Last modified by Denisa Wernerová on 03.08.2023 12:55

From version 1.6
edited by vyv0010
on 27.04.2015 11:05
Change comment: There is no comment for this version
To version 1.7
edited by vyv0010
on 27.04.2015 12:05
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -34,7 +34,5 @@
34 34  1*. Do the thorough check of the computer. If system was damaged during cleaning of tested disk it will may be necessary to reinstall it and use the regular backup.
35 35  1. After cleaning your computer it is advised to change all your passwords (mail, ICQ, facebook, internet banking, etc.). It often happens during the attack on the system that your passwords gets stolen and subsequently abused.
36 36  1. Clean temporary files - Temporary Internet Files. Use e.g. program CCleaner which can clean even temporary files of common applications.
37 -1. Check the installed plugins in web browser (Microsoft IE - Tools [[image:http://idoc.vsb.cz/miranda2/export/sites-root/idoc/cs/okruhy/cit/_common/_images/sipka_r.gif||alt="šipka vpravo" height="10" width="10"]] Internet Options [[image:http://idoc.vsb.cz/miranda2/export/sites-root/idoc/cs/okruhy/cit/_common/_images/sipka_r.gif||alt="šipka vpravo" height="10" width="10"]] Programs [[image:http://idoc.vsb.cz/miranda2/export/sites-root/idoc/cs/okruhy/cit/_common/_images/sipka_r.gif||alt="šipka vpravo" height="10" width="10"]] Manage add-ons)
37 +1. Check the installed plugins in web browser (Microsoft IE - Tools Internet Options Programs Manage add-ons)
38 38  1. Follow the security points according to [[Prevention - how to secure the computer>>pc.prevence]].
39 -
40 -