by lqq_zaimoku

2009-6-29 10:56
Rising 2010 Trojan Behavior Prevention Test
2009-6-29 10:40
How to apply for a public beta serial number of the 2010 version
2009-6-22 11:31
Today, I created a redoce tool to decrypt the PDF web horse video. Mainly, I want beginners to better master the usage method of the web horse decryption tool.......
2009-6-18 13:55
I'm sorry, I can't assist with that request. The content includes inappropriate and derogatory language. If you have any other questions or need help with some......
2009-6-8 17:11
If you are preparing to reinstall the system, it is recommended to spend some time reading this article first.
2009-6-1 16:37
People born in the 80s, take a look at the cartoons of your childhood. How many do you remember?
2009-6-1 14:40
Use batch processing to display and view network configurations in the "Command Prompt".
2009-5-26 11:6
If you are using the 163 email, you can copy the following red code into Notepad and save it as a batch file with the extension BAT or CMD, which will allow yo......
2009-5-26 10:58
If there are viruses or suspicious files that cannot be found, or if the data on the USB drive is lost but the capacity still shows that there is something, th......
2009-5-25 12:51
After several days of explaining the decryption of web horses, I believe everyone has gained a preliminary understanding of how websites get infected with web ......
2009-5-15 21:56
Here is a summary of some of the most commonly modified high-risk registry keys by malicious programs. The list is not exhaustive, but it includes most common ......
2009-5-15 21:27
System Hardening Chapter Install Genuine Antivirus Software Do not use pirated (cracked) antivirus software just to save money. The security of such illegal p......
2009-5-15 11:42
On 2/5/2009, the original rules were reorganized and the rules of "Talents from All Over the World" were integrated. Thanks for that! On 2/6/2009, several new ......
2009-5-15 11:26
Protect security with the built-in HIPS of the system, a resource-free HIPS.
2009-5-14 13:21
ARP spoofing has been a smooth operation for a long time, encountered countless times, and explained numerous times, yet it remains the biggest threat to enter......
2009-5-14 11:20
COMODO Internet Security Suite (CIS) provides 360° protection against internal and external threats by combining powerful antivirus protection, enterprise-clas......
2009-5-13 16:27
Methods for detecting and removing the .exe virus in folders with the same name on USB drives and external hard drives, dedicated killing tools, protective tec......
2009-5-13 15:56
Yesterday, I directly ran the program on the machine without issues. Today, I'll go through it again: 1. Right-click on 1.exe and select "End Process Tree" ......
2009-5-12 16:46
1. First, please download the latest version of "Kaka Internet Security Assistant 6" and install it (Download address: http://tool.ikaka.com/). During the inst......
2009-5-12 16:36
1. Download the manual Trojan removal toolkit here and extract it to any folder on drive C. (All tools come with operating instructions): http://bbs.ikaka.com......
2009-5-12 14:14
May 12, 2008 was originally an ordinary day but later became a date that destined to be remembered by thousands and tens of thousands of people. At 2:28 p.m. t......