A method, device and electronic equipment for deleting registry startup items
A registry and start-up item technology, applied in the direction of program control device, computer security device, program loading/starting, etc., can solve the problem of low system security and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0039] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0040] figure 1 It is a flow chart of deleting registry startup items in Embodiment 1 of the present invention. Such as figure 1 As shown, the method for deleting malicious files in this embodiment may include:
[0041] Step 101. Acquire the registry key value data under the startup item of the system registry.
[0042] The embodiments of the present invention are applicable to devices such as PCs. Specifically, in this step, use the enumeration key-value function NtEnumerateValueKey in the ntdll module to obtain...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


