Virus cognition common sense, make the computer more secure

  
Sometimes our computer will be unknowingly poisoned, how to prevent or know that computer poisoning has always been a concern of friends who often go online, in the end can make your computer no longer There is a virus invasion.
1, using common sense to judge
Never open attachments from unknown sources or attachments that you did not expect to receive. It is consciously not open to email attachments that appear suspicious. Don't be fooled, think that you know the contents of the attachment, even if the attachment looks like a .jpg file -- because Windows allows users to use multiple suffixes when naming files, and many email programs only display the first suffix, for example The name of the email attachment you see is wow.jpg, and its full name is actually wow.jpg.vbs. Opening this attachment means running a malicious VBScript virus instead of your .jpg viewer.
2, install anti-virus products and ensure that the latest virus definition code is updated
It is recommended that you update the virus definition code at least once a week, because anti-virus software is only the most effective. Need to remind you that the Norton anti-virus software you purchased is not only to update the virus definition code, but also to update the product engine, which is different from other anti-virus software. This has the advantage of meeting the needs of the new engine for detection and repair, effectively suppressing viruses and worms.
3. When installing anti-virus software for the first time, be sure to do a thorough virus scan on your computer.
When you install anti-virus software on your computer for the first time, it must take some time to do a thorough virus scan on the machine. To make sure it has not been infected with a virus. Advanced anti-virus software vendors now use virus scanning as an automated program that is automatically executed when users first install their products.
4, before inserting floppy disks, CDs and other pluggable media, you must scan them for viruses.
Ensure that your computer performs automated virus checks on inserted floppy disks, CDs and other pluggable media, as well as email and Internet files.
5, don't download any software from any unreliable channel
This is more difficult to do, because usually we can't judge what is unreliable. It's easier to make sure that all the more famous online libraries are not infected with the virus, but there are too many websites that provide software downloads. We can't be sure that they must all take anti-virus measures, so the insurance method is correct. The securely downloaded software is scanned for viruses before installation.
6. Be wary of deceptive viruses
If you receive an email from a friend claiming to have a new virus with the most lethality, and let you forward this warning message to you all. People, these nine out of ten are deceptive viruses. It is recommended that you visit the anti-virus software vendor to verify that it does. These deceptive viruses not only waste the recipient's time, but may also be as lethal as the virus they claim.
7. Using other forms of documentation, such as .rtf (Rich Text Format) and .pdf (Portable Document Format)
Common macro viruses are spread using Microsoft Office programs, reducing the chances of using these file types will be reduced Risk of viral infection. Try to store files with Rich Text. This does not mean that the .rtf suffix is ​​used only in the file name. Instead, in Microsoft Word, use the "Save As" command to select the Rich Text form in the dialog box. Although the Rich Text Format may still contain embedded objects, it does not natively support Visual Basic Macros or Jscript. And pdf files are not only cross-platform, but also more secure. Of course, this is not the perfect solution to completely avoid the virus.
8, do not use the shared floppy disk to install software, or worse, copy the shared floppy disk
This is the way the virus spreads from one machine to another. At the same time, if the software is not registered, it will be considered as non-genuine software, and we can basically reasonably infer that people who copy illegal software generally do not care about copyright law and legal use of software. Similarly, they have adequate virus protection for installation and maintenance. The measures will not be too concerned. Piracy software is the main channel for virus infection.
9. Disable Windows Scripting Host
Windows Scripting Host (WSH) Runs various types of text, but basically VBScript or Jscript. In other words, Windows Scripting Host acts as a translator between text languages. The language may support ActiveX Scripting interfaces, including VBScript, Jscript or Perl, and all Windows features, including access to folders, file shortcuts, and network access. And Windows registration and so on. Many viruses/worms, such as Bubbleboy and KAK.worm, use Windows Scripting Host to automatically open an infected attachment without the user having to click on the attachment.
10. Using a client-based firewall or filtering measures
If you use the Internet, especially with broadband, and always online, it is necessary to protect your privacy with a personal firewall and prevent uninvited guests from accessing your system. . If your system does not have effective protection, your home address, credit card number and other personal information may be stolen.
Copyright © Windows knowledge All Rights Reserved