Position: Home page » Equipment » How to check whether there is a mining Trojan horse in your comp

How to check whether there is a mining Trojan horse in your comp

Publish: 2021-05-07 21:12:36
1. You can open the Tencent Smart Security page
and find the whole system of Yudian terminal in the proct
and then choose to apply for the use of Tencent Yudian, and then use the virus killing function to kill the virus
2.

mining is burning graphics card, the following methods can identify their own graphics card is mine card

1: through the naked eye to identify whether the hardware is mine card, in fact, through other ways can also be measured, for example, you go to the computer to test the overclocking performance of the mine card, to compare with the official data, to test the stability of the power supply of the mine card, It can also be measured whether it is a mine card or not

2: the first point is to see if there are any dirt and oil stains on the mine card. If not, it proves that the seller may have done better treatment, or it is not the mine card. If the mine card is very dirty, nine times out of ten it is the mine card. Then we have to carry out the next operation, that is to open the mine card

3: we should pay attention to whether there is an invoice with warranty. The warranty can be guaranteed at the warranty points all over the country, which is not a mine card

extended information

how to avoid buying mine cards: try to buy new cards at the official flagship store of Taobao Jingdong, and if you want to buy second-hand graphics cards cheaply, you can't guarantee it

if the budget is really limited and you have to buy second-hand graphics cards, you should also try your best to buy them by yourself. Don't believe that Internet cafes or studios or companies go bankrupt. Most of the cards bought through this channel are mine cards. Of course, if the indivial buyer has a large number of graphics cards in his hand, please be careful. This probability is also mine cards. Finally, I hope you can avoid mine card, buy your favorite graphics card, happy game

3. There are several obvious manifestations of mining virus in
1. The computer runs abnormally slowly
2. The computer crashes abnormally / gets stuck
3. Nothing is turned on, but the CPU occupancy rate is very high
4. The network is slow and a large number of network requests appear
4. Just look at the CPU usage
5. How to view with anti-virus software and DOC command without software
first open start = > Run = > Enter "CMD" and then enter
the specific command format is: netstat - an this command can see all the IP connected with the local computer, which includes four parts: proto (connection mode), local
addres (local connection address), and Foreign
address (address to establish connection with local), state (current port state). Through the detailed information of this command, we can completely monitor the connection on the computer, so as to control the computer

many friends will find that the speed of the computer slows down one day after the system restarts, no matter how the optimization is slow, and you can't find problems with antivirus software. At this time, it is very likely that someone else has opened a special service to you after invading your computer, such as IIS information service, so that your antivirus software can't be found out. But don't worry. You can use "net
Start" to see what services are being opened in the system. If you find a service that is not open to you, you can disable it
the method is to directly enter "net start" to view the service, and then use "net stop server" to disable the service
first, enter net user in the command line to see what users are on the computer, and then use "net
user + user name" to see what permissions this user belongs to. Generally, except that the administrator is in the administrators group, others are not! If you find that a
built-in user belongs to the administrators group, it is almost certain that you have been hacked and someone else has cloned an account on your computer. Use "net
user name / del" to delete this user!
6. How to find out if there is a Trojan horse and clear it
1. Recommend a-squared
Free
V3.0
Chinese green version
2 http://www.17ai.org.cn/qt/a-squared.htm
it can check and kill 1418073 kinds of Trojans, backdoors, worms, dialers, spyware and adware
2 http://www.17ai.org.cn/xt/arswp.htm
3 Chinese AVG
anti spyware
7.5.1.43
http://www.17ai.org.cn/qt/avg.htm
the number of characteristic codes in his database is 1272938
these are all green software
do not need to be installed
do not start with the system
there is no conflict with any anti-virus software
7. There is a way: in the computer to find a folder, general folder only file name, no other things in the above. If the end of the file name is. Exe, it may be a Trojan horse. If you don't remember, click in again (it usually disguises as an executable program). If the folder or other documents inside are modified to the EXE format, it is likely to be a Trojan horse In addition to applications, there is another way: start the task manager. Under normal circumstances, if you do not run any programs, the CPU load will be very low. If the CPU does not run any programs, the CPU load is still very high, then it is possible that you have been Trojan horse. Hope to help you!
8. Because the upgrade of antivirus software is slower than the appearance of Trojan horse in most cases, it is very necessary to learn to check and kill by hand. The method is:

1.) check the registry
look at HKEY_ LOCAL_ Machine software Microsoft Windows curren version and HKEY_ CURRENT_ Under user \ software \ Microsoft \ windows \ CurrentVersion, is there any suspicious file name under all key value names beginning with "run". If there is, you need to delete the corresponding key value, and then delete the corresponding application
2.) check the startup group
If Trojans are hidden in the startup group, it's not very hidden, but it's really a good place for automatic loading and running, so some Trojans like to stay here. The folder corresponding to the startup group is: C: \ windows \ start menu \ programs \ startup, and its location in the registry is HKEY_ CURRENT_ USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell
Folders Startup=" C:\windows\start menu\programs\startup" Pay attention to check these two places frequently
3.); After shell = explorer.exe in the [boot] section of system.ini, it is also a good place to load Trojans, so you should also pay attention here. When you see this: shell = explorer.exe wind0ws.exe, please note that wind0ws.exe is likely to be a Trojan server program! Check it quickly
4.) check the following files frequently, and Trojans are likely to be hidden there
C: \ windows \ winstart.bat, C: \ windows \ wininit.ini, autoexec.bat
5.). If so, it means that either the file starts the Trojan horse program, or the file is bundled with the Trojan horse program, so we have to find another such program and re install it
6.) there is a way to start a Trojan horse, which is only started in a specific situation
so, you should pay more attention to your port, check the running program, and use it to monitor most Trojans

in addition, you can try the following solutions:
next software called "ice blade" from the Internet. This is a green free installation of small software, you can rest assured to use
this is the download address< br /> http://www.ttian.net/website/2005/0829/391.html
this is its detailed usage< br /> http://www.ccw.com.cn/soft/review/htm2005/20050930_ 2107z. HTM
generally speaking, Trojans and viruses are "three hidden" after they enter our machine, that is, hidden processes, hidden services and hidden files. The interested ones can kill the antivirus software by real-time monitoring! But in this blade of ice, it can't escape. Illegal processes started will be shown in red

I suggest you use Kaspersky 2005 stand-alone version, and I'm also using it. I feel that general Trojans can be found out and killed basically... Pay attention to find out, and it's better to kill them in safe mode
Kaspersky Anti virus software v5.0.391 Pro official simplified Chinese version + key

http://down1.sz1001.net/up/%D0%A1%D0%CD%C8%ED%BC%FE3_ 0810/KasperskyAnti-Viruscn.rar
http://down2.sz1001.net/up/%D0%A1%D0%CD%C8%ED%BC%FE3_ 0810/KasperskyAnti-Viruscn.rar
http://www.52z.com/soft/2730.html
9.

1、 Detect Trojan horse through startup file

once the computer is infected with Trojan horse, it will load Trojan horse file automatically when the computer is started up. Because Trojan horse has strong concealment, most Trojan horses will change its original file name after startup


note: the

parameter "- a" is used to display all ports in the monitoring state

if the unknown port is in the listening state, and no network service operation has been carried out before, it is likely that the Trojan horse is listening on the port

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750