Make your system spotless, every day is a new system

  
        

Step 1:

Make sure the system is currently free of viruses, then open: "Start → Programs → Administrative Tools → Computer Management → Local Users and Groups → Users" to change the password of the super administrator to a high level. The best combination of numbers and letters, preferably, is changed to ten or more digits, such as 1A2B3D&2core.

Second Step:

Create another new super administrator user. His password security level is as complex as the super administrator. The purpose is to keep the administrator's backup. The system maintenance will not be done. Rejected.

The third step:

Add one or two users, for example, the user name is: temp1, temp2; the permission is given to the user group, the normal login only uses temp1 or temp2, open IE browser And create his shortcut on the desktop, right click on the shortcut and select "Run as other user" point OK! Username and password, enter the temp1 or temp2 username and password.

Step 4:

When you open any webpage, you are not afraid of virus erosion. You can browse the website with you without worrying about poisoning and so on! Because your current system is active when the user is temp1. And he is an inactive user, because when we use this inactive user to go online, no matter how many websites, the information obtained through IE will make it think that this user is your current active user, if it wants If you use malicious code to destroy your system when you browse, it will not work at all. Even if it is done, then the modified one is only a configuration file of the temporary user, and many malicious code and viruses try. The sabotage activities carried out by this user will all fail, because the user is not running at all, how can I get the operating rights of the system? ? Since you can't take it, you can't help it. And they are less likely to operate across users, because Microsoft has to be configured to be independent of each other, just as others can not go to my home to occupy the bed I sleep, they can not occupy the position of temp1 or temp2! So as long as you can guarantee that you always use this user as a proxy to access the Internet (but don't use temp1 or temp2 to log in to the system, because if so, if temp1 has had any web virus before, then when he logs into the system, they are infected. The virus is very likely to be activated!)

Copyright © Windows knowledge All Rights Reserved