if I were you, I would unplug the computer at once, no matter whether the computer is broken or not, it would be faster if you unplugged it before. The other party will finish copying (copying) with .1%, then you are lucky. Because this .1% is not completed, he can't get what he wants. And 99.99% of what he gets will be a deformed package and useless.
ah. I am not a computer genius. I am not a computer genius. I only know a thing or two. Although I am a system expert at level 3, your little problem can't beat me.
I am not a computer genius! I am not a computer genius! I am not a computer genius! I am not a computer genius! I am not a computer genius! I am not a computer genius! I am not a computer genius! I am not a computer genius! I am not a computer genius! I am not a computer genius! I am not a computer genius! I'm not a computer genius! I'm not a computer genius! Hee hee, hee hee, hee hee, hee hee
ok. Press the following method in Showa. Promise you won't leak again.
my push: just set the folder where the file is located to be hidden (if the other party is implanted in the remote control terminal). My push: it is OK to set the file where the folder is located as hidden (if the other party is implanted in the remote control terminal). )
1. Choose a good firewall software. Besides, I don't want to use it. Just use 36, mainly because it is popular, easy to use and free.
Website: Just download 36 security guards in www.36.cn
You can find real-time protection in the main interface of 36 security guards, just open all the projects.
Then, we will have a computer physical examination under "Common Use".
then find "real-time protection" in "computer physical examination" under "common use" and just open all the items. Mainly to scan the computer for vulnerabilities and backdoors, as well as security checks.
2. delete unnecessary accounts from the computer. I don't need to say more about this. Hee hee, hee hee, hee hee, hee hee. It won't open. Hee hee hee hee, right click on my computer, select "Manage" in the pop-up item, and then the computer management interface will pop up. Double-click "Local Groups and Users", then click "Users", right-click an unnecessary user name, and click "Delete". There is also the account you are using, change the password. The method is as above.
I forgot to tell you something. This method will not work if the computer is in domain mode when logging in. This will not work. This is because the domain controller will initialize your system when you log in. Everything depends on the domain administrator, so it's best not to use your secret information at this time. Are you saying that you can close **** enjoyment, well, yes, you can. However, the domain administrator can get your computer to hand over the permissions with a button, so don't try to resist in the domain. Again: it's best not to use your secret information in the domain. If you really want to use it, please install a virtual machine and have a virtual system. To log in to the company's domain system, you use the virtual system of the virtual machine to log in, while the real machine can only do its own thing. If the other way around. It may not work. Because in the domain, you may not have much access, let alone another virtual machine.
3. beware of trojans and back doors, but this can be solved in the first step.
I suggest you download another 36 Trojan and check the security.
The more dangerous softwares are: server-side remote control (also called controlled terminal), keyboard recorder
4, off * * * enjoyment. Hee hee, hee hee. . . . Hee hee, here we go again. Hee hee, I really don't know. You can use the optimization master.
you can find System Security Optimization under Optimizer's System Optimization. You can choose to disable the above four disabled items.
first, disable the autorun CD and USB drive at the bottom. Just in case. But don't be afraid. After completing the above four steps, your boss can't access your computer. Your boss will not be able to access your computer. Even if he is a genius, he can't. Because neither can i. Hee hee hee hee hee hee hee hee hee hee. . . . .
5. in case he has mapped your hard disk.
this is the most dangerous. I use this method most often, because the firewall doesn't care, hehe. If he has mapped your drive, the first four steps will be in vain. Hee hee, hee hee? Hee hee hee hee! ! ! ! Hee hee hee hee. Hee hee, hee hee, hee hee.
I'm tired. Let me have a drink of water and have a rest. Then the next one, and then continue. . . . . . . . . .
the solution is to turn off * * * enjoyment.
ok. It is best to encrypt your folder with Acer Folder Encryption, which supports file encryption. So he doesn't have the password, and the fairy can't crack it. . . . . Hee hee. . . . .
6, almost. I wanted to teach you to do a little damage. But forget it, your computer IQ is too low.
7. That's a good idea to use MD 123...\ Friend. Only. If you put something in that folder, there will be an extra folder with the same name, but there is no dot after the name of that folder. If you meet me, it won't work. If I were the boss, I would copy your things. Because there is no point to go in. Even if you change your name, you can still search in which directory, if his boss is a novice hacker. Hee hee hee hee.
summary. Uh-huh. Clear your throat and have a drink. I'm going to say it. I'm going to say it. Why don't you clap? Oh-ho-ho, okay. All right, let's go all right. Let's go. It's time for dinner. Let's hurry up.
set the properties of the folder to hidden, and select the second hidden. Hide the files, too.
change your user password and delete other accounts you don't use.
close * * * enjoyment and close the security holes in the system. Prevents others from mapping drives.
encrypt the file.
hmm. I'm going to keep doing this. Let's begin. I'm hungry. . . . . . . . . . . . . . . . . . . . .