddenly doesn't work, you should first consider whether it is damaged by Trojan horse
solution:
install an anti-virus software suitable for you, and pay attention to check its anti-virus ability frequently within the validity period, such as whether it can start normally, whether it can upgrade normally, etc
point 6: be careful with the use of mobile storage devices
before the development of the Internet, the spread of viruses depended on floppy disks, and then gave way to the network. Nowadays, the public more and more frequently use mobile storage devices (mobile hard disk, U disk, digital memory card, mobile phone) to transfer files. These mobile storage devices have become an important channel for Trojan horse transmission. Computer users usually call such virus U disk virus or auto virus. It means that the action of inserting a USB flash disk can make the virus spread from one USB flash disk to another computer instantly
solution:
immediately and without hesitation, disable the automatic playback function of U disk. The convenience of this function is negligible, but the risk of poisoning is very important
key point 7: safe Internet access
one of the important reasons for becoming a broiler is to browse unsafe websites. It is very difficult for ordinary users to distinguish what websites are safe and what websites are unsafe. And there is also the possibility that the original normal website is invaded and implanted with Trojan horse, and there is also the risk of downloading Trojan horse when visiting any webpage after being attacked by ARP
there are always opportunities to download Trojans on the Internet, which can only rece the risk
the security of browser needs special attention. The vulnerability of browser and browser plug-in is the favorite of hackers. The vulnerability of flash player is plug-in vulnerability. This vulnerability is cross browser platform, and it may exist in any situation where flash player is used
solutions:
timely repair browser vulnerabilities, timely upgrade the browser to the latest version, rece the time of exposing risky systems to attackers
avoid browsing some gray sites, which usually have large traffic, such as large number of living communities, online video communities, chat communities, pornographic websites, gambling websites, etc. When browsing this kind of website, if you find the system abnormal, you should immediately use the method described in "how to detect whether the computer is a 'broiler'"
the above is by no means the whole of security protection. It can be said that it is the most important link with the greatest risk. Pay attention to the security protection from the above points. At least the tripod hackers can't help you
security protection is dynamic. Always be vigilant. For the Internet, you should have the view that everything is a threat. As for a surgeon, in his eyes, all objects are contaminated by bacteria and viruses, and disinfection is the most basic principle.
9. It should not be implanted in the back door registry and port, which is more complicated and hard to say. I tell you to use a better antivirus software Jinshan first aid kit 360 first aid kit or something. If there is no poison, I will tell you a particularly easy way to use it is to reload the system, so that the computer repairer can repair it for you or buy a disk to install it
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750