Position: Home page » Bitcoin » Bitcoin virus in win8

Bitcoin virus in win8

Publish: 2021-04-18 20:58:06
1.

Yesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money

so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening

a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...

hope to catch criminals as soon as possible and give them severe punishment by law

this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers

some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code

the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus

2. 1、 Prepare a U-disk or mobile hard disk. Before going to work on Monday, you can download 360 security guard [offline disaster relief version] under the safe network environment at home. 2. After arriving at the company, first unplug the network cable of the office computer, turn off the wireless network switch, and then turn on the computer. 3. Insert the prepared U-disk or mobile hard disk into the office computer, and install 360 security guard [offline disaster relief version]. 4 The NSA Arsenal immune tool of 360 security guard [offline disaster relief version] will run automatically, and detect whether there is a vulnerability in your computer. 5. Please wait patiently ring the process of repairing the vulnerability, which generally takes 3-5 minutes. After the repair is successful, you will be prompted by a pop-up window. Please [restart computer] so that the repair operation will take effect completely. 7、 After restarting the computer, you can run the NSA defense tool again through the desktop shortcut [blackmail virus relief] to ensure that your system has been repaired.
3. You can use Tencent computer housekeeper to check and kill viruses as follows
1. First, upgrade your antivirus software and update the virus library to the latest
2. Open Tencent computer Housekeeper - virus checking and killing
3. Select lightning, overall or designated location (three kinds of checking and killing modes, according to your own needs). During the process of killing, you will scroll the process description and display the progress bar. In its traditional interface, it displays the start status of the antivirus engine in the form of icons, and displays the identification times of suspicious behaviors, the number of files scanned safely and other information
4. Wait patiently for the end of the scanning, if there is any abnormality, you can click to deal with it and clean up the virus
5, You can also choose to turn on the Tencent computer manager in safe mode, and follow the above steps for antivirus
turn off the computer, cut off the network, and select the entry mode (press the F8 key to start the computer and select the first item to enter the mode. This mode only starts the basic driver, and does not load other software. Then open your virus software and clean it up
4. Any data is infected and cannot be opened, and then it will prompt to recharge bitcoin.
5. Cerber4 was the first to receive requests from netizens  It's on October 1, the latest variant from March, and it's very active now.
6.

Use "blackmail virus immunity tool" to repair

users download the offline version of Tencent computer manager "blackmail virus immunity tool" through other computers, and the files to a safe and non-toxic USB flash disk; Then turn on the designated computer when Wi Fi is off, the network cable is disconnected, and the important files are backed up as soon as possible; Then use the offline version of "blackmail virus immunity tool" to fix the vulnerability with one click through USB flash disk; Network can be normal use of the computer

7. Turn on Microsoft's auto update and wait for a patch
if you are poisoned, don't try to recover, just reload the system directly
the following is the process of installing the system in USB flash disk. After all, the computer repair shop can install the system for 30-50 yuan at a time, so it's better to buy a USB flash disk directly, and then install it for free. And what problems are not afraid of, a key installed machine can be solved
the principle of installing windows system on USB flash disk:
it is to insert a PE system (Mini windows system, only 29m) in USB flash disk into the computer, use USB flash disk to start, and then use it as the system. It is mainly convenient and can be operated better, and more importantly, it is not easy to have problems
preparation:
1 Prepare a USB flash disk, preferably with 2.0 interface (some computers with 3.0 interface may fail to install the system), It is recommended to use more than 8G U disk to back up the data of U disk< br />2. Search "system 119" to download the pure version of PE. If your own computer is not available, you can use a friend's computer< br />3. Search "system 119" on the Internet and download the pure version of WinXP, win7 or win10 to the U disk
the following is the process of U disk installation system:
1 The installation system will clean up all the files on Disk C, and back up the important files on the computer. (scope of Disk C: desktop, my documents, etc.) the shortcut keys of notebook and desktop are different. At present, the boot hotkey of the computer is f8-f12 to start< br />2. After confirming the shortcut key of your computer, plug in the U disk and restart the computer before starting. After restarting, press the shortcut key quickly and continuously. If the startup is successful, you will jump out of an interface, select USB HDD, or the option with USB or HDD, and press the Enter key< br />3. Before entering PE, there are two situations: the computer will pop up a selection interface. If you are installing XP, choose 2003pe and enter. For other windows systems, please choose win8pe (single core and multi-core)
4 After entering the desktop, select [general ghost tool] - select [easy mode] - select [restore system]
5 Click "computer" to find "President installed U disk" in the category of removable storage devices. Click in and select the system you just copied into U disk< br />6. Select disk "C" and click "continue". At this point, wait for the progress to complete and restart the computer< br />7. Unplug the U disk and wait for the computer to deploy automatically. It takes about 15-25 minutes. After restarting from the hard disk and entering the computer, you will start to install the system, such as configuring the start menu, registering components, etc.
the whole installation process will take longer, so you must be patient
precautions:
1 It is forbidden to exit, power off and restart the system before it is installed< br />2. Backup the data of U disk and computer before installation< br />3. If you have any questions, please send me a private letter at any time<

you can search "system 119" for specific pictures, culture and ecation course on the Internet
if it is helpful for you, please adopt it and have a happy life
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750