Software mining secretly, can the computer see it
Publish: 2021-05-03 15:14:24
1. You can open the Tencent Smart Security page
and find the whole system of Yudian terminal in the proct
and then choose to apply for the use of Tencent Yudian, and then use the virus killing function to kill the virus
and find the whole system of Yudian terminal in the proct
and then choose to apply for the use of Tencent Yudian, and then use the virus killing function to kill the virus
2. Using a closed system or an unpopular system is the simplest and most crude method, which is to some extent fruit powder welfare
to prevent hackers from mining with your machine is just like anti malware. Don't visit messy websites, Download messy software, insert picked up USB flash drives, install anti-virus software (Windows Defender on windows is very good, but it's too strict), check and kill viruses regularly, and check abnormal processes and files regularly. If a program attracts UAC, If you don't understand, try to choose no, and don't believe that "it may be misled by anti-virus software". If possible, you'd better install an isolation machine, shadow system, or create a virtual machine directly with Hyper-V of windows system for daily work
for Android phones, phones before Android 6 are unlikely to win. After all, mobile phone mining also needs good hardware. After Android 6, mobile phones have the management of the authority of each application, as long as they don't go blind root, don't install applications of unknown origin, try to download apps from the official market and rece the unnecessary authority as much as possible (you can also use "refrigerator" and "black domain" to prohibit other apps from running in the background)
for the mobile phones of apple, windows and other operating systems, I think that as long as we don't break the prison blindly and keep the system in the latest version, we can prevent the hooliganism of most apps.
to prevent hackers from mining with your machine is just like anti malware. Don't visit messy websites, Download messy software, insert picked up USB flash drives, install anti-virus software (Windows Defender on windows is very good, but it's too strict), check and kill viruses regularly, and check abnormal processes and files regularly. If a program attracts UAC, If you don't understand, try to choose no, and don't believe that "it may be misled by anti-virus software". If possible, you'd better install an isolation machine, shadow system, or create a virtual machine directly with Hyper-V of windows system for daily work
for Android phones, phones before Android 6 are unlikely to win. After all, mobile phone mining also needs good hardware. After Android 6, mobile phones have the management of the authority of each application, as long as they don't go blind root, don't install applications of unknown origin, try to download apps from the official market and rece the unnecessary authority as much as possible (you can also use "refrigerator" and "black domain" to prohibit other apps from running in the background)
for the mobile phones of apple, windows and other operating systems, I think that as long as we don't break the prison blindly and keep the system in the latest version, we can prevent the hooliganism of most apps.
3. Master Lu does have a mining function. Let's see if it's turned on. Just turn it off
4. The harm of Trojan virus can be divided into the following concentration
1. Joke virus is not destructive, but it will cause certain interference to users
2. To control the virus, you will generally control your computer, leaving a back door so that you can enter and leave your computer at will and steal your privacy
3. Number stealing: you can steal your game account< Destructive: directly destroy your computer system and files. Cause the file to be deleted, lost, infected, etc. The plot is very serious
the first and second are usually not infectious. The third and fourth are highly infectious~
1. Joke virus is not destructive, but it will cause certain interference to users
2. To control the virus, you will generally control your computer, leaving a back door so that you can enter and leave your computer at will and steal your privacy
3. Number stealing: you can steal your game account< Destructive: directly destroy your computer system and files. Cause the file to be deleted, lost, infected, etc. The plot is very serious
the first and second are usually not infectious. The third and fourth are highly infectious~
5.
Hello, 3a and AAA are the same
A + + is the best screen, AAA screen is equal to a + screen, quality control is also relatively good screen, no bad points
However, considering the quality, a + + is more cost-effective6. If it's just digging, it won't
7. Right click my computer to turn off remote control. In this case, if someone can monitor your computer, it means that you have been monitored by the God. This monitoring is very difficult, and the technical cost is very high. Most people don't monitor it
8. 15 to 20 minutes off peak, no problem. Rush hours are hard to predict.
Hot content