Position: Home page » Bitcoin » Prevention of bitcoin virus

Prevention of bitcoin virus

Publish: 2021-05-06 14:11:14
1. In the case of blackmail software infection, disk files will be encrypted by virus, which is difficult to crack by using high-strength encryption algorithm. Besides paying high ransom, the attackers often have no other way to decrypt the files. Only paying high ransom can they decrypt and recover the files, causing serious losses to learning materials and personal data
1. Install the latest security patch for your computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immune tool" to detect whether there are loopholes in the system, and close the ports affected by the loopholes, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP or windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
2.

At present, the wanna series of blackmail viruses have been controlled to a certain extent, but the virus is constantly fighting against the upgrade. The effective prevention of this wanna blackmail virus can be avoided through the following actions

one is to temporarily close the port. Windows users can use firewall to filter personal computers, and temporarily turn off 3389 remote login on ports 135, 137 and 445 (if they don't want to turn off 3389 remote login, at least turn off the smart card login function), and pay attention to update security procts for defense, so as to minimize the risk of computer attack

The second is to update the released security patches of windows in time. When the ms17-010 vulnerability was first exposed in March, Microsoft had provided security updates for win7, win10 and other systems; After the outbreak of this incident, Microsoft also quickly released a special patch for Windows XP and other systems that had not provided official support before

The third is to use "blackmail virus immune tool" to repair. Users download the offline version of Tencent computer manager "blackmail virus immunity tool" through other computers, and the files to a safe and non-toxic U disk; Then turn on the designated computer when WiFi is turned off, the network cable is unplugged and the network is disconnected, and back up important files as soon as possible; Then use the offline version of "blackmail virus immunity tool" to fix the vulnerability with one click through USB flash disk; Network can be normal use of the computer

Fourthly, using the "file recovery tool" to recover. Users who have been infected with the virus can use the computer manager - file recovery tool for file recovery, with a certain probability of recovering your documents

in addition, enterprise network administrators can use the "Administrator Assistant" to detect the security of computer equipment. Tencent's anti-virus laboratory security team, after tackling key technical problems, launched a computer housekeeper "Administrator Assistant" diagnostic tool for vulnerable enterprise customers on the evening of the 14th. The enterprise network administrator only needs to download the diagnostic tool and input the IP or device name of the target computer to diagnose whether the target computer is infected with blackmail virus; Under the guidance of the diagnosis report, the health equipment that has not been patched can be patched and defense can be arranged in time

note: in the near future, Windows users should try to avoid visiting high-risk web pages. At the same time, if they are unfortunately poisoned, they should not pay ransom. They can contact the security manufacturer to help recover valuable data, or they can completely eliminate the virus by formatting the hard disk

3. Try Tencent computer housekeeper, housekeeper 2 in 1, small occupation, full function
based on Tencent computer housekeeper's continuous investment in independent anti-virus engine research and development and proct performance optimization in recent years, combined with the multi engine architecture system, Tencent computer housekeeper's ability in security protection and virus detection and killing has reached the same level as the world-class anti-virus software; Especially in the processing of domestic popular samples, resource consumption and response speed,
4. You can use Tencent computer housekeeper to check and kill
it can thoroughly check and kill the virus, which is strongly escorted by cloud host defense, TVA anti-virus engine and system repair engine
housekeeper introces the international leading local checking and killing engine, which greatly improves the ability of Trojan horse checking and killing
the ability of virus anti-virus protection is international leading, which can comprehensively protect the computer security
5. Give some suggestions]

1. It is necessary to install anti-virus software, update the virus library in time, install firewall (anti Trojan horse, hacker attack, etc.), kill virus regularly, and maintain the security of computer operation
it is recommended that the owner of the building can install Tencent computer manager, which is a free professional security software with two in one anti-virus Management (only need to download one ), small memory, good anti-virus, good protection, and no false alarm and killing. It has a world-class anti-virus software embedded anti-virus engine, such as cloud killing engine, anti-virus engine, Jinshan cloud killing engine, Avira killing engine, xiaohongsan and killing repair engine
software upgrade, vulnerability repair and garbage cleaning are automatically and regularly set, which is necessary for lazy people
2; Open Tencent computer manager toolbox vulnerability repair
3. Don't go to some unknown websites or download things casually
4. You should also be on guard against portable storage devices (such as USB flash disk, where viruses are rampant recently)
5. Don't go to unknown websites or receive strange e-mails. After downloading the compressed package file, scan the virus first
6. Close unnecessary ports
7. If you have time and energy, learn some common computer skills and knowledge

finally, I would like to say that if you are very careful but still poisoned, you can't help it It's a good choice to backup the system with ghost.)
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750