Virus cognition common sense, make the computer more secure

  

Sometimes our computer will be unknowingly poisoned, how to prevent or know that computer poisoning has always been a concern of friends who often go online, in the end can make you The computer no longer has a virus intrusion.

1. Use common sense to judge

Never open attachments from unknown sources or attachments that you did not expect to receive. It is consciously not open to email attachments that appear suspicious. Don't be fooled, think that you know the contents of the attachment, even if the attachment looks like a .jpg file -- because Windows allows users to use multiple suffixes when naming files, and many email programs only display the first suffix, for example The name of the email attachment you see is wow.jpg, and its full name is actually wow.jpg.vbs. Opening this attachment means running a malicious VBScript virus instead of your .jpg viewer.

2, install anti-virus products and ensure that the latest virus definition code is updated

It is recommended that you update the virus definition code at least once a week, because anti-virus software is only the most effective. Need to remind you that the Norton anti-virus software you purchased is not only to update the virus definition code, but also to update the product engine, which is different from other anti-virus software. This has the advantage of meeting the needs of the new engine for detection and repair, effectively suppressing viruses and worms.

3, when installing anti-virus software for the first time, be sure to do a thorough virus scan on the computer

When you install anti-virus software on your computer for the first time, you must spend some time on the machine. Do a thorough virus scan to make sure it has not been infected with a virus. Advanced anti-virus software vendors now use virus scanning as an automated program that is automatically executed when users first install their products.

4, before inserting floppy disks, CDs and other pluggable media, you must scan them for viruses.

Make sure your computer performs automatic virus checking on inserted floppy disks, CDs and other pluggable media, as well as email and Internet files.

5. Don't download any software from any unreliable channel

This is hard to do because we usually can't judge what is unreliable. It's easier to make sure that all the more famous online libraries are not infected with the virus, but there are too many websites that provide software downloads. We can't be sure that they must all take anti-virus measures, so the insurance method is correct. The securely downloaded software is scanned for viruses before installation.

6. Be wary of deceptive viruses

If you receive an email from a friend claiming to have a new virus that is most lethal, and let you warn this warning The mail is forwarded to all the people you know. This is a deceptive virus. It is recommended that you visit the anti-virus software vendor to verify that it does. These deceptive viruses not only waste the recipient's time, but may also be as lethal as the virus they claim.

7. Use other forms of documentation, such as .rtf (Rich Text Format) and .pdf (Portable Document Format)

Common macro viruses use Microsoft Office programs to spread and reduce these Opportunities for file types will reduce the risk of viral infection. Try to store files with Rich Text. This does not mean that the .rtf suffix is ​​used only in the file name. Instead, in Microsoft Word, use the "Save As" command to select the Rich Text form in the dialog box. Although the Rich Text Format may still contain embedded objects, it does not natively support Visual Basic Macros or Jscript. And pdf files are not only cross-platform, but also more secure. Of course, this is not the perfect solution to completely avoid the virus.

8. Don't install software with a shared floppy disk, or worse, copy a shared floppy disk

This is how the virus spreads from one machine to another. At the same time, if the software is not registered, it will be considered as non-genuine software, and we can basically reasonably infer that people who copy illegal software generally do not care about copyright law and legal use of software. Similarly, they have adequate virus protection for installation and maintenance. The measures will not be too concerned. Piracy software is the main channel for virus infection.

9. Disable Windows Scripting Host

Windows Scripting Host (WSH) runs various types of text, but is basically VBScript or Jscript. In other words, Windows Scripting Host acts as a translator between text languages. The language may support ActiveX Scripting interfaces, including VBScript, Jscript or Perl, and all Windows features, including access to folders, file shortcuts, and network access. And Windows registration and so on. Many viruses/worms, such as Bubbleboy and KAK.worm, use Windows Scripting Host to automatically open an infected attachment without the user having to click on the attachment.

10, using a client-based firewall or filtering measures

If you use the Internet, especially using broadband, and always online, it is very necessary to use a personal firewall to protect your privacy and Prevent uninvited guests from accessing your system. If your system does not have effective protection, your home address, credit card number and other personal information may be stolen.

Copyright © Windows knowledge All Rights Reserved