Shut down mining Trojan will run
Publish: 2021-04-22 13:30:00
1. Can try avast antivirus, occupy small, the 360 and computer housekeeper software such as deleted, this consumption of computer performance
2. The premise for mining to have profits is that the profits of bitcoin from mining can carry out all costs, such as mining machinery, electricity charges, maintenance fees, etc. if you can't carry them out, it is actually a loss and can't generate profits. It's better to buy money directly.
3. The power supply has been unplugged, the host can not run, of course, it does not work.
4. Trojan virus can forcibly control the computer, but it can't be done after unplugging the network cable
so if your computer is found to be forcibly controlled, you can forcibly unplug the network cable
in addition, it is recommended that you download a computer housekeeper from Tencent computer housekeeper's official website
the computer housekeeper has 16 layers of real-time protection function, in which the system's bottom layer protection, It includes the protection against hacker invasion, which can avoid being remotely controlled by hackers and protect computer security.
so if your computer is found to be forcibly controlled, you can forcibly unplug the network cable
in addition, it is recommended that you download a computer housekeeper from Tencent computer housekeeper's official website
the computer housekeeper has 16 layers of real-time protection function, in which the system's bottom layer protection, It includes the protection against hacker invasion, which can avoid being remotely controlled by hackers and protect computer security.
5. Hello,
the system stops running after the mobile phone is turned off. Of course, Trojan won't be attacked.
in order to ensure the safe and stable operation of the mobile phone, you must install anti-virus software. There are so many viruses in the Android system now that you are caught accidentally. It is strongly recommended to download Tencent mobile housekeeper from appbo, Powerful anti-virus ability can effectively protect your mobile phone
hope to help you, hope to adopt
Tencent computer housekeeper enterprise platform: http://..com/c/guanjia/
the system stops running after the mobile phone is turned off. Of course, Trojan won't be attacked.
in order to ensure the safe and stable operation of the mobile phone, you must install anti-virus software. There are so many viruses in the Android system now that you are caught accidentally. It is strongly recommended to download Tencent mobile housekeeper from appbo, Powerful anti-virus ability can effectively protect your mobile phone
hope to help you, hope to adopt
Tencent computer housekeeper enterprise platform: http://..com/c/guanjia/
6. So far, Trojan programs are running to work, do not run will not attack, and some viruses are timing type, but whether it is trojan, or virus, if there is no danger in the compressed package, rest assured, because I use the compressed package to save some viruses to be studied
7. It is without rhyme or reason. It is without rhyme or reason. It is too laggy. Computer users can be poisoned. 1, the mouse will move around 2, and the account will be stolen. The QQ will be stolen for no reason. The location of the computer is not 3. The system will suddenly become very stuck. The response is very slow. 4, no , and the hard disk lamp has been flashing. It is like ing things 5. Without any reason, the computer will turn on its own or shut down its own A. The normal process of the system is: svchost.exe, Explorer.exe, iexplore.exe, winlogon.exe, etc. you may have found such processes in the system: svch0st.exe, explore.exe, iexplorer.exe, winlogin.exe. Do you see the difference? This is a trick often used by viruses to confuse users' eyes. Usually, they change the normal process name o to 0, l to I, I to j in the system, and then they become their own process name, only a word difference, but the meaning is completely different. Or one more letter or one less letter, for example, explorer.exe and iexplore.exe are easily confused, and the emergence of another iexplorer.exe is even more confusing. If the user is not careful, generally ignored, the process of the virus escaped. B. If the user is careful, then the above move is useless, and the virus will be punished. As a result, the virus also learned to be smart and learned how to steal a beam and exchange a pillar. If the name of a process is svchost.exe, it is the same as the name of a normal system process. Is this process safe? No, in fact, it just takes advantage of the defect that the task manager can't view the corresponding executable file of the process. We know that the executable file corresponding to svchost.exe process is located in "C: & # 92; WINDOWS\ System 32 (Windows 2000 is C: 92; WINNT\ If the virus copies itself to "C: 92; WINDOWS\” After running, what we see in the "task manager" is also svchost. Exe, which is the same as the normal system process. Can you tell which one is the process of the virus? C. In addition to the two methods mentioned above, the virus also has an ultimate big method -- resurrecting the dead. The so-called "resurrection from the dead" is that the virus uses the process insertion technology to insert the DLL file needed by the virus into the normal system process. On the surface, there is no suspicious situation. In fact, the system process has been controlled by the virus. Unless we use professional process detection tools, it is very difficult to find the hidden virus
hope to adopt
hope to adopt
8. It is without rhyme or reason. It is without rhyme or reason.
1 is too laggy. It will float
2, and the account will be stolen for no reason. The QQ shows the wrong location of
3, and the system will suddenly become very stuck. The computer will react slowly.
4 will not anything, and the hard disk lights will always flash. The normal processes in the system are: svchost.exe, explorer.exe, iexplore.exe, winlogon.exe, etc. you may have found such processes in the system: svch0st.exe, explorer.exe, iexplorer.exe, winlogin.exe. Do you see the difference? This is a trick often used by viruses to confuse users' eyes. Usually, they change the normal process name o to 0, l to I, I to j in the system, and then they become their own process name, only a word difference, but the meaning is completely different. Or one more letter or one less letter, for example, explorer.exe and iexplore.exe are easily confused, and the emergence of another iexplorer.exe is even more confusing. If the user is not careful, generally ignored, the process of the virus escaped
b, if the user is careful, the above move will not work, and the virus will be punished. As a result, the virus also learned to be smart and learned how to steal a beam and exchange a pillar. If the name of a process is svchost.exe, it is the same as the name of a normal system process. Is this process safe? No, in fact, it just takes advantage of the defect that the task manager can't view the corresponding executable file of the process. We know that the executable file corresponding to svchost.exe process is located in "C: & # 92; WINDOWS\ System 32 (Windows 2000 is C: 92; WINNT\ If the virus copies itself to "C: 92; WINDOWS\” After running, what we see in the "task manager" is also svchost. Exe, which is the same as the normal system process. Can you tell which one is the process of the virus
C. In addition to the two methods mentioned above, the virus also has the ultimate method of resurrection. The so-called "resurrection from the dead" is that the virus uses the process insertion technology to insert the DLL file needed by the virus into the normal system process. On the surface, there is no suspicious situation. In fact, the system process has been controlled by the virus. Unless we use professional process detection tools, it is very difficult to find the hidden virus
hope to adopt
1 is too laggy. It will float
2, and the account will be stolen for no reason. The QQ shows the wrong location of
3, and the system will suddenly become very stuck. The computer will react slowly.
4 will not anything, and the hard disk lights will always flash. The normal processes in the system are: svchost.exe, explorer.exe, iexplore.exe, winlogon.exe, etc. you may have found such processes in the system: svch0st.exe, explorer.exe, iexplorer.exe, winlogin.exe. Do you see the difference? This is a trick often used by viruses to confuse users' eyes. Usually, they change the normal process name o to 0, l to I, I to j in the system, and then they become their own process name, only a word difference, but the meaning is completely different. Or one more letter or one less letter, for example, explorer.exe and iexplore.exe are easily confused, and the emergence of another iexplorer.exe is even more confusing. If the user is not careful, generally ignored, the process of the virus escaped
b, if the user is careful, the above move will not work, and the virus will be punished. As a result, the virus also learned to be smart and learned how to steal a beam and exchange a pillar. If the name of a process is svchost.exe, it is the same as the name of a normal system process. Is this process safe? No, in fact, it just takes advantage of the defect that the task manager can't view the corresponding executable file of the process. We know that the executable file corresponding to svchost.exe process is located in "C: & # 92; WINDOWS\ System 32 (Windows 2000 is C: 92; WINNT\ If the virus copies itself to "C: 92; WINDOWS\” After running, what we see in the "task manager" is also svchost. Exe, which is the same as the normal system process. Can you tell which one is the process of the virus
C. In addition to the two methods mentioned above, the virus also has the ultimate method of resurrection. The so-called "resurrection from the dead" is that the virus uses the process insertion technology to insert the DLL file needed by the virus into the normal system process. On the surface, there is no suspicious situation. In fact, the system process has been controlled by the virus. Unless we use professional process detection tools, it is very difficult to find the hidden virus
hope to adopt
9. Some viruses can attack BIOS, and the virus still resides in CMOS chip after shutdown, because CMOS is battery powered. The virus on the hard disk will not continue to run after shutdown.
10. I would like to ask the master: computer shutdown status will be in the virus and Trojan horse
Master said... Certainly not... Rest assured···
Master said... Certainly not... Rest assured···
Hot content