下载https://github.com/robertdavidgraham/rdpscan/releases
最新版本
然后运行rdpscan扫描
扫描单ip rdpscan 192.168.1.1 扫描IP段 rdpscan 192.168.1.1-192.168.1.255 VULNERABLE 表示发现漏洞 SAFE表示安全 CredSSP/NLA 表示启动用了安全身份证验证的远程,并不表示漏洞不存在 UNKNOWN 表示未知
…
下载https://github.com/robertdavidgraham/rdpscan/releases
最新版本
然后运行rdpscan扫描
扫描单ip rdpscan 192.168.1.1 扫描IP段 rdpscan 192.168.1.1-192.168.1.255 VULNERABLE 表示发现漏洞 SAFE表示安全 CredSSP/NLA 表示启动用了安全身份证验证的远程,并不表示漏洞不存在 UNKNOWN 表示未知
…
Norton Power Eraser
https://support.norton.com/sp/en/us/home/current/solutions/kb20100824120155EN
https://support.norton.com/sp/static/external/NPE/5.3/prod/en/NPE.exe
360系统急救箱
http://www.360.cn/superfirstaid/index.html
rootkitremover
https://www.mcafee.com/enterprise/en-us/downloads/free-tools/rootkitremover.html
tdsskiller
https://usa.kaspersky.com/downloads/tdsskiller
ylx.me/td
Trend Micro RootkitBuster
https://www.trendmicro.com/download/rbuster.asp
参考
http://155.223.31.253/archive/index.php?d=AntiReklam_Programlari/Rootkits…
fsutil hardlink list c:\windows\system32\amsi.dll \Windows\System32\amsi.dll \Windows\WinSxS\amd64_microsoft-antimalware-scan-interface_31bf3856ad364e35_10.0.17763.1_none_477a43df2f3d6453\amsi.dll
…
适合谷歌火狐带有脚本管理如油猴子Tampermonkey
from http://bbs.pcbeta.com/viewthread-1529903-1-1.html
// ==UserScript== // @name DZ_Block // @author aa65535 // @version 1.03 // @lastmodified 2014-07-26 11:14:54 // @run-at document-end // @noframes yes // @description 屏蔽指定用户的帖子 // @namespace Rin Satsuki // @updateURL http://aa65535.com/public/userscript/dz_block.meta.js // @downloadURL http://aa65535.com/public/userscript/dz_block.user.js // @include http://*/*…
这些只是给我自己备用,如果中了勒索病毒,只能杀毒,数据恢复无解
有更新功能 推荐
https://www.emsisoft.com/en/home/emergencykit/ [推荐]
https://dl.emsisoft.com/EmsisoftEmergencyKit.exe
https://www.comodo.com/business-security/network-protection/cleaning-essentials.php
无更新功能
https://www.kaspersky.com/downloads/thank-you/free-virus-removal-tool
https://devbuilds.s.kaspersky-labs.com/devbuilds/KVRT/latest/full/KVRT.exe
https://www.kaspersky.com.cn/downloads/thank-you/free-virus-removal-tool
https://devbuilds.s.kaspersky-labs.com/devbuilds/KVRT/latest/full/KVRT.exe
无更新功能
https://free.drweb.cn/download+cureit+free/
https://free.drweb.cn/download+cureit/gr/?lng=en…
1.打开about:studies,进入更新选项,Firefox 数据收集与使用下面勾上允许 Firefox 向 Mozilla 发送技术信息及交互数据,再勾上允许 Firefox 安装并运行一些实验项目,等待恢复
蓝奏云地址 https://www.lanzous.com/i4125ah
3.更新到最新版本
官方FTP链接
win32
https://ftp.mozilla.org/pub/fire … 0Setup%2066.0.4.exe
win64
https://ftp.mozilla.org/pub/fire … 0Setup%2066.0.4.exe…
C:\ProgramData\GlassWire\service
备份上面这个目录就可以了
实际好像只需要glasswire.conf和glasswire.db…
1. src/gz openwrt_koolshare_mod_core https://openwrt.proxy.ustclug.org/snapshots/targets/x86/64/packages src/gz openwrt_koolshare_mod_base https://openwrt.proxy.ustclug.org/snapshots/packages/x86_64/base src/gz openwrt_koolshare_mod_luci https://openwrt.proxy.ustclug.org/snapshots/packages/x86_64/luci src/gz openwrt_koolshare_mod_packages https://openwrt.proxy.ustclug.org/snapshots/packages/x86_64/packages src/gz openwrt_koolshare_mod_routing https://openwrt.proxy.ustclug.org/snapshots/packages/x86_64/routing src/gz openwrt_koolshare_mod_telephony https://openwrt.proxy.ustclug.org/snapshots/packages/x86_64/telephony 2.官方 src/gz openwrt_koolshare_mod_core https://downloads.openwrt.org/snapshots/targets/x86/64/packages src/gz openwrt_koolshare_mod_base https://downloads.openwrt.org/snapshots/packages/x86_64/base src/gz openwrt_koolshare_mod_luci https://downloads.openwrt.org/snapshots/packages/x86_64/luci src/gz openwrt_koolshare_mod_packages https://downloads.openwrt.org/snapshots/packages/x86_64/packages src/gz openwrt_koolshare_mod_routing https://downloads.openwrt.org/snapshots/packages/x86_64/routing/ src/gz openwrt_koolshare_mod_telephony https://downloads.openwrt.org/snapshots/packages/x86_64/telephony/ 3.新加坡 适合联通…
光猫买过来原厂是移动的,因为我不需要下发配置,老的光猫有配置信息
1.输入http://192.168.1.1/system.cgi?telnet 开telnet (中国移动超级账户用户名:CMCCAdmin 密码:aDm8H%MdA)
2.telnet 192.168.1.1
ritool set Custom AH reboot
然后进入超级管理后台,管理-恢复默认设置,这样就变成了电信的设置界面(不做下发,理论也不需要更换界面,任何界面都可以使用),别恢复出厂
其他
设置mac
ritool set MACAddress 7C:CC:1F:48:A8:78 (示例) ritool set G984Serial 1F48D878 (1F48D878 这是设备识别号的后8位,我这里不需要,广州联通 ) ritool set Mnemonic G-140W-ME (设备型号G-140W-ME,联通双频型号改为G-140W-UE) ritool set YPSerialNum NBELB12A99EF (设置sn) ritool dump (查看配置)…