Position: Home page » Equipment » The computer changes the card, carefully digs the Trojan horse

The computer changes the card, carefully digs the Trojan horse

Publish: 2021-04-09 10:50:55
1. Can try avast antivirus, occupy small, the 360 and computer housekeeper software such as deleted, this consumption of computer performance
2. You can open the Tencent Smart Security page
and find the whole system of Yudian terminal in the proct
and then choose to apply for the use of Tencent Yudian, and then use the virus killing function to kill the virus
3. There are several obvious manifestations of mining virus in
1. The computer runs abnormally slowly
2. The computer crashes abnormally / gets stuck
3. Nothing is turned on, but the CPU occupancy rate is very high
4. The network is slow and a large number of network requests appear
4. If you are poisoned or your hardware is damaged, I advise you not to use your home computer to mine. My gtx780 is afraid to mine. If you set up an ordinary graphics card with a computing power of 200mh / s and a full load computing power of 150W, you will lose 1.49 yuan in 24 hours and 44.79 yuan in a month. If you add in the cost of a graphics card of thousands of yuan, it's even worse.
5. Methods / steps
first of all, if it is a virus written by a rookie, you can find the file path in the task manager, directly terminate the process tree, or directly find the path to delete it<

2 / 6
Second, if the other party's technology is enough, it is difficult for us to terminate the process, then we can download a computer housekeeper. Now the computer housekeeper also increases the scanning rate of mining virus, and if we find it, we can clean it directly

3 / 6
thirdly, if the computer housekeeper can't handle it, then we can check and kill avast. This program is the first in anti-virus, and it's like a sword for mining viruses<

4 / 6
Fourth, if we still suspect that there is a mining virus on the computer after using avast, we first open the process and manually put the document path to the quarantine area

5 / 6
fifthly, after we put it in the isolation area, we use avast's relaxation for analysis, and then send it to avast's staff. If we suspect that it is a mining virus, the other party will give us manual analysis. If it is, the other party will also help us delete it

6 / 6
sixthly, if we still have doubts after being determined in our profession, if it's not Daniel, then my uncle will need to install the computer again. After all, everything is clear
network experience: https://jingyan..com/article/ca41422f1d83601eae99edf3.html
thank you (≥ 8711; ≦)
6. In view of such Trojan invasion, it is recommended to install security software for protection
Download Tencent computer manager and turn on the real-time protection function

once you browse the virus webpage or download the virus software, you will give a security warning
if there is a virus invasion, you can immediately prompt and kill the virus
7. Download the latest version of 360 security guard, open the anti mining service, use Trojan horse to scan and kill.
8. Just look at the CPU usage
9. Hello: if you suspect that there is a virus in the system, it is recommended that you install the V16 version of Rising antivirus software, upgrade to the latest virus library, and then scan and kill the virus. Download address: http://pc.rising.com.cn/
10. Download or use the anti-virus and Trojan software on your computer to check and kill, but it still can't be solved. It is recommended to restore the system or reload.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750