How to prevent computers from being mined
Publish: 2021-05-11 17:55:50
1. You can apply to use Tencent Yudian on Tencent Smart Security page, and then use the vulnerability repair function on this software to directly detect and repair the computer vulnerabilities
2. It's not difficult to install Tencent computer manager, which has fully intercepted these websites containing mining programs. In addition, don't open websites of unknown origin at will. At the same time, keep the security software open, and timely intercept malicious behaviors of dangerous websites. It is said that hundreds of websites, led by pornographic websites, have been implanted with mining programs. Once you click to visit them, computers will be occupied with a lot of resources to "help" lawbreakers to mine virtual currencies such as monroebi,
3. Have you met the Pegasus website?
try Tencent computer housekeeper to protect the Internet environment. Relying on Tencent's huge proct ecological chain and user base, Tencent computer housekeeper has established the world's largest malicious website database, which is updated in real time through the cloud reporting platform. It has been at the leading level in the world in the fields of anti fraud and anti phishing, Therefore, it can achieve more accurate URL security detection in QQ platform, and prevent users from property or account loss caused by careless access to malicious URLs
try Tencent computer housekeeper to protect the Internet environment. Relying on Tencent's huge proct ecological chain and user base, Tencent computer housekeeper has established the world's largest malicious website database, which is updated in real time through the cloud reporting platform. It has been at the leading level in the world in the fields of anti fraud and anti phishing, Therefore, it can achieve more accurate URL security detection in QQ platform, and prevent users from property or account loss caused by careless access to malicious URLs
4. Using a closed system or an unpopular system is the simplest and most crude method, which is to some extent fruit powder welfare
to prevent hackers from mining with your machine is just like anti malware. Don't visit messy websites, Download messy software, insert picked up USB flash drives, install anti-virus software (Windows Defender on windows is very good, but it's too strict), check and kill viruses regularly, and check abnormal processes and files regularly. If a program attracts UAC, If you don't understand, try to choose no, and don't believe that "it may be misled by anti-virus software". If possible, you'd better install an isolation machine, shadow system, or create a virtual machine directly with Hyper-V of windows system for daily work
for Android phones, phones before Android 6 are unlikely to win. After all, mobile phone mining also needs good hardware. After Android 6, mobile phones have the management of the authority of each application, as long as they don't go blind root, don't install applications of unknown origin, try to download apps from the official market and rece the unnecessary authority as much as possible (you can also use "refrigerator" and "black domain" to prohibit other apps from running in the background)
for the mobile phones of apple, windows and other operating systems, I think that as long as we don't break the prison blindly and keep the system in the latest version, we can prevent the hooliganism of most apps.
to prevent hackers from mining with your machine is just like anti malware. Don't visit messy websites, Download messy software, insert picked up USB flash drives, install anti-virus software (Windows Defender on windows is very good, but it's too strict), check and kill viruses regularly, and check abnormal processes and files regularly. If a program attracts UAC, If you don't understand, try to choose no, and don't believe that "it may be misled by anti-virus software". If possible, you'd better install an isolation machine, shadow system, or create a virtual machine directly with Hyper-V of windows system for daily work
for Android phones, phones before Android 6 are unlikely to win. After all, mobile phone mining also needs good hardware. After Android 6, mobile phones have the management of the authority of each application, as long as they don't go blind root, don't install applications of unknown origin, try to download apps from the official market and rece the unnecessary authority as much as possible (you can also use "refrigerator" and "black domain" to prohibit other apps from running in the background)
for the mobile phones of apple, windows and other operating systems, I think that as long as we don't break the prison blindly and keep the system in the latest version, we can prevent the hooliganism of most apps.
5. Crime tools: all the articles used by criminals to commit crimes, including all kinds of weapons or tools
using a computer to plant a Trojan horse and use the computer to attack and obtain other people's information is also regarded as a crime tool
there is another possibility. In a computer, the behavior of embedding Trojan horse, obtaining the computer information, and the U disk of embedding Trojan horse will be regarded as a crime tool. Computers, on the other hand, are not tools of crime
judgment should be made according to the specific situation.
using a computer to plant a Trojan horse and use the computer to attack and obtain other people's information is also regarded as a crime tool
there is another possibility. In a computer, the behavior of embedding Trojan horse, obtaining the computer information, and the U disk of embedding Trojan horse will be regarded as a crime tool. Computers, on the other hand, are not tools of crime
judgment should be made according to the specific situation.
6. Change the computer (manual funny)
antivirus, if you can't kill it, you can check the program with high CPU or GPU occupation and manually delete it. If you can't, you can't change the hard disk (the disk where the mining program is located)... Change the computer
antivirus, if you can't kill it, you can check the program with high CPU or GPU occupation and manually delete it. If you can't, you can't change the hard disk (the disk where the mining program is located)... Change the computer
7. 4 try Tencent computer housekeeper killing, the second generation engine eagle eye antivirus engine
, which greatly reces the occupied system space, and supports cloud killing and Trojan horse killing. More comprehensive and thorough
turn on computer Housekeeper / lightning antivirus / full scan / complete. Restart the computer after antivirus, because many viruses can only be cleared after restarting the computer
after poisoning, the computer often fails to power on normally. When restarting the computer, press F8 all the time to enter the advanced option, and then enter the computer system from the network security mode. The first thing after boot is to carry out anti-virus treatment immediately.
, which greatly reces the occupied system space, and supports cloud killing and Trojan horse killing. More comprehensive and thorough
turn on computer Housekeeper / lightning antivirus / full scan / complete. Restart the computer after antivirus, because many viruses can only be cleared after restarting the computer
after poisoning, the computer often fails to power on normally. When restarting the computer, press F8 all the time to enter the advanced option, and then enter the computer system from the network security mode. The first thing after boot is to carry out anti-virus treatment immediately.
8. Yes, this is a real financial fraud group! The company has been advertising on its recruitment website for many years. Only companies with impure motives can attract customers in the name of recruitment. The means can be described as insidious. Once they fall into the trap, they are often empty of money and responsibilities and repent
take another look at their means of collecting money. On the surface, under the banner of foreign exchange margin trading (leverage, but dare not admit futures trading), they use exaggerated high returns as t to lure impulsive and untrue job seekers to open an account. Today, the amount ranges from 60000 to 350000, In this way, the ill gotten gains will continue to flow into their private market. Then the so-called manager will try every means to make you lose money in the transaction, because only in this way can their commission from your account amount fall into their pocket 100%! Because these so-called managers have no fixed salary
- - none of the people in this Indonesian company is true, because letting your money rot on their plate forever is the profit model of this fraud company!!! I would like to remind the kind-hearted domestic compatriots job seekers not to be blinded by rhetoric, because money is not so easy to earn
take another look at their means of collecting money. On the surface, under the banner of foreign exchange margin trading (leverage, but dare not admit futures trading), they use exaggerated high returns as t to lure impulsive and untrue job seekers to open an account. Today, the amount ranges from 60000 to 350000, In this way, the ill gotten gains will continue to flow into their private market. Then the so-called manager will try every means to make you lose money in the transaction, because only in this way can their commission from your account amount fall into their pocket 100%! Because these so-called managers have no fixed salary
- - none of the people in this Indonesian company is true, because letting your money rot on their plate forever is the profit model of this fraud company!!! I would like to remind the kind-hearted domestic compatriots job seekers not to be blinded by rhetoric, because money is not so easy to earn
9. 1 install anti-virus software such as velvet security software
2 when the mine is mined, you can install the system again to solve the problem
2 when the mine is mined, you can install the system again to solve the problem
Hot content