1. Try Tencent computer housekeeper killing, antivirus management 2 in 1, Trojan horse killing upgraded to professional antivirus, killing more thoroughly; Integrated with jinshanyun killing engine and xiaohongsan local killing engine, the computer manager's own anti-virus engine can fully guarantee the effect of virus killing. In addition, the computer manager system repair engine can help users repair the system when system problems are detected.
2. You can install some anti-virus software on the computer, such as 360 security guard, and then keep it on all the time. In this way, you can prevent the virus from entering the computer. If it has been poisoned, use 360 first aid box to check it in the safe mode.
3. It is safe to use 360 to protect your computer and manage your Monroe on the largest digital asset platform in China
4. No
Monroe can solve these privacy problems by automatically applying confidentiality technology to every transaction. You can rest assured that you can't have a "contaminated" Monroe. This is an economic concept, called "interchangeability", historically considered to be an important feature of all currencies
5. It's a scam. Many Internet enterprises and network security enterprises believe that illegal "mining" has become a serious network security problem
with the rise of "cloud mining", the virtual machine has become the main use object of digital currency such as Monroe coin and Eli coin, and the situation of embezzling cloud computing resources for "mining" has also increased significantly; Security team monitoring found that "competing for mining machine" has become one of the important purposes of Botnet expansion; And found a new type of "mining" virus (mining XmR / Monroe), the virus spread wildly in two months, illegal "mining" profits of nearly one million yuan
extended information:
from a commercial point of view, the business model of mining can walk out of a "healthy road". As long as the "incentive money" is lower than the average cost of new users in the market, the business model will be reasonable and feasible
however, if the platform tempts users to participate with "no capital, no profit", it is worth being vigilant. The so-called "mining" opportunity provided by the platform is likely to be "digging a good hole" waiting for you to jump in
6. If you can't kill it completely, back up your data and then reload the system. Otherwise, it's really troublesome to delay your work
7. The game, program or web page you use is implanted with Trojan horse. You use your computer to secretly dig
virtual currency in the background and send it to hackers. In fact, you use your computer to help them do things. This will increase the fever of your computer, accelerate the loss of your computer, make more use of your home's electricity, and even affect the running speed of the program,
8. PS aux looks at the process number, finds the location of the virus file according to the process number, does not delete, first looks at crontab - E, whether there are abnormal tasks, and then looks at whether there are abnormal files or changes in your home directory, and whether the boot file has written tasks.... If you don't know much about Linux system, it's recommended to reload the backup data (be careful to disguise as data file). Because it's really troublesome to delete, I deleted it all afternoon
9. Iastoricon.exe is a startup item related to Intel chip driver, which is used to assist chip work. It is recommended to start at boot time