Google浏览器被T999.cn主页劫持如何恢复

本文分享了一位用户在使用激活工具激活WIN10系统后,遇到Google浏览器被T999.cn劫持的问题及解决过程。通过使用电脑管家的插件清理功能,成功删除恶意插件并重启电脑,最终恢复了浏览器的正常使用。

前几天用激活工具激活WIN10系统后,Google浏览器被T999.cn劫持了,很烦

网上提供的很多方法都行不通,甚至删除注册表,重启电脑后,Google会自动打开,浏览器显示T999.cn公然嘲讽

现在说一下我是怎么恢复的吧,打开电脑上的杀毒软件,网上推荐的是360杀毒软件,我不敢用,因为全家桶我是怕的,
下面以电脑管家为例—

1.打开安装的电脑管家,找到工具箱中的插件清理
在这里插入图片描述
2.这里我已经清理过了,让大家看一下具体清理什么插件吧
在这里插入图片描述
3.成功删除后,重启电脑就OK了!

select count(AUDITED_UNIT) from( SELECT AUDITED_UNIT_IDS, AUDITED_UNIT_NAMES AS AUDITED_UNIT FROM ( SELECT SUBSTRING_INDEX(SUBSTRING_INDEX(f.involved_department_accounts, ',', b.help_topic_id + 1), ',', -1) AS AUDITED_UNIT_IDS, SUBSTRING_INDEX(SUBSTRING_INDEX(f.involved_department_names, ',', b.help_topic_id + 1), ',', -1) AS AUDITED_UNIT_NAMES, f.PROBLEM_ID, f.PLAN_YEAR, f.UNIT_ID, f.PROJECT_SOURCE FROM ( SELECT '1' AS PROJECT_SOURCE, f.involved_department_accounts, f.involved_department_names, f.ID AS PROBLEM_ID, P.PLAN_YEAR :: INTEGER AS PLAN_YEAR, P.unit_id AS UNIT_ID FROM iam_fact_confirmation_problem f JOIN iam_audit_project P ON f.PROJECT_ID = P.ID JOIN iam_help_topic b ON b.help_topic_id < (LENGTH(f.involved_department_names) - LENGTH(REPLACE(f.involved_department_names, ',', '')) + 1) UNION ALL SELECT '2' AS PROJECT_SOURCE, f.involved_department_accounts, f.involved_department_names, f.ID AS PROBLEM_ID, EXTRACT(YEAR FROM to_timestamp(P.creation_time / 1000)) AS PLAN_YEAR, P.unit_id AS UNIT_ID FROM iam_external_problem f JOIN iam_external_project P ON f.PROJECT_ID = P.ID JOIN iam_help_topic b ON b.help_topic_id < (LENGTH(f.involved_department_names) - LENGTH(REPLACE(f.involved_department_names, ',', '')) + 1) ) f WHERE f.PLAN_YEAR >= :startYear AND f.PLAN_YEAR <= :endYear AND f.UNIT_ID IN (:unitIds) ) t GROUP BY AUDITED_UNIT_IDS, AUDITED_UNIT_NAMES ) t999 这个在查询中 报错 ... 174 common frames omitted Caused by: org.postgresql.util.PSQLException: [10.0.116.108:64607/b.hd.com/172.20.97.226:5432] ERROR: syntax error at or near ":" 位置:749 at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2933) at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2655) at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:376) at org.postgresql.jdbc.PgStatement.runQueryExecutor(PgStatement.java:561) at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:538) at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:396) at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:171) at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:127) at com.zaxxer.hikari.pool.ProxyPreparedStatement.executeQuery(ProxyPreparedStatement.java:52) at com.zaxxer.hikari.pool.HikariProxyPreparedStatement.executeQuery(HikariProxyPreparedStatement.java) at org.hibernate.engine.jdbc.internal.ResultSetReturnImpl.extract(ResultSetReturnImpl.java:57) ... 188 common frames omitted
最新发布
06-28
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值