Position: Home page » Equipment » Mining virus detection and killing

Mining virus detection and killing

Publish: 2021-03-24 00:42:46
1. You can install some anti-virus software on the computer, such as 360 security guard, and then keep it on all the time. In this way, you can prevent the virus from entering the computer. If it has been poisoned, use 360 first aid box to check it in the safe mode.
2. Check and kill Trojan, you can download an antivirus software or firewall and so on
3. Use the stubborn Trojan horse killer in the computer housekeeper toolbox to check and kill. The stubborn Trojan horse killer of the computer housekeeper is specially designed for malicious threats that cannot be removed or detected by ordinary killing software. It uses a very powerful search and kill index

engine, so it can remove all kinds of stubborn Trojan viruses
4. Wannaminer mining Trojan basically performs many functions similar to the version updated in September. It mainly implants mining trojan in the server and scans multiple servers in the external network. Tencent computer housekeeper suggests closing 139, 445 and other unnecessary server ports and installing "eternal blue" and other vulnerability patches in time; It is recommended to install the security management system of Yudian terminal in the whole network, which can guarantee the network security of enterprise users in an all-round and three-dimensional way.
5. Methods / steps
first of all, if it is a virus written by a rookie, you can find the file path in the task manager, directly terminate the process tree, or directly find the path to delete it<

2 / 6
Second, if the other party's technology is enough, it is difficult for us to terminate the process, then we can download a computer housekeeper. Now the computer housekeeper also increases the scanning rate of mining virus, and if we find it, we can clean it directly

3 / 6
thirdly, if the computer housekeeper can't handle it, then we can check and kill avast. This program is the first in anti-virus, and it's like a sword for mining viruses<

4 / 6
Fourth, if we still suspect that there is a mining virus on the computer after using avast, we first open the process and manually put the document path to the quarantine area

5 / 6
fifthly, after we put it in the isolation area, we use avast's relaxation for analysis, and then send it to avast's staff. If we suspect that it is a mining virus, the other party will give us manual analysis. If it is, the other party will also help us delete it

6 / 6
sixthly, if we still have doubts after being determined in our profession, if it's not Daniel, then my uncle will need to install the computer again. After all, everything is clear
network experience: https://jingyan..com/article/ca41422f1d83601eae99edf3.html
thank you (≥ 8711; ≦)
6. Tencent computer manager can be installed to check and kill virus Trojan horse program. The security vulnerability has been repaired through windows security update and Tencent computer manager and other security software, which is basically not affected by wanna miner.
7. If you can't kill it completely, back up your data and then reload the system. Otherwise, it's really troublesome to delay your work
8. Computer installation 360 security guards can support killing
at the same time, the official latest version of 360 security guard has the protection function of mining Trojan horse (which can be found on the main interface). After the function is turned on, it can effectively play a protective role to avoid the mining Trojan horse causing the system CPU and memory to run full, resulting in the phenomenon of slow heating of the computer card. We hope to adopt it.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750