How to check whether there is a mining Trojan horse in your comp
and find the whole system of Yudian terminal in the proct
and then choose to apply for the use of Tencent Yudian, and then use the virus killing function to kill the virus
mining is burning graphics card, the following methods can identify their own graphics card is mine card
1: through the naked eye to identify whether the hardware is mine card, in fact, through other ways can also be measured, for example, you go to the computer to test the overclocking performance of the mine card, to compare with the official data, to test the stability of the power supply of the mine card, It can also be measured whether it is a mine card or not
2: the first point is to see if there are any dirt and oil stains on the mine card. If not, it proves that the seller may have done better treatment, or it is not the mine card. If the mine card is very dirty, nine times out of ten it is the mine card. Then we have to carry out the next operation, that is to open the mine card
3: we should pay attention to whether there is an invoice with warranty. The warranty can be guaranteed at the warranty points all over the country, which is not a mine card
extended information
how to avoid buying mine cards: try to buy new cards at the official flagship store of Taobao Jingdong, and if you want to buy second-hand graphics cards cheaply, you can't guarantee it
if the budget is really limited and you have to buy second-hand graphics cards, you should also try your best to buy them by yourself. Don't believe that Internet cafes or studios or companies go bankrupt. Most of the cards bought through this channel are mine cards. Of course, if the indivial buyer has a large number of graphics cards in his hand, please be careful. This probability is also mine cards. Finally, I hope you can avoid mine card, buy your favorite graphics card, happy game
1. The computer runs abnormally slowly
2. The computer crashes abnormally / gets stuck
3. Nothing is turned on, but the CPU occupancy rate is very high
4. The network is slow and a large number of network requests appear
first open start = > Run = > Enter "CMD" and then enter
the specific command format is: netstat - an this command can see all the IP connected with the local computer, which includes four parts: proto (connection mode), local
addres (local connection address), and Foreign
address (address to establish connection with local), state (current port state). Through the detailed information of this command, we can completely monitor the connection on the computer, so as to control the computer
many friends will find that the speed of the computer slows down one day after the system restarts, no matter how the optimization is slow, and you can't find problems with antivirus software. At this time, it is very likely that someone else has opened a special service to you after invading your computer, such as IIS information service, so that your antivirus software can't be found out. But don't worry. You can use "net
Start" to see what services are being opened in the system. If you find a service that is not open to you, you can disable it
the method is to directly enter "net start" to view the service, and then use "net stop server" to disable the service
first, enter net user in the command line to see what users are on the computer, and then use "net
user + user name" to see what permissions this user belongs to. Generally, except that the administrator is in the administrators group, others are not! If you find that a
built-in user belongs to the administrators group, it is almost certain that you have been hacked and someone else has cloned an account on your computer. Use "net
user name / del" to delete this user!
1. Recommend a-squared
Free
V3.0
Chinese green version
2 http://www.17ai.org.cn/qt/a-squared.htm
it can check and kill 1418073 kinds of Trojans, backdoors, worms, dialers, spyware and adware
2 http://www.17ai.org.cn/xt/arswp.htm
3 Chinese AVG
anti spyware
7.5.1.43
http://www.17ai.org.cn/qt/avg.htm
the number of characteristic codes in his database is 1272938
these are all green software
do not need to be installed
do not start with the system
there is no conflict with any anti-virus software
1.) check the registry
look at HKEY_ LOCAL_ Machine software Microsoft Windows curren version and HKEY_ CURRENT_ Under user \ software \ Microsoft \ windows \ CurrentVersion, is there any suspicious file name under all key value names beginning with "run". If there is, you need to delete the corresponding key value, and then delete the corresponding application
2.) check the startup group
If Trojans are hidden in the startup group, it's not very hidden, but it's really a good place for automatic loading and running, so some Trojans like to stay here. The folder corresponding to the startup group is: C: \ windows \ start menu \ programs \ startup, and its location in the registry is HKEY_ CURRENT_ USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell
Folders Startup=" C:\windows\start menu\programs\startup" Pay attention to check these two places frequently
3.); After shell = explorer.exe in the [boot] section of system.ini, it is also a good place to load Trojans, so you should also pay attention here. When you see this: shell = explorer.exe wind0ws.exe, please note that wind0ws.exe is likely to be a Trojan server program! Check it quickly
4.) check the following files frequently, and Trojans are likely to be hidden there
C: \ windows \ winstart.bat, C: \ windows \ wininit.ini, autoexec.bat
5.). If so, it means that either the file starts the Trojan horse program, or the file is bundled with the Trojan horse program, so we have to find another such program and re install it
6.) there is a way to start a Trojan horse, which is only started in a specific situation
so, you should pay more attention to your port, check the running program, and use it to monitor most Trojans
in addition, you can try the following solutions:
next software called "ice blade" from the Internet. This is a green free installation of small software, you can rest assured to use
this is the download address< br /> http://www.ttian.net/website/2005/0829/391.html
this is its detailed usage< br /> http://www.ccw.com.cn/soft/review/htm2005/20050930_ 2107z. HTM
generally speaking, Trojans and viruses are "three hidden" after they enter our machine, that is, hidden processes, hidden services and hidden files. The interested ones can kill the antivirus software by real-time monitoring! But in this blade of ice, it can't escape. Illegal processes started will be shown in red
I suggest you use Kaspersky 2005 stand-alone version, and I'm also using it. I feel that general Trojans can be found out and killed basically... Pay attention to find out, and it's better to kill them in safe mode
Kaspersky Anti virus software v5.0.391 Pro official simplified Chinese version + key
http://down1.sz1001.net/up/%D0%A1%D0%CD%C8%ED%BC%FE3_ 0810/KasperskyAnti-Viruscn.rar
http://down2.sz1001.net/up/%D0%A1%D0%CD%C8%ED%BC%FE3_ 0810/KasperskyAnti-Viruscn.rar
http://www.52z.com/soft/2730.html
1、 Detect Trojan horse through startup file
once the computer is infected with Trojan horse, it will load Trojan horse file automatically when the computer is started up. Because Trojan horse has strong concealment, most Trojan horses will change its original file name after startup
note: the
parameter "- a" is used to display all ports in the monitoring state
if the unknown port is in the listening state, and no network service operation has been carried out before, it is likely that the Trojan horse is listening on the port