Overall layout for the system security perimeter, so that Windows 7 more secure level of security
(2)

  
to enhance the system
WindowsVista, Microsoft introduced User Account Control function (UserAccountControl), referred to as UAC. We can set the security level of UAC as needed to increase the security level of the system.

Tips: UAC security level from high to low is divided into: Always notice, only attempt to notify me of changes to my computer in the program, only when Notify me when programs try to change the computer (not reduced Desktop brightness), never notice. The higher the security level, the more frequently the UAC function's dialog box will pop up, which may cause inconvenience. Between safety and convenience, you can choose as needed.

you click the "Start" button, type UAC in the "search box" press the Enter key, open the "User Account Control Settings" window, here are four levels of security protection, drag the slider At the very top, this is the safest setting, and the system will notify you before the program makes changes to your computer or Windows settings (requires administrator privileges) and the desktop will be dimmed. You can perform other operations on your computer only by accepting or rejecting the request in the UAC dialog box. A darkened desktop is called a secure desktop, and other programs cannot run when the desktop is dimmed.

demand set AutoPlay feature

Windows comes with the system auto-play feature that automatically perform certain actions (such as: autoplay CD, video, etc.). Although this will be more convenient, it also brings security risks. We can set it in a targeted manner and use the auto play function as needed.

Go to Control Panel, click "Hardware and Sound" option, then click the "Auto Play" button in the Open dialog box, deselect "for all media and devices using auto play" options, listed below with all the Media, click the drop-down menu that follows to select the action to be performed, such as: do not perform the operation, ask each time, etc., and finally click the "Save" button.

let rogue software nowhere "hidden" in order to prevent abuse

user receives spyware, rogue tools, Windows7 integrated in a free anti-spyware tool --Windowsdefender. Windowsdefender offers two ways to protect your computer: scanning and real-time protection. Below we use Windowsdefender to detect the system, so that the rogue software has nowhere to hide.

Step 1: Click the "Start" menu, enter Windowsdefender in the "search box" and press Enter to open the tool, click "Check for Updates Now" button to the virus database to Windowsdefender Upgrade to make it easier to kill the latest malware.

Step Two: Click the "Scan" button to select "Quick Scan" can quickly check the system, select "Full Scan" will conduct a comprehensive testing system, will be a substantial increase in the use of time. If there is rogue software after scanning, a warning box will appear. Click the “Delete All” button after selecting it.

Step Three: Click "Tools" to "Tools and Settings" option, click the "Options" dialog box appears, in the "Auto" frequency can be set to automatically scan the computer, time and type In the "Default Action", various alarm levels can be automatically processed (deleted or quarantined). You can also select real-time protected objects below. In "Live Protection" you can set up automatic scanning of downloaded files and attachments to scan programs running on your computer.

Third, strengthen network security settings, IE8 upgrade protection function

new network is now the most common way to spread all kinds of viruses, phishing tools in recent years, like the pages linked to horse It’s hard to find out. The settings for network security in Windows 7 are also very rich. The built-in IE8 provides a variety of security features, and the system firewall has been upgraded to make it easier to use.

open security

browser IE8 is the main way we access to the Internet, most of the virus is through the browser from, in Windows7 default browser built InternetExplorer8.0 (referred to as IE8), security has been greatly improved, but in order to protect the security of IE8.0 browser, the commonly used settings are still indispensable.

comprehensive clean-up process personal privacy

browsing the web, will leave the URL in the address bar, history will have a website address certain user names and passwords will remain in CookIE, these Your personal privacy will be revealed and must be cleaned up.

open IE8, select the menu "Tools → Internet Options", switch to the "General", "delete", click under "Browsing history" button in a dialog box, and then select the items to delete (such as : Temporary Internet files, cookies, form data, etc., and then click the "Delete" button to delete. If you feel that it is more troublesome to manually delete each time, you can select "Delete browsing history when you log out" under "Browse History", so that IE will be closed after browsing, and the browsing history will be automatically cleared.

surf the web without leaving traces

addition to deleting browsing history outside, IE8.0 also provides another method of access to the Internet without leaving any trace - Private Browsing (InprivateBrowsing), use this mode The Internet browser will not store any browsing records. Of course, there will be no problem of deletion. There is no trace on the Internet, and it is safer to take precautions.

select the menu "Tools → InPrivate Browsing" turn on InPrivate mode, then surf the web will not leave any traces.
Copyright © Windows knowledge All Rights Reserved