Sunday, February 12, 2012
【 Weak current College 】 often following things will look manually killed Ma method
1.) check registry
See HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrenVersion and HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion, all with the "Run" at the beginning of the next jianzhiming have suspicious file name. If so, you need to delete the corresponding key value, and then delete the corresponding application.
2. check the startup group)
Trojans are hidden in the startup group if you are not very subtle, but here it is automatically loaded to run better, so I still have Trojans like here resides. Start the Group folder: C:\windows\startmenu\programs\startup, the location in the registry: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell
FoldersStartup="C:\windows\startmenu\programs\startup"。 It is necessary to pay attention to frequently check this two places!
3.) the Win.ini and System.ini is Trojans are fond of hidden places, it is necessary to pay attention to these local
For example, the Win.ini [Windows] section of the load and run back in normal circumstances is not indicated to what program, if that is going to be careful, and see what; in the System.ini [boot] section of the Shell = Explorer.exe is loaded after the Trojans and the good place which, therefore, to note here. When you look into this: Shell = Explorer.exewind0ws.exe, please note that wind0ws.exe it is possible that the Trojan server-side program! soon check.
4.) for the following files listed will diligently checks, Trojans are also likely to hide there
C:\windows\winstart.bat、C:\windows\wininit.ini、Autoexec.bat。
5.) if the exe file to start, then run this program, see the Trojan has been loaded into memory, the port is open. If so, then either the file to launch the program, either the file bundled Trojan, had to find a program, and reinstall it.
6. start the breed horse) is a way, it is only in a specific case of boot
So, usually pay more attention to your port, take a look at the running program, use this to monitor the most Trojans should be no problem.
7.) If you think the above method is too difficult, there is a simple point:
Proper use of anti-virus software, is the prevention and elimination of Trojans easiest way!
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment