123   2  /  3  页   跳转

【求助】脱机网页仍自动弹出

郁闷,这个文件总是能在临时文件夹内看到
浏览网页一段时间就自动生成
怎么办啊
gototop
 

在C:\WINDOWS\system32\drivers\etc里有个hosts文件,可以用记事本打开,在里面加入那些网页,应该可以阻止他们弹出
gototop
 

加入象这样
127.0.0.1 http://v2.okunion.com/2.txt
以次类推,这是个没有办法的办法
gototop
 

是lmhosts.sam这个文件吗?内容如下,该如何加入?
主要是想知道怎样才能禁止自动生成2.txt文件啊?
为什么自动弹出的网页都是2.txt里的网址?
命运,你登陆http://v2.okunion.com/2.txt看看吧
# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample LMHOSTS file used by the Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to computernames
# (NetBIOS) names.  Each entry should be kept on an individual line.
# The IP address should be placed in the first column followed by the
# corresponding computername. The address and the computername
# should be separated by at least one space or tab. The "#" character
# is generally used to denote the start of a comment (see the exceptions
# below).
#
# This file is compatible with Microsoft LAN Manager 2.x TCP/IP lmhosts
# files and offers the following extensions:
#
#      #PRE
#      #DOM:<domain>
#      #INCLUDE <filename>
#      #BEGIN_ALTERNATE
#      #END_ALTERNATE
#      \0xnn (non-printing character support)
#
# Following any entry in the file with the characters "#PRE" will cause
# the entry to be preloaded into the name cache. By default, entries are
# not preloaded, but are parsed only after dynamic name resolution fails.
#
# Following an entry with the "#DOM:<domain>" tag will associate the
# entry with the domain specified by <domain>. This affects how the
# browser and logon services behave in TCP/IP environments. To preload
# the host name associated with #DOM entry, it is necessary to also add a
# #PRE to the line. The <domain> is always preloaded although it will not
# be shown when the name cache is viewed.
#
# Specifying "#INCLUDE <filename>" will force the RFC NetBIOS (NBT)
# software to seek the specified <filename> and parse it as if it were
# local. <filename> is generally a UNC-based name, allowing a
# centralized lmhosts file to be maintained on a server.
# It is ALWAYS necessary to provide a mapping for the IP address of the
# server prior to the #INCLUDE. This mapping must use the #PRE directive.
# In addtion the share "public" in the example below must be in the
# LanManServer list of "NullSessionShares" in order for client machines to
# be able to read the lmhosts file successfully. This key is under
# \machine\system\currentcontrolset\services\lanmanserver\parameters\nullsessionshares
# in the registry. Simply add "public" to the list found there.
#
# The #BEGIN_ and #END_ALTERNATE keywords allow multiple #INCLUDE
# statements to be grouped together. Any single successful include
# will cause the group to succeed.
#
# Finally, non-printing characters can be embedded in mappings by
# first surrounding the NetBIOS name in quotations, then using the
# \0xnn notation to specify a hex value for a non-printing character.
#
# The following example illustrates all of these extensions:
#
# 102.54.94.97    rhino        #PRE #DOM:networking  #net group's DC
# 102.54.94.102    "appname  \0x14"                    #special app server
# 102.54.94.123    popular            #PRE            #source server
# 102.54.94.117    localsrv          #PRE            #needed for the include
#
# #BEGIN_ALTERNATE
# #INCLUDE \\localsrv\public\lmhosts
# #INCLUDE \\rhino\public\lmhosts
# #END_ALTERNATE
#
# In the above example, the "appname" server contains a special
# character in its name, the "popular" and "localsrv" server names are
# preloaded, and the "rhino" server name is specified so it can be used
# to later #INCLUDE a centrally maintained lmhosts file if the "localsrv"
# system is unavailable.
#
# Note that the whole file is parsed including comments on each lookup,
# so keeping the number of comments to a minimum will improve performance.
# Therefore it is not advisable to simply add lmhosts file entries onto the
# end of this file.

gototop
 

就hosts文件,你是什么系统?
gototop
 

xp sp1
gototop
 

那应该有这个文件
gototop
 

可能是病毒变种。请楼主在windows\system32\下查找.dat文件,(比如host.dat)有十几个.dat文件吧,搜完了后用记事本依次打开文件,看看里面有没有你所说的恶意网站。如有,你就可以顺藤摸瓜会找到相关DLL文件,然后删掉这些文件。这招麻烦了些,试试吧
gototop
 

晕,删了.dat又出现了1.txt,这次弹出的是http://okww.net
用什么工具能解决啊
gototop
 

在删除一次dat试下
gototop
 
123   2  /  3  页   跳转
页面顶部
Powered by Discuz!NT