Bitcoin blue screen
press the power button to switch on and off repeatedly, and try to put it on for a while. If you really can't, you can't just re install the system. If you can't re install it yourself, you can spend 30 yuan to find someone to help you
as long as your computer doesn't get stuck, has a blue screen, and is shut down suddenly, it won't turn on like this
please ask me if you have any questions.
you can also use the third-party 360 to make this patch.
At the beginning, I heard that it was so serious all of a sudden. As a practitioner, I really had a sense of fear. Once it spread in my scope, it would cause endless trouble to my work. Moreover, some phenomena were exaggerated in the report, such as unnecessary operation and automatic infection of virus. I don't know how this principle came about. Is it a myth of network technology, Viruses, Trojans and malware become uncontrollable demons
"eternal blue virus" can scan windows machines with open 445 file sharing port to implant malicious programs. There are no absolutely safe operating systems in the world. They are all early systems of foreigners. Besides, there are no flawless things in the world. I have to learn more and take good precautions. I am engaged in enterprise information and security work. I know the dangers of viruses, Trojans and malicious programs, and I can't help the panda who gets up early to burn incense. There are a lot of solutions, but some people are still poisoned
how to shut down ports 445, 135, 137, 138 and 139 and turn off network sharing can also avoid winning. The method is as follows:
run, input "dcomcnfg", right-click "my computer" on the right of "computer" option, and select "properties". In the default properties tab of my computer properties dialog box, remove the check before "enable Distributed COM on this computer", select the default protocol tab, select "connection oriented TCP / IP", click "delete" button,
Close ports 135, 137 and 138: right click the network neighbor to select properties, On the new connection, right-click to select properties, and then select the network tab to remove the check boxes of Microsoft network file and printer sharing and Microsoft network client. In this way, ports 135, 137 and 138 on the shared end are closed
Close port 139: Port 139 is a NetBIOS session port for file and print sharing. The way to close 139 is to select "Internet Protocol (TCP / IP)" attribute in "local connection" in "network and dial-up connection", enter "advanced TCP / IP settings" and "disable TCP / IP NetBIOS" in "wins settings", and check to close 139 port
Close port 445: start - run, input regedit. After confirming, locate to HKEY_ LOCAL_ Machine, system, currentcontrolset, services, NetBt, parameters, create a new DWORD value named smbdeviceenabled, and set it to 0 to close port 445
whether practitioners or ordinary users, it is a difficult problem to face the virus Trojan horse vulnerability and malicious code. How to ensure their own safety is to take action in advance, take precautions, keep the safety warning in mind, and do not surf the Internet, operate or click randomly. There are so many bad guys that it is impossible to prevent them. Then the whole society should take action to make the virus and bad guys have no place to hide
in 2014, Ag Asia Travel spent $20 million on bitcoin. The increase in the use of bitcoin to guess the ball has led to an increase in the demand and price of bitcoin, which has led to an increase in people's expectations of the price of bitcoin. The increase in expectations has led to more people buying bitcoin, and the price continues to rise. This is a chain reaction. Of course, the same is true of other virtual currencies.
3. There are conflicts and incompatibilities in the software downloaded from the computer. (Tencent computer manager, software uninstall, find the uninstall, and then: powerful cleaning)! For example: player repeat or have similar, antivirus, browser, game, input method have similar rendant, unload rendant, only leave one< br />4 Software needs to be updated (Tencent computer manager, software upgrade, download, overlay installation, WinRAR can not upgrade)
5. There are new vulnerabilities in the system waiting to be installed, (open Tencent computer manager to repair the vulnerability and scan for repair)
6. Poor contact, looseness or st cover of graphics card, memory CPU or fan, (remove the eraser)
7. Memory CPU overheating, poor heat dissipation Power on time should not be too long, power off heat dissipation)
8. There is a bad comment plug-in in the computer Scan out, clean up immediately) or excessive disk fragments, (use Tencent computer housekeeper), clean up the fragments< br />9 If not, the system file is lost! Or the system memory has a very serious error< br />10 Try to press F8 after power on, enter, enter, enter safe mode, the last correct configuration, press to try! Or, enter the security mode, to the desktop, open Tencent computer housekeeper, overall anti-virus< br />11 Play game blue screen, generally the system does not support this game Change the game version or XP system)
12. Download the game, player, input method, download tools, browser, driver, and so on the program is not stable Use Tencent computer manager to uninstall, reload or upgrade to the latest version)!
computer virus is clearly defined in the regulations of the people's Republic of China on the security and protection of computer information systems. Virus refers to "the virus inserted in a computer program by the compiler that destroys the function of the computer or destroys data, A group of computer instructions or program codes that affect the use of computers and can be copied from panda burning incense virus (nimya virus variant)
me ". Different from the "virus" in medicine, computer virus is not a natural existence, but a set of instruction set or program code compiled by some people using the inherent vulnerability of computer software and hardware. It can lurk in the storage medium (or program) of the computer through some way, and be activated when certain conditions are met. It can put its exact or possibly evolved form into other programs by modifying other programs, so as to infect other programs and destroy computer resources. The so-called virus is man-made, It is very harmful to other users.
