Reject Trojan! Please "catch ghost team" for the computer

xiaoxiao2021-03-06  71

When we are playing online games, we have caused the screen that suddenly appear horrible pictures due to the invasion of computer viruses or Trojans, which not only affects the mood of playing games, but also brings serious damage to the computer and network system. To this end, we need to ask a "ghost team" for your computer!

Software Name: Antiy Ghostbusters

Software version: 3.12 Simplified Chinese version

Software Size: 6149 KB

Download address: http://www4.skycn.com/soft/5646.html

First, software function introduction

Antiy Ghostbusters is a professional Trojan horse detection tool, called "ghost team" by netizens. The software can scan the drive, memory process, and directory, accurately detect and completely clear the programs that have security threats to the user system, such as Trojan, Backdoor, Worm (worm), Keylog (Keyboard Record), etc. . Not only can you clear the known Trojan, but also find some unknown Trojans, you can also restore the modification of the malicious web page to IE settings.

Second, Trojan Monitoring Function

After the software is installed, two shortcut icons will appear on the desktop, one is the software management program, and the other is the monitor program. Run the monitor mode, a monitor flag appears in the system taskbar, click on the three hooks to monitor the file operations of the system and processes.

In fact, this monitor is not a firewall, which does not support ICMP / IGMP protocol, but he is more advantageous than the firewall, the firewall can only manage IP and ports, but does not allow network control of specific programs. Whether it's the first-like backdoor.bo, the open-ended microphone is used to connect, or today's popular package rebound Trojans will be captured by the software's monitors. In addition, we can discover the source of viruses in the "Tools" of the software management interface and "Network Connection Status" and further preventive, as shown in the figure.

Third, Trojan scanning function

Go to the Monitor Settings Settings panel, there are three major columns "Scan", Tools, and Configuration ". The "Scan" function is used to detect and eliminate Trojans, which is also the most important feature of Antiy Ghostbusters, which can detect and clear the known and unknown malicious programs. Double-click the "Detecting Memory", which will detect all the memory processes and all threads of each process, which will discover active Trojans in memory. The "Scan Sensitive Zone" will detect the location where malicious procedures are often parasitized, and "Scan Folders" will pop up the dialog box allows the user to select the disk or directory object that you want to detect.

Fourth, network filtering function

In "Configuration" of "Monitor Settings", there are two features of "Software Settings" and "Application Network Rules Management", where "Software Settings" is used to set up Trojan's scanning mode, and the operation after scanning, These settings are very simple. In "Application Network Rules Management" is actually used to set network filtering rules, Antiy Ghostbusters is the same as Jinshan Net. For some similar viruses, as long as it is executed in the computer, the software will pop up a warning window, prompting the program being run in a suspicious state, you refuse access or accept execution, and each of your execution actions is recorded to network access In the rules, the software will automatically perform the program according to your first action, here, you can freely add, edit, and delete the restricted programs. This greatly enhances security and management.

V. IE repair function

In the "Tools" of Monitor Settings, there are many security tools, where "IE Settings" is particularly effective for many people. If you encounter some malicious web, you have changed your IE browser, and ban you from using registry The editor will restore them. You can use the "IE setting" to restore the malicious program to the partial modification of the IE and allow you to reuse the system's registry editor. Six, sharing and service management

There are some malicious programs on the network, using the way the user's hard disk sharing, the user system has a vulnerability, then stealing the user's database, and even format your hard drive. And "Shared Management" features in Tools allow users to view their shared directory (including names and paths), and can stop directory sharing to protect data security, users who are unskilled by using Windows systems, especially when This is a very convenient function when the user can't find a shared directory. When you want to stop a directory, you need to click on the item on the interface, then press "Stop Sharing" above to stop the sharing of this directory.

In addition, the Service Management feature in Tools can start, stop, suspend, or continuing service on remote and local computers, and configure the startup and fault recovery options. Unlike the Windows system's service function, this feature can see all the executable full path and file names running as a service run. This is very helpful for hand-controlled detection and system analysis of Trojans. Some malicious programs can be operated as a service. When the user can determine that a service is a malicious program is turned on, the user can first use this function to delete the relevant services of the malicious program, then process the process and files. .

转载请注明原文地址:https://www.9cbs.com/read-111244.html

New Post(0)