Thursday, April 1, 2010

Computer virus was the correct approach to

application skills view includes more and "computer virus in the correct approach" related articles, for this introduction to the article is still relatively large number of, if you think this article is the wrong place, or you have a unique perspective, you are welcome to express their views to the computer knowledge and recommendations of the Forum. If you like to learn computer knowledge, please keep in mind the only site domain name





Internet, the movement of a variety of the virus in the non-stop, as a computer connected to the network, even though we have done a variety of precautions, but still can not be avoided, would have got a little inattentive. And now we have learned mostly how to prevent poisoning the computer knowledge, but who already poisoned the computer how to deal with is poorly understood. Here we will brief you on poisoning emergency measures.

one, do not restart
Generally speaking, when you find that unusual process of unknown program is running, or the computer is running significantly slower pace, and even the regular IE asked whether to run some ActiveX controls, debugging scripts and so on. Well, this time that this time you may have poisoned.
poisoning many people feel that the first thing to do first thing is to restart the computer. In fact, this is extremely wrong. When your computer after poisoning, if the restart, then the most likely result in greater losses.

2, Li-urgent disconnected from the network
because the virus attacks, not only to slow down the computer, but also destroy the data on the hard disk, but also may be send out your personal information, viruses, etc., so that further harm. In this regard, was found poisoned, the first thing to do is disconnect the network.
methods are more disconnected from the network, the simplest way is to go to a computer behind the allocation of the net line, which is the most simply way. However, in practical applications, we do not need such trouble, after all, went to the computer behind it is quite annoying of God. If you install a firewall, the firewall can be disconnected from the network directly, without a firewall, you can right-click "My Network Places" icon in the pop-up menu, select "Properties\; Local Area Connection "and will set it to" Disable "option. If it is dial-up users, you only need to disconnect the dial-up connection or the device can be shut down Moden.

3, back up important files
poisoning is not to conduct an immediate anti-virus, I personally feel that if the computer is not important document, then does not matter how operations are , up to I formatted the hard disk completely re-install. However, if the computer in the preservation of important data, mail, documents, you should be disconnected from the network immediately after its backup to other devices, such as mobile hard disk, CD-ROM. Despite efforts to back up these files may contain viruses, but antivirus software to check narcotics than will be removed much better.
What's more, after the virus attack is likely to not enter the system, so back up important files a timely manner after poisoning is to reduce the loss of one of the most important way.







Computer virus was the correct approach to


4, comprehensive anti-virus
In the absence of a worry, we can carry out the killing of the virus. Killing should include two parts, one in the Windows system under a comprehensive anti-virus, and second, under the antivirus in the DOS. At present, the mainstream anti-virus software in general can be directly under DOS antivirus disk production. In the anti-virus, it is recommended the user first, the need for antivirus software settings. Such as scanning compressed package files, scanning e-mail, while handling the file that contains the virus, for example, it can be set to "clear the virus," or "isolation" rather than a direct "Delete Files" This was done to prevent important documents were removed because of misuse.

5, change the key information set
due to viruses, Trojan horses are often in order to steal personal information for the purpose of the user, thus carrying out a comprehensive anti-virus operation must be followed by some important personal information, such as QQ, Email account password reset. Especially after the killing found a Trojan horse, especially the need for this work.

6, check the My Network Places
If it is LAN user, in dealing with their own computer virus, but also check whether other computers on the network, also was infected with a virus. Because many viruses will attack after the other computers to the network to launch attacks. Their own computer virus is most likely to infect other computers on the network. If you do not timely manner of its liquidation, then the most likely to re-reverse transmission.
check method on each computer in addition to a comprehensive virus removal, you can also install a firewall such viruses Jinshan net dart, if there are other computers on the network with a virus, then the virus will not stop the firewall to block attacks , we only need to open their interception logs, which can be an IP address that sent the virus database, according to re-identify the IP address of computer, in accordance with the above-mentioned methods can be handled.

No comments:

Post a Comment