1st action: working with the DOS boot disk or set up vFloppy into DOS, the present program utilizing Ghost make a good mirror positioned in F: . For the reason that this creation may be the emergency method, as a way to decrease the technique quantity and increase method stability, generating the mirror first before the proposal to upgrade the virus database, method patches, deleting unnecessary plans and junk files, and also to optimize the method (disk scan and defragmentation).
Action two: here will be the original method,
Windows 7 Pro, emergency program, restoration towards the second partition recognized Ghost,
Office Professional 2007, so very first put all of the information and facts D drive to other partition. Order not to take too much difficult disk space,
Windows 7 Pro, you possibly can use XP's disk management to repartition the D partitions. For instance, lots of computers have had a substantial D disk capability, now divided from a 5GB partition to accommodate the unique emergency technique.
into XP, the very first all information transferred to the D drive E drive. Right click Develop
Figure one
3rd phase: partition is deleted, right-click unallocated area now choose Stick to the prompts to click
fourth stage: Because the GHO is restored to non-system partition, exactly where XP can be used in the operation Ghost32.exe. Following running Ghost32.exe,
Microsoft Office 2010, choose the menu
Dong master hints:
hand in the event you obtain the GHO universal mirror, you could obtain the image directly again to the D drive, quickly dual technique set up.
Step Five: Click on the Explorer's file. Then locate the Then use Notepad to open
Figure two
set the emergency technique
Right after the above operation,
Office 2007 Product Key, we now have set up the initial technique according to the emergency system. Yet, this technique is mainly used for emergency response. Therefore, to much better defend the stealth technique to avoid virus infection, but additionally the safety for the implementation of the subsequent operations.
very first phase: anti-virus. To the unique system, commence the Computer Management develop ibid Inside the open window, click on the So even if the initial technique is contaminated with a virus, the virus doesn't infect stealth system (as in XP can not accessibility the stealth system), both anti-virus system may also attain the second concealed inside the original program.
second stage: upgrade the virus database. Considering that the stealth system is mainly utilized for anti-virus, extract the files along with other emergency operations, we are able to upgrade the virus database within the 1st program, the time to manually update the virus database on an additional method. For instance, I install the AVAST, so long as the periodic (eg 1 month) to note that inside the unique system to run about the stealth technique, you need to make use of Disk Management to re-assign the drive letter for your stealth system. Ibid, in Disk Management, right-click the drive letter on the partition is removed, select character.
third stage: upgrade the technique patches. Upgrade suggested method patches 360 security guards to total. 360 safety guards operating soon after the swap to As long as on the common foundation right after the 2nd technique, run the 360 safety guards above, click on the The patch can be removed (Figure three).
Figure 3
use the emergency technique
Now, in the event the authentic program continues to be broken, or