While the Internet brings great convenience to our work and study, viruses, *s, backdoors and hacker programs also seriously affect the security of information. A common feature of these programs infect computers is that they write information in the registry to achieve purposes such as automatic operation, destruction and propagation. The following is collected by the author online, by modifying the registry to deal with viruses, *s, backdoors and hacker programs to ensure the security of personal computers.
1. Prevent the destruction of Acid Battery v1.0 *
If you find the "Explorer" key value in the right window under HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices If you find the "Explorer" key value in the window on the right, it means that you have been hit by the YAI * and delete it.
2. Prevent the destruction of YAI *s
If you find the "Batterieanzeige" key value in the right window under HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices, it means that you have hit the YAI * and delete it.
3. Prevent the damage of Eclipse 2000 *s
If you find the "bybt" key value in the right window under HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices, delete it. Then delete the key value "cksys" on the right under HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices and restart the computer.
4. Prevent the destruction of BO2000
If the "" key value is found in the right window under HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices If the key value of "" is found in the window on the right, it means that BO2000 has been hit and delete it.
5. Prevent the destruction of the beetle
If you find the "MSKernel32" key value in the right window under HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run, delete it.
6. The "interner options" in the "Tools" column in the IE menu is prohibited.
If you change the name under c:\windows\system to or another name, it will be prohibited to use. Change the name back and you can resume use.
7. Prevent the destruction of BackDoor
If you find the "Notepad" key value in the right window under HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run, delete it.
8. Prevent WinNuke's destruction
Create or modify the string "BSDUrgent" in the window on the right under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\MSTCP, and set its value to 0.
9. Prevent the destruction of KeyboardGhost
If you find this key value under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices, delete it, and find the file and file to delete them both
10. Find NetSpy Hacker
Under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run, look for the key "NetSpy" in the window on the right. If it exists, it means that the NetSpy hacker program is already installed and delete it.
11. Clean up the words and sentence information after accessing "Network Neighbors"
Under HEKY_CURRENT_USER/Network/Recent, delete the following primary key.
12. Automatic dialing when canceling login
Under HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/Network/RealModeNet, modify the "autologon" in the right window to "01 00 00 00 00".
13. Select user when canceling login
All users have been deleted, but you still have to select users when logging in. If we want to cancel the selection of users when logging in, we need to modify the "UserProfiles" value to "0" under HKEY_LOCAL_MACHINE\Network\Logon, in the window on the right, in the window on the right, change the "UserProfiles" value to "0".
14. Hide the name of the login of the user on the computer
Create a new string "DontDisplayLastUserName" in the window on the right under HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Winlogon, set the value to "1".