Windows system is not subject to virus violations. How to set

  

A lot of time for the average user is most afraid of computer
become broiler, computer
poisoning and other emergencies, then how For better protection computer
safe operating environment, windows series system has its own security protection mechanism, but if the computer
related improper operation or some permissions are not properly set, it is possible to become Broiler in the hands of hackers.

In the process of using some permissions settings, there are some basic operations carefully. In fact, computer poisoning is not so simple, now most of the experience, the computer has a certain degree of friends on windows They all like to streaking, but they are not necessarily poisoned. Then take a look at the 13 notes that the Bean System Editor has summarized to help you protect your computer environment from infringement.

Notes 1. Decommissioning for the Administrator User

In the Windows
OS
, the Administrator is the most advanced user, in normal login Modes are invisible, so it's easy to ignore security issues caused by Administrator users.

The initial password of the Administrator user is empty. If the firewall is not installed, the hacker can easily access your computer through the Administrator account. It’s too late to do anything at this time.

In fact, this is not a downgrade. It is to create a fake, unrealized Administrator user.

The specific operation is as follows, first log in to Windows with a non-Administrator administrator account, and then open: Control Panel - Administrative Tools - Computer Management - Local Users and Groups - Users, delete the Administrator user, and then create a new one. Administrator user, right-click to set the password, how complicated the password is, make it belong to the lowest level user group, and check the account is disabled in the properties.

This way, even if someone else cracked your Administrator account, it was found to be just an account with no real power.

Notes 2, often check the boot startup items

often enter msconfig in the run to view the startup items, found that there are abnormalities immediately on the Internet to find information to see if it is a virus.

Note 3: Using complex passwords

This is a commonplace topic, but there are still many people who use simple numeric passwords, such as birthdays, ID numbers, etc. This is extremely Easy to guess. “Don't worry, my birthday is only known to my friends.” Who says your friends will not peek into your privacy?

Notes 4. Firewalls and anti-virus software must be installed

No matter what kind of master you are, these two softwares still need to be installed. Although in the face of new viruses, anti-virus software will become overwhelmed, it is better to go online to find anti-virus methods. But there is an additional barrier to anti-virus software. No matter how high or how short this barrier is, it always benefits more than harm.

Windows7 system firewall is also necessary to install, and it is best to install some programs to monitor network processes, and always monitor whether there are malicious programs in the illegal operation.

Note 5: All disks are forbidden to run automatically

U disk viruses are prevalent today, and a little carelessness will result in "grid". The general operating mechanism of the U disk virus is automatically run by double-clicking the drive letter. Therefore, disabling the automatic operation of all disks is a very effective preventive measure.

The specific operation process is: run the input gpedIT.msc-->User Configuration-->Administrative Template-->System, double-click [Close AutoPlay] in the list on the right, select “ All drives & rdquo;, then select “ has been activated & rdquo;. Make sure to quit.

Notes 6. Don't double-click the USB flash drive

If you don't use all the disks to run automatically, or if you use a USB flash drive on someone else's computer, it is best not to double-click the USB flash drive. This is very easy to trigger a U disk virus, the best way is to first scan with anti-virus software.

The general removal method for viruses in the U disk is to go through the resource manager and see if there is an autorun.inf file in the U disk, which is usually hidden. Delete the autorun.inf file and the program it points to, then re-plug the USB flash drive.

Notes 7. Back up important data frequently

Some important data must be backed up frequently, such as important pictures, personal information, and so on. Burn important information for about a month, just in case.

Notes 8. Use Ghost

Use Ghost to back up the operating system disk frequently. If you encounter serious problems, directly restore the entire system disk. This is a lazy way, too lazy to find the hidden place of the virus. But it is also an efficient and fast method. The problem is that you must always use Ghost for backups, otherwise you will lose your system disk and lose at least the recently installed program (registration information).

Notes 9. Privacy files need to be encrypted

Use some encryption programs to encrypt files that you think cannot be blamed on the public. There are many such free software on the Internet. Don't think that you can hide the file. Hidden is just a way of self-deception, encrypted.

Notes 10. Use Google

The reason why Google is recommended is because of the website security information provided in Google Search. Google will give you a hint when a search page contains a virus or Trojan.

Notes 11. Using Firefox

Firefox is not a panacea, but it is better than IE. Compared with IE, using Firefox can effectively reduce the chance of poisoning.

Notes 12. Don't tell anyone your password

Take someone your password in the chat tool. You will face 4 risks:

A, your The computer may be hanged and the password is stolen.

B, chat tool providers may also steal your password.

C. Chatting parties may use your trust in him to do dishonest behavior.

D, the chatter's computer is poisoned, and your password is stolen.

Notes 13. Don't just accept the file

Especially in QQ, someone else sends a file, don't accept it without saying anything, this is very dangerous. Be sure to ask what other people are sending, is he taking the initiative to send it. Do not run immediately after receiving, first scan it with anti-virus software.

These basic precautions are noted, the windows system to be poisoned has become less simple, the security of the system protects our personal privacy, our network virtual asset security, and even the actuality of some online banking Alipay Asset security.

Copyright © Windows knowledge All Rights Reserved