Green Eagle Restore Protector Software Introduction
Green Eagle kernel protectors are free to collect immunity, password account protection, hacker IE defense, system repair and optimization comprehensive software.
Green Eagle Restoration Protector Software Function
Can kill the future Trojan
Protect all kinds of account passwords in real time to ensure user security
To prevent malicious modifications and any script virus, the system can be repaired. Enhance system security, optimize the system configuration
Internet cafes can set access passwords to support online batch processing, Internet cafes management channel mode calls, local area network remote investigation
Strengthen the killing machine dog virus and any variant!
How to use the green eagle restore protector
Green Eagle suspension supports self -decompression call mode
Command line: -Start Start -Stop stop -Hide hidden, support maintenance channels, remote calls, command lines
Remote example: 192.168.0.1 Remote directory CSRSS.Exe -Start -Hide
Local call: Click to start, you need to automatically protect the startup startup
Check the protection status: the client opens this program and check whether the lower left corner is in the state of protection (the server can check the log)
Scanning machine dog: Compare the system file and start whether to penetrate, please put your own system files on the "original system file comparison directory '
(Put the infected files in your own system, and the XP system files of different packaging will be different)
This software automatically scan and record the results in the log.
System file: (Yes; search for the system directory)
Explorer.exe; userInit.exe; spoolsv.exe; svchost.exe; conime.exe; ctfmon.exe; Internet.exe; csrss.exe; sess.exe; xe; smss.exe; rundll32. exe; winlogon.exe; mmc.exe;
(When scanning machine dogs, you need to put the files in the green eagle list .txt; point configuration button to customize the scan file list)
Log file: Record the startup status and the results of the dog sweeping the dog, you can set the directory through the configuration-need to be written! For example: the server log $, the default software where the software is located
After starting the protection, you can turn off this interface. The protection will be implemented in the background.
Green Eagle Restore Protector Update Log
The work of day and night can only be happier for you
Well, Mimi coaxed ~ BUG is gone!
Xiaobian of Hua Jun:
The editor of Huajun Software Park has sorted out and collected the software you may like, such as::Youyi U disk encryption softwareAs well asKabasky Comprehensive Security SoftwareAs well asBlank and SecureAs well asFirewall App blockerAs well asU disk plus deviceYou can download this site.
it works
it works
it works