Using the features of the parental control of the Vista system

  
Vista has built-in "parental control" function, which is of course used to allow parents to control the way they can use the computer for children. However, for users who have only one computer at home, in order to prevent parents from accidentally logging into some Trojan websites while using their computers, this feature may be used more to “control parents”. To set up parental controls, you should have at least two accounts: a standard account (equivalent to a restricted account under Windows XP) and an administrator. The former acts as a child and the latter acts as a parent. Open “Control Panel→Parental Control” and double-click a standard account in the window that opens to enter the parental control settings interface (see Figure 1). First, select "Enable, Force Current Settings", otherwise you will not be able to do the following operations; then, select "Apply, collect information about computer usage" to record a detailed record of your child's use of the computer. Figure 1 Click “Windows Vista Web Filter” in Figure 1 to enter the setting interface shown in Figure 2. Figure 2 Click “Edit Allow and Block List”, follow the prompts to add some Trojan horse sites, or add the websites that parents need to visit directly to the allow list, and then check “Allow only sites on the allowed list. Tick ​​"Block File Download" to prevent downloading Trojan tips from combining parental controls or Vista's other security features to get the most out of it. For example: "Block file download" is only valid for the web mode, but it cannot control the download of tools such as Thunder. At this point, you can set the running permissions of Thunder or the running permissions of other download tool installers. Also, any settings may be missed. We can enable "Apps, collect information about computer usage" to see the records of children using the computer. The record is quite detailed, including what programs have been run, where they stayed, etc. According to the record, check and fill the gap. Of course, if it is for the purpose of "controlling parents", recording this information will help us repair the computer faster. Malware has cleared the Windows Defender tool. Microsoft has provided free downloads since the Windows XP era. It can be used to remove malware and spyware from computers. It has become a built-in tool in Vista and has become Vista. One of the main tools. You can open the software by clicking on "Windows Defender" in the "Control Panel" (see Figure 3). Scan button to scan the system for malware, and to view the currently running programs, self-starting programs (one of the characteristics of malware), the key is to show where these programs are on the hard disk, occupy the registry What key bits and so on. You can end the currently running program and disable the self-starting program. The malicious program is too clever to be terminated or disabled on the spot, but the displayed program location and registry information can also provide clues for us to manually clear. Figure 3 In addition, some rogue software runs quietly, such as collecting user information and sending it out. To achieve this, malware generally runs with the system booting. Windows Defender can display the currently running rogue software before the system has entered the desktop.
Copyright © Windows knowledge All Rights Reserved