Skip to playerSkip to main content
  • 15 hours ago
في هذا الفيديو نشرح Trellix Stinger، أقوى أداة محمولة ومجانية لفحص الكمبيوتر واكتشاف الفيروسات، التروجانات، الديدان، وبرامج التجسس والبرامج الضارة بدون الحاجة إلى تثبيت أي برنامج حماية.

🔹 ما هي Trellix Stinger؟
هي النسخة المطوّرة والرسمية من أداة McAfee Stinger، تعمل على أنظمة Windows وتُستخدم كأداة فحص إضافية قوية بجانب أي مضاد فيروسات.

🔹 مميزات Trellix Stinger:
أداة محمولة (Portable)
لا تحتاج إلى تثبيت
فحص سريع وعميق
حذف الفيروسات والبرامج الخبيثة
تعمل بدون تعارض مع برامج الحماية الأخرى
مجانية 100%

إذا كان جهازك بطيئًا، تظهر إعلانات مزعجة، أو تشك بوجود فيروس مخفي، فهذا الفيديو سيساعدك على تنظيف الكمبيوتر بأمان وبدون فورمات.

📌 لا تنسَ الإعجاب 👍
📌 والاشتراك في القناة لمزيد من الشروحات التقنية 💙
الموضوع كاملا من هنا :
https://www.proteachin.com/2020/12/How-to-remove-malware-or-viruses-from-my-windows-10-pc.html
إشترك في القناة حتى تتوصل بكل الفيديوات اليومية والمتجددة subscribe
حساب tiktok
https://www.tiktok.com/@proteachin
حساب facebook
https://www.facebook.com/KANAT.ALTA3LIM.ALMAJANI
حساب youtube
https://www.youtube.com/@proteachin
حساب twitter
https://www.twitter.com/ALahdagat
حساب instagram
https://www.instagram.com/ayoublahdagat
حساب Telegram
https://t.me/proteachin07
رابط موقعنا على الأنترنت
https://www.proteachin.com

Category

🤖
Tech
Transcript
00:00Peace, mercy and blessings of God be upon you
00:01With the new explanation on Madhoon Free Education
00:04In a year, I learned about a special program.
00:06McAfee's followers
00:08But it is now in an independent position.
00:11Independent tools
00:12The tool is very distinctive.
00:14Even if you are using antivirus software
00:17The tool uses a set of tools
00:20Or the various methods for computer testing
00:22It is very important
00:23You will see what will happen when I do it.
00:26The tool is free.
00:27It also updates the database.
00:30continuously
00:31Here to download it, choose its system
00:3232 or 64
00:34Then download the special version
00:36The program is portable.
00:37You don't need to install it.
00:38It supports all Windows operating systems.
00:41Whether modern or old
00:43It means a very uncomplicated and simple program.
00:46And a very surprising user interface
00:48As you will notice
00:50All these pages will be transformed
00:51Click here to download now
00:52It is assumed that it will start downloading.
00:54Its size is 45 to 46 megabytes.
00:57According to the version that will be carried
00:59Just place it on the desktop
01:01Double-tap it, then tap "yes".
01:02It will immediately begin to take off.
01:04As I said, the program is portable.
01:05You don't need to install it.
01:07Whenever you want to check your computer
01:09I suspected there was a problem
01:11To begin, click "accept".
01:13This interface
01:14I will explain it in detail.
01:15Here you have the scan for examination
01:19As you can see
01:19It contains a collection of them
01:21Very simple settings
01:22scan here
01:23If you want to perform a custom scan
01:26Click here to customize my scan
01:28And choose
01:29partition
01:31Or the part you want to examine
01:34Or a specific file that you suspect
01:36Or better yet
01:37I'll check the entire system once.
01:39Next here
01:40quarantine
01:41It contains the files that he limits
01:43It creates backups and copies of its reserves.
01:45infected files
01:46And if you want
01:48To retrieve those files
01:50You can also adjust the Corinthine settings.
01:53Log in to the reports
01:56When the examination is finished
01:58Here you will find comprehensive reports
01:59What happened during the examination?
02:01The advanced version has a blacklist.
02:03blacklist
02:04To add anything to it
02:05You want to add it
02:07Here are the settings.
02:09What is here is a threat list
02:10For one of the threats he is looking for
02:11The program
02:12Types of Trogon or Mallor
02:14Or Spyur
02:14Or anything
02:16or Gorms
02:16Which he will search for
02:18And delete it
02:20Here are the settings, which are important.
02:22We have scan targets
02:23It is the things that will
02:25It targets her
02:27scan or examination
02:28It will target
02:29process
02:30registry
02:31boot sector
02:32rocket
02:33As well as
02:33WMI
02:35Always the best
02:36You leave it in these settings
02:38Don't add anything
02:39Don't delete anything
02:39So that the examination is good
02:40scan option
02:42It will examine the subfiles
02:45He will also examine
02:46Inside archived files
02:48With files that are archives
02:50Meaning, like
02:51War
02:51and 7Z
02:52and others
02:53Here when he discovers
02:55threat or danger
02:57What will he do?
02:58repair
02:58The file will be fixed
02:59report
03:00It will only give you a report
03:01rename
03:01He will return
03:02900 files
03:03remove
03:04It will delete the file
03:05It's always best to leave it in repair.
03:07Because it's better
03:08to choose
03:09for
03:10GTi
03:10settings
03:11Always the best
03:13medium
03:13Don't be
03:14Meaning
03:15less
03:16The least you keep is
03:18medium
03:18high
03:19good
03:20very high
03:20It will be
03:21Meaning
03:21He might throw things
03:22It doesn't need a limit
03:24It's best if you leave it in
03:25medium
03:25or in
03:26high
03:26then
03:27It locks
03:29The window from above
03:30Here we have explained the most important points
03:31Things in the program
03:32Then after that
03:33I will choose, for example
03:34I checked the C system disk
03:35Because most programs
03:36Fixed there
03:37And most applications
03:38And everything
03:39Located in
03:39C
03:40Don't pray for me
03:41To examine the rest of the things
03:42Then I will press
03:43scan
03:43only
03:45I did
03:45Sorry
03:46I checked
03:47system disk
03:48Approximately its size
03:49120 GB
03:50There are many files
03:52It will almost take
03:53About two hours
03:55Until the examination is completed
03:56The examination is still ongoing.
03:57He discovered a range of threats
04:00It will appear here
04:00Even if the examination is not completed
04:02here
04:02threads found
04:03and threads cleaned
04:04This means it appears here
04:06Sorry
04:07Show
04:08list
04:08or his own
04:09or details
04:10or details
04:11The file will appear to you
04:12The one who deleted it
04:13And the banks
04:14His
04:15As well as
04:16type
04:17this
04:17If you promote
04:18Malor
04:19Spyur
04:19Meaning
04:20etc
04:21then
04:22action taken
04:23deleted
04:24Meaning it was deleted
04:25So this method
04:27As I said
04:28The program continues its examination.
04:29While continuing the examination
04:31It's better that you
04:32Meaning
04:33Don't do anything
04:34And leave the computer
04:35Until it is
04:36Inspection process
04:37As I said
04:37It will take you
04:39time
04:40if it was
04:41Meaning
04:41There are many files
04:43Or there are many programs
04:44It will take
04:45As you can see
04:46Two hours and fifty-six
04:47second
04:47Which were
04:49Finding it
04:49It is 12
04:50Which were
04:51Getting rid of it
04:52or clean
04:52She has 6
04:53After files
04:54Failed in
04:54The program
04:55In work
04:57repair it
04:57You will notice
04:58repair failed
04:59Or something of
05:00This kind
05:00But always
05:01to remember
05:02that it
05:03It will give you
05:04Sources
05:05to destroy
05:06The program
05:07Why
05:08He might fail
05:08In his execution
05:09may be
05:09The file
05:10compressed
05:11And preserved
05:11In a word
05:12progress
05:12and files
05:13Compressed
05:13And preserved
05:13In a word
05:14progress
05:14He might find a problem
05:15In dealing
05:15With her
05:16whether
05:16This program
05:17Even programs
05:18Protection
05:19You might find a problem
05:19In dealing
05:20With him
05:20From the files
05:21and others
05:21From the files
05:22The other
05:22In any case
05:23You will find sources
05:23file
05:24in case
05:24What management
05:25Throw it
05:25or disposal
05:26From him
05:26Or review it
05:27And make sure
05:28actually
05:28Is it safe?
05:29Or the file
05:31There's a problem
05:32After that
05:32view log
05:33here
05:33log
05:34or report
05:35The complete
05:36Which will be
05:37In everything
05:38As I said
05:39until
05:39Here are the sources
05:41Programs
05:41Which he examined
05:43Which has a problem
05:44You can only
05:45Copying the sources
05:46Going to the file
05:48The one with the problem
05:49Or that which has not been
05:49Getting rid of it
05:50You can review it
05:51Is it safe?
05:52Or is it a program?
05:53You don't know its source
05:54Therefore
05:55It's best if you get rid of it.
05:56Always quarantine
05:57here
05:57You can work
05:59Doubts
06:00Beyond History
06:02Not where
06:06mouse pointer
06:06Return to
06:07In a managed state
06:08Restore works
06:08For some files
06:09Which were deleted
06:10here
06:10log
06:11always
06:11Report
06:12It remains visible
06:13here
06:14permission
06:14This was
06:15And everything
06:15today
06:16I hope that
06:17This program
06:17useful
06:18As I said
06:18Free program
06:19Protection companies
06:20Motawaqa
06:21And it remains
06:23until
06:24If I
06:25Used
06:25Protection program
06:26No ghayn
06:27About this
06:28A type of
06:28Programs
06:29between
06:30two thousand
06:30The other
06:31permission
06:31This was
06:31And everything
06:32today
06:32I hope that
06:32This video
06:33It was helpful to you
06:33Upcoming show
06:34God willing
06:35Peace be upon you
06:35And God's mercy
Comments

Recommended