360 reverse mining protection function extends safety
Publish: 2021-04-21 13:16:18
1. Lmy3xg invitation code has 99 times left
2. Hello friend, if you turn off the 360 protection function, of course your computer can no longer be effectively protected. I suggest you don't turn it off. I hope my answer will help you.
3. How to close ie:
ie - tools - Internet Options - Advanced
just tick "allow active content to run in files on my computer" in the security category
it's really not good. It's recommended to change the browser, Google and Internet
ie - tools - Internet Options - Advanced
just tick "allow active content to run in files on my computer" in the security category
it's really not good. It's recommended to change the browser, Google and Internet
4. 360 security guard has many functions such as checking and killing Trojans, cleaning plug-ins, repairing loopholes, computer physical examination, etc., and has created the "Trojan firewall" function. It is the most powerful, effective and popular necessary security software for Internet users. Because it is easy to use, it is good to use Hukou tablet
5. Patches are just like patching when clothes are rotten. People can't write programs perfectly, so the software will inevitably have bugs. Patches are specially made to fix these bugs, because the original released software has defects. After discovery, another small program is compiled to make it perfect. This kind of small program is commonly known as patch. The patch is made by the original author of the software. You can visit the website to download the patch
there are several patches as follows:
1. It is a "high-risk vulnerability" patch that users really need. This kind of patch must be made
2. It is a "feature update" patch that users can choose to install. This kind of patch users can choose whether to patch or not
3. There is a big hidden danger of "not recommended to install" patches, which will bring greater risks to the computer after installation. This kind of patch is like medicine. It's not that the more you eat, the better. Installing unnecessary patches is like taking the wrong medicine. It not only wastes system resources, but also may cause system crash
4: an expired patch is a patch replaced by the latest patch released by Microsoft, which is called an expired patch by 360 guard
the rule of Microsoft patch replacement: update the patch of the same file under the same operating system, and only prompt the KB number of the latest patch
to make it easy to understand, we temporarily call the latest patch the replacer, and the old patch replaced by the latest patch the replacer. Then the detection rules of 360 vulnerability repair for expired patches are as follows:
1. When the replacer (i.e. the latest patch) needs to be installed, the replacer (i.e. the old patch) belongs to the expired patch regardless of whether it has been installed in the user's system, When the replacement (i.e. the latest patch) does not need to be installed, the replaced (i.e. the old patch) does not belong to the expired patch, because they do not need to be installed on the current user's system.
the detection of expired patches is affected by the replacement (i.e. the latest patch), After installing some new patches, it is required to restart the system in order to be applied. Therefore, when users do not restart the system after installing the latest patches, sometimes it will cause inaccurate detection of expired patches. In this case, please restart the system to return to normal
hope to be useful to you
there are several patches as follows:
1. It is a "high-risk vulnerability" patch that users really need. This kind of patch must be made
2. It is a "feature update" patch that users can choose to install. This kind of patch users can choose whether to patch or not
3. There is a big hidden danger of "not recommended to install" patches, which will bring greater risks to the computer after installation. This kind of patch is like medicine. It's not that the more you eat, the better. Installing unnecessary patches is like taking the wrong medicine. It not only wastes system resources, but also may cause system crash
4: an expired patch is a patch replaced by the latest patch released by Microsoft, which is called an expired patch by 360 guard
the rule of Microsoft patch replacement: update the patch of the same file under the same operating system, and only prompt the KB number of the latest patch
to make it easy to understand, we temporarily call the latest patch the replacer, and the old patch replaced by the latest patch the replacer. Then the detection rules of 360 vulnerability repair for expired patches are as follows:
1. When the replacer (i.e. the latest patch) needs to be installed, the replacer (i.e. the old patch) belongs to the expired patch regardless of whether it has been installed in the user's system, When the replacement (i.e. the latest patch) does not need to be installed, the replaced (i.e. the old patch) does not belong to the expired patch, because they do not need to be installed on the current user's system.
the detection of expired patches is affected by the replacement (i.e. the latest patch), After installing some new patches, it is required to restart the system in order to be applied. Therefore, when users do not restart the system after installing the latest patches, sometimes it will cause inaccurate detection of expired patches. In this case, please restart the system to return to normal
hope to be useful to you
6. What is a nuclear engine? Kernel engine is a client protection engine based on Intel / AMD CPU hardware virtualization technology (VT Technology). At present, it is only used for the main protection function. Later, it can also be used for other client security functions. Kernel engine is currently used to enhance & quot; Win7 / 8 / 8.1" Active defense function on 64 bit system. 1. What is the requirement to turn on hardware virtualization protection engine 1) CPU needs to support hardware virtualization mechanism: Intel VT and AMD-V mechanism, and hardware virtualization support is turned on in BIOS or UEFI; Intel users can refer to this link: http://ark.intel.com/zh-cn/procts/virtualizationtechnology Check whether your CPU supports it; AMD-V is supported by other amd CPUs except for "Shanlong sampron processor"; To open hardware virtualization support, please refer to this link: http://bbs.360safe.com/thread-2181954-1-1.html (2) Other operations must be & quot; Win7 Win8 Win8.1" 64 bit system. The above two conditions must be satisfied at the same time. 2. How to start hardware virtualization protection engine 1) After the 360 security guard is installed, click "security protection center" on the right side of the guard's main interface, click the "VT" sign in the upper right corner, and manually turn on the switch. After the switch is turned on, restart the system again, and the protection engine will take effect normally. 3. Why is there no "VT" sign in the security protection center of our guard? Hardware virtualization protection engine is based on the hardware virtualization mechanism of Intel / AMD CPU. If your CPU is too old, it does not support hardware virtualization protection, so it will not be displayed. 4. When the hardware virtualization protection engine is turned on, the windows of virtual machine software such as VMware and VirtualBox will pop up? This is normal because both hardware virtualization protection engine and virtual machine software use hardware virtualization technology, while most software can only use hardware virtualization technology alone, not at the same time. If you need to use these virtual machines, you can only shut down the hardware virtualization protection engine of 360 security guard and restart the system.
7.
Methods: the security protection function can be turned off without enabling the protection tracking privacy protection mode. The specific setting steps are as follows:
1. Find the 360 speed browser on the desktop and click to open it
8. You can set it in the 360 antivirus software, you can not automatically enter the "no disturb mode". Open the 360 antivirus settings, select "no disturb settings", cancel the check box under "automatically enter no disturb mode", and confirm. However, when 360 antivirus enters no disturb mode, real-time protection will not be turned off, but the protection level will be reced, Delay upgrading the virus library to protect the system. If other system security software is installed, the real-time protection of 360 antivirus may be shut down
generally, this is to improve the quality of watching movies and playing games. The other is the influence of some viruses and plug-ins
generally, this is to improve the quality of watching movies and playing games. The other is the influence of some viruses and plug-ins
9. The 360 real-time protection function has
malicious comments plug-in intrusion interception
webpage leak proof and phishing website interception
U disk virus immunity
LAN interception
system key position protection
most of the functions of 360 security guard and Jinshan are not repeated, so it's better to start the security guard real-time protection, if the performance of the machine is not good, according to the actual needs!
malicious comments plug-in intrusion interception
webpage leak proof and phishing website interception
U disk virus immunity
LAN interception
system key position protection
most of the functions of 360 security guard and Jinshan are not repeated, so it's better to start the security guard real-time protection, if the performance of the machine is not good, according to the actual needs!
10. Hello friend, you'd better uninstall 360 security guard, clean up its resial files and registry with cleaning software, and then download and install the latest version of 360 security guard on 360 official website.
Hot content