I didn't expect to be pitted by a sharing information on the network disk, and I got the LPK virus with good technical content. How to completely shield?
In fact, LPK virus is a rogue program that uses WIN system and executable programs to mount lpk.dll files, because it uses self-starting service script tasks and other self-complex loading caches to create a vicious circle, and finally the executable programs will exist wherever they go. Exe exists. Do not need any anti-virus software to kill, enter the safe mode or DOS, these are omitted, because the steps are more troublesome, the general non-computer technicians may miss some. Through the analysis of the content of the problem, we can see that the virus needs a small step to get rid of the future trouble forever, that is, the virus residue in the system directory. Since it is mentioned that the virus file has a date as evidence, and the visibility of the hidden file protected by the system is turned on, you can look at the file by date. Then compare the date of the non-systematic lpk.dll document? Such a simple question! As long as you see all the files on the same date deleted, it's OK! In particular, let's see if there is a file affected. Vbe system. If so, don't hesitate to delete it. From then on, the world is peaceful, because the virus depends on it, thus cutting it constantly, making it more chaotic! LPK, low-level virus!