What happens when bitcoin virus is poisoned
Yesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money
so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening
a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...
hope to catch criminals as soon as possible and give them severe punishment by law
this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers
some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code
the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus
(1) data backup and recovery measures are the important work to recover the loss in the event of blackmail, so it is necessary to make remote backup of important file data in time to prevent losses caused by virus infection
(2) make sure the firewall is on
(3) don't open unknown email or link easily.
0 how to set the firewall to prevent blackmail virus
before turning on the computer, cut off the network first, and the laptop can directly turn off the WiFi connection button, which should be available on every laptop, There is a button around the computer. Secondly, no matter the laptop or desktop, unplug the network cable
solution to bitcoin virus
backup your computer's data with U disk or mobile hard disk
companies, in particular, should often back up the solutions to bitcoin virus
download the corresponding patches of each system on the secure computer in advance. Microsoft has already issued a patch for this system, it to the USB flash disk, and then insert it into their own computer to run
download the antivirus software and the anti-virus tools provided by the antivirus software on the secure computer with the USB flash disk, Then insert your computer to run
solution to bitcoin virus
open the tool to protect your computer
solution to bitcoin virus
this is 360's document backup tool and anti infection bitcoin blackmail tool
solution to bitcoin virus
of course, many other software also have this function
solution to bitcoin virus Finally, I hope you don't click on the unknown web address or browse the unknown web page. Regular antivirus
restart the computer, press F8 to enter the safe mode - Open Tencent computer manager - anti-virus - full scan - stubborn Trojan blocker - in-depth scan - complete the restart of the computer.
Tencent computer manager is the first professional anti-virus software in China to adopt "4 + 1" core anti-virus engine,
with Tencent's self-developed second-generation anti-virus engine "eagle eye",
it takes less resources, and can eradicate stubborn viruses based on CPU virtual execution technology,
greatly improve the ability of in-depth investigation and killing.
