Ten tricks, so that your computer does not invade

  

Computers play an important role in our life work and study. We inevitably deal with the outside world through computers every day. Many things are promoted by computers. . Therefore, we need to protect the safety of the computer in particular, and we need to start maintenance in our daily life so that our computer can stay away from the virus and not invade. Here are 10 smart ways to get our computer running in a safe environment. Let's learn together now.

1. Use common sense to judge

Never open attachments from unknown sources or attachments that you did not expect to receive. It is consciously not open to email attachments that appear suspicious. Don't be fooled, think that you know the contents of the attachment, even if the attachment looks like a .jpg file -- because Windows allows users to use multiple suffixes when naming files, and many email programs only display the first suffix, for example The name of the email attachment you see is wow.jpg, and its full name is actually wow.jpg.vbs. Opening this attachment means running a malicious VBScript virus instead of your .jpg viewer.

2, install anti-virus products and ensure that the latest virus definition code is updated

It is recommended that you update the virus definition code at least once a week, because anti-virus software is only the most effective. Need to remind you that the Norton anti-virus software you purchased is not only to update the virus definition code, but also to update the product engine, which is different from other anti-virus software. This has the advantage of meeting the needs of the new engine for detection and repair, effectively suppressing viruses and worms.

3, when installing anti-virus software for the first time, be sure to do a thorough virus scan on the computer

When you install anti-virus software on your computer for the first time, you must spend some time on the machine. Do a thorough virus scan to make sure it has not been infected with a virus. Advanced anti-virus software vendors now use virus scanning as an automated program that is automatically executed when users first install their products.

4, before inserting floppy disks, CDs and other pluggable media, be sure to scan them for viruses

Make sure your computer has inserted floppy disks, CDs and other pluggable media. And automatic virus checking for emails and networked files.

5. Don't download any software from any unreliable channel

This is hard to do because we usually can't judge what is unreliable. It's easier to make sure that all the more famous online libraries are not infected with the virus, but there are too many websites that provide software downloads. We can't be sure that they must all take anti-virus measures, so the insurance method is correct. The securely downloaded software is scanned for viruses before installation.

6. Be wary of deceptive viruses

If you receive an email from a friend claiming to have a new virus that is most lethal, and let you warn this warning The mail is forwarded to all the people you know. This is a deceptive virus. It is recommended that you visit the anti-virus software vendor to verify that it does. These deceptive viruses not only waste the recipient's time, but may also be as lethal as the virus they claim.

7. Use other forms of documentation, such as .rtf (Rich Text Format) and .pdf (Portable Document Format)

Common macro viruses use Microsoft Office programs to spread and reduce these Opportunities for file types will reduce the risk of viral infection. Try to store files with Rich Text. This does not mean that the .rtf suffix is ​​used only in the file name. Instead, in Microsoft Word, use the "Save As" command to select the Rich Text form in the dialog box. Although the Rich Text Format may still contain embedded objects, it does not natively support Visual Basic Macros or Jscript. And pdf files are not only cross-platform, but also more secure. Of course, this is not the perfect solution to completely avoid the virus.

8. Don't install software with a shared floppy disk, or worse, copy a shared floppy disk

This is how the virus spreads from one machine to another. At the same time, if the software is not registered, it will be considered as non-genuine software, and we can basically reasonably infer that people who copy illegal software generally do not care about copyright law and legal use of software. Similarly, they have adequate virus protection for installation and maintenance. The measures will not be too concerned. Piracy software is the main channel for virus infection.

9. Disable Windows Scripting Host

Windows Scripting Host (WSH) runs various types of text, but is basically VBScript or Jscript. In other words, Windows Scripting Host acts as a translator between text languages. The language may support ActiveX Scripting interfaces, including VBScript, Jscript or Perl, and all Windows features, including access to folders, file shortcuts, and network access. And Windows registration and so on. Many viruses/worms, such as Bubbleboy and KAK.worm, use Windows Scripting Host to automatically open an infected attachment without the user having to click on the attachment.

10, using a client-based firewall or filtering measures

If you use the Internet, especially using broadband, and always online, it is very necessary to use a personal firewall to protect your privacy and Prevent uninvited guests from accessing your system. If your system does not have effective protection, your home address, credit card number and other personal information may be stolen.

The safe and stable computer environment is what we are pursuing. We always hope that our computers can be protected from viruses, but these are not achieved through anti-virus software, but we need us at peacetime. The computer can also be maintained in the middle, so that it can be poisoned.

Copyright © Windows knowledge All Rights Reserved