Friday, April 2, 2010

Computer crash causes Daquan

sometimes run all the software are normal, but suddenly and inexplicably crash, reboot then run these applications perfectly normal, this is a kinds of false crash phenomenon. The reason there is a Win 98 multi-memory resource conflict. As we all know, software is running in memory, but you can close the application software free memory space. However, some application software due to design reasons, even after its closure can not be completely free memory, and present a piece of software to use this memory address, there will be conflict.

maintenance sections that have more and "the computer crashed because Daquan" related articles, for the introduction of this article or more, if you think this article is the wrong place, Or you have a unique perspective, you are welcome to express their views on computer knowledge and suggestions Forum. If you like computer knowledge, please keep in mind the only site domain name



with illegal format or parameters of the illegal opening or release of the program, will cause the computer to crash. Please note to remember the correct format and related parameters, do not attempt to remove and release are not familiar with procedures.

】 【non-normal turn off the computer



do not directly use the power button on the chassis, otherwise it will create the system file is corrupted or missing, causing auto-start or run in the crash. For Windows 98/2000/NT such systems, it is very important, serious, can cause system crashes.

】 【memory conflict









crash is to make the operator rather annoyance. Crash when the show more for the "blue screen" to start the system, the screen "freeze frame" no response, mouse, keyboard can not input, the software running non-normal interruption. Although the crash caused by many reasons, but the original aim, the reason can never escape from both the hardware and software.

by the hardware causes crash







as Windows 9x start to read System.ini, Win.ini, and the registry file, if it exists Config.sys, Autoexec.bat paper, these two documents will be read. As long as there is an error message that these files are possible crash, especially System.ini, Win.ini, User.dat, System.dat these four documents is particularly important.

【dynamic-link library files (DLL) is missing】



virus can dramatically decrease the efficiency of the computer, causing frequent crashes. At this point, we Xu Yong antivirus software, such as KV300, Kingsoft Internet Security, Rising, etc. to carry out a comprehensive check narcotics, anti-virus, and do regularly update anti-virus software.

】 【CMOS settings wrong







the better memory, hard disk capacity should be not less than 0.5 to 1%, if this problem occurs, you should replace the capacity to do memory may be large.

inferior parts】 【



excessive dust can cause the machine crash failures. Such as the floppy drive the laser head or excessive dust contamination, it will lead to read and write error, a serious cause computer crashes.

】 【device does not match





bad】 【cooling







should backup BIOS in case of emergency, but if your system BIOS upgrade needed, then before the upgrade make sure you are using the best BIOS version is consistent with your PC. If the BIOS upgrade does not correct the course of the upgrade or unexpected power outage, your system may not start. Therefore BIOS upgrade must be clarified before the BIOS model. If you are using the BIOS upgrade tool can backup the current BIOS, then put the disk in the previous copy of a BIOS. To see whether the system BIOS also supports recovery and also to know how to restore.

inappropriate】 【software upgrade









main hard drive is aging or because of improper use bad sectors, bad sectors. This machine runs very prone to crashes. Can use special tools to remove obstacles to treatment, such as serious damage can only replace a hard drive. Also for the motherboard does not support UDMA 66/100, should be noted that in the drive operating mode CMOS settings.

】 【CPU overclocking







the fault is common, such as hard disk parameter settings, mode settings, memory parameters set incorrectly which caused the computer not start. If no ECC function will be set to have ECC memory function, so it will cause crashes due to memory errors.

【system files accidentally deleted】



Computer crash causes Daquan


3D software and some special software, some computers may not start even on the installation, which may have hardware and software compatibility issues .

memory failure】 【



because they may be hidden virus software, once implemented, will automatically modify your system, the system crashes occur in the operation.

】 【application software flaws



If the remaining hard disk space too small, because some applications require large amounts of memory to run, so need virtual memory, and Virtual memory is provided by the hard disk, so the hard disk have enough free space to meet the needs of virtual memory. While the user still training regularly defragment your hard disk, remove junk files on your hard disk a good habit.

】 【BIOS upgrade failure





not to the directory where the software is installed directly delete the program, and if deleted, then the registry and the Windows directory, there will be a lot of rubbish in the course of time, systems also become unstable and cause crashes.

the use of pirated software】 【



infection】 【



This allows system resources exhausted, so that individual program needs of the data in memory or virtual memory can not be found, there will be exception error .

illegal operation】 【



in the Windows operating system there is a class file is also important, and this is the extension DLL The dynamic link library files, which file from the nature of the speaking class files are shared, that is, a DLL file may have multiple software at run time you need to call it. If we delete an application in time, the software installation program will be recorded against it had the documents installed and ready to delete them one by one, this time it is easy to appear to be deleted from the dynamic link library files also will be other software used in the case, if the missing-link library file is more important core linked documents, then the system will crash, or even collapse. We used tools such as "Super cyclamens" to remove unwanted DLL files, it will prevent from deletion.

【hard disk space is too little or too much debris】



move the process in the computer are often under great vibration device will loose inside the machine, resulting in poor contact, causing the computer crash, so should be avoided when the mobile computer severe vibration.

】 【dust killer





most people may think that the software upgrade is no problem, in fact, during the upgrade process will share some of the components of which were also upgrade, but other programs may not support the upgraded components leading to problems.

beta software】 【abuse







a small number of unscrupulous traders in a customer assembly compatible, the use of poor quality cards, memory, or even the sale of counterfeit motherboard and CPU off Remark , memory, this machine is very unstable in the run-time, inevitable crash occurred. Therefore, users should be wary of purchase, and can use some relatively new software testing tools for the computer, long continuous test machine (eg 72 hours), and the warranty for as long as possible time.

by the software causes crashes





such as motherboard and CPU frequency does not match the frequency, when the old motherboard overclocking FSB set too high, may not guarantee stability of operation , resulting in frequent crashes.

】 【hardware and software is not compatible



this situation is common, such as those running Win 98 DOS or Windows 3.1 to run a good 16-bit applications. Win 98 is 32, although it claims is compatible, but there are many places with 16-bit applications can not be coordinated. In other cases, as in Win 95, under normal use of the peripheral drivers, when the operating system upgrade, you may have problems, make the system crash or not start. In such cases the new drive should be to find peripherals.

】 【start up the program too much



needed because Windows 9x start Command.com, Io.sys, Msdos.sys and other documents, if they were damaged or accidentally deleted files even in the CMOS settings are correct in a variety of hardware did not help. Solution: use the same version of the operating system boot disk to start the computer, and then type "SYS C:\

destruction】 【initialization file









the best use of beta software, because software is usually tested with a number of BUG or in any way is not stable enough to use after data loss of procedural errors, crashes or the system can not start.

】 【illegal to uninstall software





display, power supply and CPU heat in the work of a very large, so good ventilation very important, if the monitor will lead to overheating color, image distortion or even shorten the display life. Long working hours can lead to poor power supply or monitor heat caused by the computer crashed. CPU cooling is related to the stability of computers running a major issue, but also thermal failure occurred "disastrous."

inappropriate】 【Mobile







is due to sound card or video card in the set of conflict, causing an unexpected error. In addition, other equipment interrupt, DMA or port conflict, then, may lead to the driver an exception, so that crash. The solution is to "safe mode" start, in the "Control Panel" → "System" → "Device Manager" in the appropriate adjustments. For an exception in driver error condition, you can modify the registry. Select "Run\key "to restart.

】 【memory capacity is not enough



overclocked CPU's operating frequency increases, while its performance may become unstable. The reason, CPU access to data in memory, already faster than the speed of memory and hard drive data exchange speed, overclocking to make this conflict more pronounced, increasing the virtual memory in memory or can not find the required data in the case, This will occur "exception error." Are relatively simple solution, of course, is to make the frequency of the CPU back to normal.

】 【hardware resource conflicts



main memory loose, Weld or memory chip itself due to the quality. Should be excluded under the specific circumstances of memory access fault, and if the quality of memory problems, you need to replace the memory to solve the problem.

】 【hard disk failure

Troubleshooting of the principles of the printer

general this situation is in place with a text editor, such as Word or WPS common and so obvious that the format in the preview neat, but the fonts to print out to find some overlap. This is generally due to improper editing settings, and its solution is a change of file "Page Properties" in the paper size, paper type, number of words per line, usually can be resolved.

2, print handwriting is not clear



general this happens, the system will usually prompt "Please check the printer is on-line and cable connection is normal." General reason may be that the printer power cord is not plugged; print cable is not connected properly; poor contact; computer parallel port, etc. damaged. Remind you that the solution has the following key:



1. If you can not start properly (that is, the power light is not lit), first check the printer's power cord is properly connected, in the off state the power cord to re- inserted again, and try for a power outlet to see whether the solution.

2. If you press the power switch the printer to print the normal start, on the BIOS settings, and then take a look into the parallel port settings. The general use of the ECP printer mode, but some printers do not support ECP mode, then used ECP + EPP, or "Normal" mode.

3. If the above two methods are ineffective, you need to focus on check printing cable, first turn off the computer, the printer cable re-inserted about 2 pull down, careful not to live swap. If the problem still can not solve it, try another printer cable, or alternative method.

5, print is not completely



Troubleshooting of the principles of the printer


this situation occurred in the laser printers are more likely to print a small file, or normal, but will crash when printing large files This problem is a software problem, you can view the remaining hard disk space, delete some useless files, or check the amount of memory the printer, whether expansion.

4, select the print after the printer does not respond



now printers have become the people's work and life often used in computer products, whereas the fact is frequently used products, so Ren Men often will Yudao this Huozhenayang Yixiewenti. Encountered a problem is not terrible, it is better to fast processing. Now I will brief you on some simple maintenance principles for your reference.

1, print and preview different







this problem usually is very common to use the printer, in general, this key and hardware failures encountered this problem generally should be noted that some of the key parts of the printer. We are here to inkjet printers in the example, the experience of fuzzy color printing products, fonts, the situation is not clear, you can lock in the nozzle failure, the first of the print head for automatic washing machine, if not successful than you can with a soft absorbent wipe the paper strong place near the print head; If the above method still can not resolve them, only to re-install the printer driver has.

3, can not print large files







If you encounter this problem, you can say for sure that is caused by a software failure, you can change the printer interface settings, choose "Start & rarr ; Settings → Control Panel → System → Device Manager → ports → Printer port driver → Change → Driver → Show all devices "will" ECP Printer Port "to" Printer port "confirm.

several methods mentioned above are all more common to use the printer on the fault, and indeed the failure to resolve the main printer or judge, as long as the reason to find fault, we can approach or by hardware Software repair methods. Of course, when people actually use the printer will encounter other problems, so this requires you to have more printer repair techniques.

fault repair the sections that have more and the "printer failure maintenance principles" related to the article, the introduction of this article or more, if you think this article is the wrong place, Or you have a unique perspective, you are welcome to express their views on computer knowledge and suggestions Forum.

Causes blue screen boot computer analysis and protection

1, first a blue screen error picture: you just copy from A disk or CD-ROM drive a file to your hard drive (note that this file can not be too small), the replication process will take out the floppy disk or CD-ROM, Windows will immediately Changing Faces - blue screen will appear immediately, then press Esc back to Windows status .

2, click the "Start" → "Run" dialog box that pops up, type msconfig.exe, carriage return, it will bring up the System Configuration Utility. Now, click on one of the "System.ini" tab.

3, find the [386Enh] key, click on "New" in their next add a string "MessageBackColor =" (Note that input without the quotes), enter an equal sign followed by 16 system number 0 ~ F, are free to fill in, which is used to indicate the error screen background color.

4, the same method, in [386Enh] next and then add a string "MessageTextColor =" (Note that input without the quotes), an equal sign followed by 16 hexadecimal numbers 0 ~ F, free to fill in, which is used to indicate the error screen the text color.

5, now restart your computer to be a test to see success is not: Repeat steps 1 and see whether they have bid farewell to a blue screen? You're done!

Note: This method and Windows does not really change the stability of fragile land, but through our work, change the Windows error screen when the background color and text color. From this perspective, it would be a kind of DIY act Oh.

fault repair the sections that have more and the "blue screen boot computer analysis of the causes and prevention," related articles, for the introduction of this article is relatively large. If you like computer knowledge, please keep in mind the only site domain name



"blue screen boot computer Analysis and Protection" is based on book knowledge, online information, practical experience summed up the article, if you want to know more of these questions, please repair the sections that concern more failures more articles!

often use the computer less friend must not run into a blue screen, goes on a cool blue face really annoying. Then the blue screen in the end is how it produced?

we can of soft and hard to explain both the blue for the cause. From the hardware side, overclocking over a major cause leading to blue screen. Over-overclocking, as a result of overloading operation, causing excessive internal operations to make cpu overheating, causing the system operator error. If both want to overclock, do not want to blue screen, and only do a good job cooling measures, and another powerful fan, plus some sort of cooling gel material will be much better. In addition, the amount of overclocking is overclocking or simply not one of the solution. To stabilize or to a higher speed depends on the choice of your own.

physical damage occurs if the memory of memory and other hardware are not compatible, also produced a blue screen. Solution at this time only for the memory that one of the ways.

If you look over, you will find read the disk drive when in the open can lead to non-normal blue screen. This issue does not affect the system working properly, as long as another bomb into the CD or press ESC key you can.

As hardware produced another common cause of blue screen is caused by hardware conflicts. Frequently encountered in practice is the sound card or video card settings conflict. In the "Control Panel" → "System" → "Device Manager" to check whether there is a yellow question mark or exclamation mark devices, such as there can try to simply delete it and restart the computer, Windows automatically adjusted by the general problem can be solved. If it does not work, can be adjusted manually or upgrade the appropriate driver.

poor quality parts is the computer blue screens of another culprit. A small number of unscrupulous traders in a customer assembly compatible, the use of poor quality motherboards, memory, and some even sell counterfeit motherboard and the old CPU, memory, this would make the machine run time is very unstable and crashes also occurred in the inevitable. Therefore, users should purchase a guard in this area, may request more familiar friends to help pick and can use some new tools for software testing than the computer, long continuous test machine (eg 72 hours), and for as long as possible warranty time.

from the software side, was a virus or hacker attacks, there is an error or damage the registry, boot loader too, version conflicts, caused by the virtual memory system of multi-tasking computing error, dynamic link library file is missing, too many font files, scheduled tasks loaded too many system resources or resource depletion conflict will have a blue screen. In addition, the hardware and software conflicts can easily generate a blue screen. Understand the blue screen appears "soft" reasons, you can remedy the.

eliminate the following blue screen of weird to see



Causes blue screen boot computer analysis and protection




Windows blue screen error when we may have been accustomed to this, but Can not "blue" screen for example, the "red" screen, "green" screen can not? course! as follows:

The main technical indicators of computer hard drives introduced

"computer hard drives introduced the major technical indicators" are based on book knowledge, online information, practical experience summed up the article, if you want to know more of these issues, please pay attention to the more computer Encyclopedia Forum article!

we usually buy in the hard disk, often hard to understand some of the parameters, and many magazine articles have also been a lot of explanation. However, in many cases, this description is not detailed or even a bit misleading. Today, we chat about this topic, hoping to buy the hard drive to provide proper assistance.

First of all, let's look at the internal structure of the hard disk, it will help to understand the relevant content of this article.

work, the disk in the axial motor driven, high-speed rotation, the head arm in the voice coil motor control, carried out in the disk at the top of the movement to address radial



The main technical indicators of computer hard drives introduced


1, RPM (RPM, Revolutions Per Minute): This indicator represents the hard disk spindle motor (disk drive) speed, on behalf of such 5400RPM The hard drive spindle speed of 5400 rpm.

2, Average Seek Time (Average Seek Time): If there are no special instructions generally refers to the tracking time of reading, in units of ms (milliseconds). This indicator is the meaning of receiving the hard disk read / write instruction to the heads move to the designated track (should be cylindrical, but it is the track for the specific head) above the average time needed. In addition to the average seek time, there are Road between Seek Time (Track to Track or Cylinder Switch Time) and full seek time (Full Track or Full Stroke), the former refers to the top of the head to move from the current track over the adjacent track time, which means the head from the outside (or the most inner) loop inside track at the top to move the most (or most things) the time required to circle above the track, basically more than double the average seek time. For practical work, we generally only care about the average seek time.

3, the average incubation period (Average Latency): This indicator is moving to a specific track when the head after the long wait the specified read / write head moves to the bottom sector (the disc is rotation), the disc turn faster, shorter incubation period. The average incubation period is used in a half circle of the disk rotation time. Obviously, the same speed, the average incubation period of the hard disk is fixed. 7200RPM when about 4.167ms, 5400RPM when about 5.556ms.

4, the average access time (Average Access Time): also known as the average access time, usually published in the manufacturers specifications will not be provided, which generally results in a test, its meaning is from the read / write commands sent to the first data read / write when the average time used, including the average seek time, average latency of the House and related operating time (such as instruction processing), since the House action for a very short (typically In 0.2ms or so), can be neglected, the average access time can be approximately equal to the average seek time + average latency, which is also called the average seek time. If a 5400RPM hard drive, the average seek time is 9ms, then in theory it's the average access time is 14.556ms.

5, the data transfer rate (DTR, Data Transfer Rate): units of MB / s (megabytes per second, also known as MBPS) or Mbits / s (megabits per second, also known as Mbps) . DTR is divided into the maximum (Maximum) and continuous (Sustained) two indicators, the data transfer is divided in different parties external and internal data transfer rate. DTR is the head and the internal buffer data transfer rate between the external DTR is the buffer zone and the host (ie, memory) between the data transfer rate. DTR limit depends on the external hard disk interface, the popular Ultra ATA-100 interface, which represents the maximum theoretical value of the external DTR up to 100MB / s, sustained DTR DTR is continuing to look at the internal level. DTR is the hard drive inside the real data transmission capacity, for the full play within the DTR, external DTR DTR theoretical values are higher than the internal, external, internal DTR determine the actual performance of DTR. As the disk tracks the most outer ring up, can head the unit of time more than the inner ring of the track across sectors, so head in the most outer ring within DTR when the largest, in the most inner ring within DTR when the minimum.

6, the buffer capacity (Buffer Size): Many people have called the cache (Cache) capacity, unit MB. Information in a number of manufacturers have also been writing Cache Buffer. The basic role of a buffer to balance the internal and external DTR. In order to reduce the waiting time host, will read the data before the hard disk into the buffer, so fill up before all the read or the buffer to send to the host interface to speed quickly. As technology advances, manufacturers are then added for the SCSI hard disk buffer cache functionality (which is why I still insist that it is the reason for the buffer). This is mainly reflected in three areas: prefetching (Prefetch), experiments show that in typical cases, at least 50% of the read operation is a continuous read. Prefetch function is simply the hard drive "without permission" to expand the scope to read, send to the host specified in the buffer sector data (ie, read head has been designated sector), the head and then read a number of adjacent fan data into the buffer zone, if the latter point has just read the adjacent sector prefetch, read from the buffer without re-addressing the head, increased access speed. Write Cache (Write Cache), usually in the write operation, data is first written to the buffer and then sent to the head, so head to write the report after completion of host write is completed, the host began to deal with the next task. Hard disk with write cache data is written to ease in the area after the report is written to the host has finished, let the host ahead of time to "liberate" other matters (the rest of the host need not wait for the write heads), to improve the overall efficiency. To further improve performance, manufacturers now have applied the basic sub-caching technology (Multiple Segment Cache), the buffer is divided into multiple small pieces and write data stored in different, but do not waste the buffer zone for small data space, It also can be so unified after all paragraphs written, write, better performance. Read cache (Read Cache), will read the data off temporarily stored in the buffer, if necessary, the host can once again directly from the buffer provided speed. Reading also can make use of sub-cache technology, store multiple disparate data blocks, the cache read data more than to further improve the cache hit rate.

PC Forum in Wikipedia for more and "hard disk introduces the major technical indicators" related to the article, the introduction of this article is relatively large. If you like computer knowledge, please keep in mind the only site domain name



Hard common technical indicators are the following:

msvcirt.dll document analysis, download and prompt solution to the lack of msvcirt.dll


sometimes because some of the illegal software and Trojan reasons, will the system directory msvcirt.dll file damaged or deleted, leading to play games or use the software when prompted to lack msvcirt.dll file (xp sp3 prompted the lack of msvcirt . dll xpsp3, vista tips lack msvcirt.dll vista).


solution:



DLL Name: Microsoft C Runtime Library



"msvcirt.dll document analysis, downloads, and tips lack msvcirt.dll solution" is based on book knowledge, online information, practical experience summed up the article, if you want to know more of these issues, please pay attention maintenance sections that more articles!

msvcirt.dll What is this? Suggest a lack of msvcirt.dll xpsp3 or msvcirt.dll vista or msvcirt.dll xpsp2 how to do? Can not find msvcirt.dll file, msvcirt.dll location, msvcirt.dll What is the folder path? This to 11 to answer them and provide msvcirt.dll download (msvcirt.dll xpsp3 download or msvcirt.dll vista download or msvcirt.dll xp download can be resolved).


msvcirt.dll document analysis









security level (0-5): 0



common error: File Not Found, Missing File, Exception Errors



DLL files: msvcirt or msvcirt. dll




Method three: the second method, some users will be prompted that the directory has been msvcirt folder, if there is the prompt, Go to the system directory "C: \ WINDOWS \ system32" to find a "msvcirt" named folder, delete it, then the implementation of method 2 step.

msvcirt.dll versions Download: http://download.wxiu.com/zjbb/system/200908/03-6215.html



Description:



Spyware: No



system DLL file: No





maintenance sections that have more more and "msvcirt.dll document analysis, downloads, and tips lack msvcirt.dll solutions" related to the article, the introduction of this article is relatively large. If you like computer knowledge, please keep in mind the only site domain name









msvcirt.dll document analysis, download and prompt solution to the lack of msvcirt.dll










msvcirt.dll is the Microsoft C programming language runtime relevant documents, for example, to print.

are: Windows





Adware: No






msvcirt - msvcirt.dll - DLL file information








Method 1: Start - Run - enter "rmdir / s / q% systemroot% \ system32 \ msvcirt.dll" press Enter.


Method 2: The first method used to restore the user does not need to download according to their own system, the corresponding "msvcirt.dll" replace the files, such as the xp-sp3 user to download & ldquo ; msvcirt.dll_xpsp3 \; next, put away after the run game can



suggest a lack of msvcirt.dll

Thursday, April 1, 2010

Worm virus spread Win32.Looked.BA Introduction

virus security view includes more and the "worm virus Win32.Looked.BA disseminate information" related articles, for this introduction to the article is still relatively large number of, if you think this article is the wrong place, or you have a unique perspective, you are welcome to express their views to the computer knowledge and recommendations of the Forum.



1. Do not e-mail attachments to run freely, especially in English e-mail.



Win32.Looked.BA worm features











worm infected files Win32.Looked.BA is a kind of worm, spread via network shares. It could also generate a DLL file used to periodically download and run arbitrary files. This will seriously damage the worm, he can steal all your system passwords to your system, causing immeasurable loss. Article Jiuji brief you Win32.Looked.BA infected with the worm theory, as well as preventive measures:







run-time, Win32.Looked.BA copied to the% Windows% \ Logo1_.exe and% Windows% \ rundl132.exe, then run the% Windows% \ rundl132.exe.





popularity: China



"wxiu.com" prompts us



3. proposed enterprise-level users Gateway products.



Win32.Looked.BA worm Description

Win32.Looked.BA is a kind of worm infected files, spread through the network share. It could also generate a DLL file used to periodically download and run arbitrary files.



attention to the timely closure of useless shared directory, such as the need to share, should be set share permissions. For the system account, should be set relatively strong password, you can avoid viruses easily guess the password function scored system.





4. Close shared directory and set a strong password for the administrator account, do not set the administrator password is empty or too simple passwords.



not arbitrarily run the exe file.



against Win32.Looked.BA worm recommended



Virus Name: Win32.Looked.BA < / p>

crazy: Low



Worm virus spread Win32.Looked.BA Introduction


destructive: China









2. The best time to upgrade the virus code base.

Computer virus was the correct approach to

application skills view includes more and "computer virus in the correct approach" related articles, for this introduction to the article is still relatively large number of, if you think this article is the wrong place, or you have a unique perspective, you are welcome to express their views to the computer knowledge and recommendations of the Forum. If you like to learn computer knowledge, please keep in mind the only site domain name





Internet, the movement of a variety of the virus in the non-stop, as a computer connected to the network, even though we have done a variety of precautions, but still can not be avoided, would have got a little inattentive. And now we have learned mostly how to prevent poisoning the computer knowledge, but who already poisoned the computer how to deal with is poorly understood. Here we will brief you on poisoning emergency measures.

one, do not restart
Generally speaking, when you find that unusual process of unknown program is running, or the computer is running significantly slower pace, and even the regular IE asked whether to run some ActiveX controls, debugging scripts and so on. Well, this time that this time you may have poisoned.
poisoning many people feel that the first thing to do first thing is to restart the computer. In fact, this is extremely wrong. When your computer after poisoning, if the restart, then the most likely result in greater losses.

2, Li-urgent disconnected from the network
because the virus attacks, not only to slow down the computer, but also destroy the data on the hard disk, but also may be send out your personal information, viruses, etc., so that further harm. In this regard, was found poisoned, the first thing to do is disconnect the network.
methods are more disconnected from the network, the simplest way is to go to a computer behind the allocation of the net line, which is the most simply way. However, in practical applications, we do not need such trouble, after all, went to the computer behind it is quite annoying of God. If you install a firewall, the firewall can be disconnected from the network directly, without a firewall, you can right-click "My Network Places" icon in the pop-up menu, select "Properties\; Local Area Connection "and will set it to" Disable "option. If it is dial-up users, you only need to disconnect the dial-up connection or the device can be shut down Moden.

3, back up important files
poisoning is not to conduct an immediate anti-virus, I personally feel that if the computer is not important document, then does not matter how operations are , up to I formatted the hard disk completely re-install. However, if the computer in the preservation of important data, mail, documents, you should be disconnected from the network immediately after its backup to other devices, such as mobile hard disk, CD-ROM. Despite efforts to back up these files may contain viruses, but antivirus software to check narcotics than will be removed much better.
What's more, after the virus attack is likely to not enter the system, so back up important files a timely manner after poisoning is to reduce the loss of one of the most important way.







Computer virus was the correct approach to


4, comprehensive anti-virus
In the absence of a worry, we can carry out the killing of the virus. Killing should include two parts, one in the Windows system under a comprehensive anti-virus, and second, under the antivirus in the DOS. At present, the mainstream anti-virus software in general can be directly under DOS antivirus disk production. In the anti-virus, it is recommended the user first, the need for antivirus software settings. Such as scanning compressed package files, scanning e-mail, while handling the file that contains the virus, for example, it can be set to "clear the virus," or "isolation" rather than a direct "Delete Files" This was done to prevent important documents were removed because of misuse.

5, change the key information set
due to viruses, Trojan horses are often in order to steal personal information for the purpose of the user, thus carrying out a comprehensive anti-virus operation must be followed by some important personal information, such as QQ, Email account password reset. Especially after the killing found a Trojan horse, especially the need for this work.

6, check the My Network Places
If it is LAN user, in dealing with their own computer virus, but also check whether other computers on the network, also was infected with a virus. Because many viruses will attack after the other computers to the network to launch attacks. Their own computer virus is most likely to infect other computers on the network. If you do not timely manner of its liquidation, then the most likely to re-reverse transmission.
check method on each computer in addition to a comprehensive virus removal, you can also install a firewall such viruses Jinshan net dart, if there are other computers on the network with a virus, then the virus will not stop the firewall to block attacks , we only need to open their interception logs, which can be an IP address that sent the virus database, according to re-identify the IP address of computer, in accordance with the above-mentioned methods can be handled.

Computer Beginners should follow the principle of anti-virus

First, the concept of establishing the right of anti-virus, learning about the virus and anti-virus knowledge.















10 are generally not to use the floppy disk to start. If the computer from the hard disk, do not use floppy disks, because it is caused by infection of the hard disk boot sector virus.



Computer Beginners should follow the principle of anti-virus


2 is not easily download the software online. In particular, not to those from unknown web site to download free software, because they can not guarantee that the software had not been infected.



Third, do not use pirated software.



13 is to rebuild the hard disk partition, to reduce losses. If the hard drive information has been damaged, do not rush to format, because the virus can not be in a short time destroy all the hard data, it can make use of "reconstruction" process analysis and reconstruction.





7 is regularly make backups. To cultivate the habit of backing up important files.



8 is to produce a non-toxic system floppy disk. Production of a non-toxic system disk, be write-protected and properly maintained so that emergency.







5 is to use the new equipment and new software prior to inspection.







12 is the discovery of suspicious circumstances and timely information for assistance.



now the computer is a part of people's lives, whether at work or a pastime, most can not do without computers, but computer viruses is also our greatest headache. At home, playing games, surfing the Internet, send and receive e-mail are likely to become infected. Readers may want to ask a friend, then how can we make your computer from viruses, or to minimize loss to, under normal circumstances, I recommend that readers follow the following principles friends before they occur. To minimize the dangers of computer viruses.





6 is the use of anti-virus software. Time to upgrade anti-virus software for the library, open the virus real-time monitoring.



9 is to produce an emergency disk / rescue disk / recovery disk. In accordance with the requirements of anti-virus software, create an emergency disk / rescue disk / recovery disk, in order to restore the system Ji Yong. In the emergency disk / rescue disk / recovery disk to store important information about the system data, such as the hard disk master boot sector information, the boot sector information, CMOS device information, etc., as well as DOS system, COMMAND.COM and two hidden files.



Fourth, it should not use someone else's floppy disk or CD-ROM. Special plate special plane as far as possible.





11 is the attention to the computer with no abnormal symptoms.







virus security view includes more and "computer beginners should follow the principle of anti-virus," related articles, for this introduction to the article is still relatively large number of, if you think of this article there is the wrong place, or you have a unique perspective, you are welcome to express their views to the computer knowledge and recommendations of the Forum.

National Computer Center found that U disk killer virus, new variant of

According to the experts advise, have been infected with the variant of the computer users should immediately upgrade the system in the anti-virus software, to conduct a comprehensive anti-virus. Is not infected with the variant of the computer users need to open the system, anti-virus software "system monitor" feature, from the registry, system processes, memory, network and other aspects of the various operations to active defense, so you can monitor the first time unknown virus invasion of activities to achieve full protection of computer system security purposes.



In addition, subscribers use a mobile hard disk, U disk medium such as a good idea to anti-virus. At the same time, it is best to disable the automatic playback system, prevent the virus from the use of U disk, mobile hard disk, MP3 and other mobile storage devices invasion of infected computer's operating system.





virus security view includes more and the "National Computer Center found that U disk killer virus, new variant of" related articles, for the introduction of this article is quite many. If you like to learn computer knowledge, please keep in mind the only site domain name



National Computer Center found that U disk killer virus, new variant of






the same time, an infected variant would modify the relevant registry key entry system, leading to the operating system can not properly display system hidden files, display the executable file extensions, or even to prohibit the system burner software , media player software and running processes such as Bluetooth devices.



experts say that in addition to the succession of earlier variants of the worm through the U disk and other removable storage devices, communication and other characteristics, he also has a stronger self-protection and some other new features. Variant running, it will copy itself onto the infected computer's operating system under the system directory, and multiple folders in the directory to generate a different executable virus file. Variants also create a "system Recycle Bin" folder attributes and its own copy of the copy into it and hide.



In addition, the variants will continue with the infected system to the root directory of all disk partitions write variants of the main program files and configuration files, once a computer user clicks on any drive letter, it will start to run the variant. This variant will also start by modifying the system registry entries, allowing variants with the computer system which automatically starts to run.





China National Computer Virus Emergency Response Center to monitor the Internet through the discovery, the recent worms "U disk killer" new variant, to remind users to take precautions.