2 thoughts on “How to prevent Bitcoin virus intrusion”

  1. Defense:
    The main poisoning method is a website containing malicious software accessed by most attacks from fishing emails or visits to the victim.
    Mou with unknown sources should not be opened at will. Do not click on unsafe links. Do not scan the QR code with unknown sources. Do not give permissions at will.
    The computer Xiaobai can pinch the net and avoid this limelight.
    :
    1. Firewood wall shield port 445
    2. Use Windows Update to update the system
    3. Close SMBV1 service
    3.1 suitable for running Windows 8.1 or Windows Server 2012 R2 And a higher version of the client
    For client operating system:
    In "Control Panel", click "Program", and then click "Open or close Windows function".
    In the "Windows function" window, clear the "SMB 1.0/CIFS File Sharing Support" check box, and then click "OK" to close this window.
    Restarting the system.
    3.2 For the server operating system:
    In the "server manager", click the "Management" menu, and then select "Delete Character and Function".
    In the "Function" window, clear the "SMB 1.0/CIFS
    File Sharing Support" check box, and then click "OK" to close this window.
    Restarting the system.
    3.3 Suitable for running Windows 7, Windows Server 2008 R2, Windows Vista and Windows Server 2008, modify the registry
    registry path: HKEY_LOCAL_MACHINE System Services
    new item: SMB1, value 0 (DWORD)
    The restart computer
    1: Open your ransomware interface, click Copy. Blockchain query device)
    3: Find the transaction record of the hacking address in the blockchain query device, and then select a TXID (trading hash value)
    4: Copy TXID and paste to the extortion software interface The button connect us.
    5: After the hacker sees it, you can click Check Payment.
    6: Then click Decrypt decryption file.

  2. The current prevention and control methods are:
    1. Patching of the operating system as soon as possible
    2, installation of defense software for this virus
    3, enable firewalls to prevent the external connection access of port 445 port
    4, do not easily open suspicious links and emails.

Leave a Comment