Analysis of computer system security points of attention

  
We all know that the computer does not understand it, nor how to better let it run in a safe environment. We always accidentally press the wrong combination key or in the error dialog box, we choose to "determine", these small actions may change the important settings of our computer, not only affect the computer. Its operation will even cause its system to crash. We are always worried that our carelessness will destroy the computer. If we are familiar with the security knowledge about computers, we can prevent it from happening.
1: Using a power supply without overvoltage protection
This error can really destroy the computer equipment and the data saved on it. You might think that the system will only be dangerous when a thunderstorm occurs, but in fact any factor that can interfere with the circuit to cause current backflow can burn your device components. Sometimes even a simple action, such as turning on a device in the same circuit as a computer device (especially a high-voltage device such as a hair dryer, electric heater or air conditioner) can cause a surge, or a wire on a branch can cause a surge. . In the event of a power outage, there is also a surge when power is restored. Using a surge protector protects the system from power surges, but keep in mind that most inexpensive surge protectors can only withstand a single surge and then need to be replaced. The uninterruptible power supply (UPS) is better than the surge protector. The UPS's battery can make the current stabilize, even if the power is off, it can give you time to shut down the equipment.
2: Go online without using a firewall
Many home users will not hesitate to connect their computers to beautiful new cables or DSL modems and start surfing the Internet without realizing that they are exposing themselves to viruses and intruders. . Whether it's a broadband modem or a firewall built into a router, a separate firewall device between a modem or router and a computer, or a server running firewall software at the edge of the network, or a personal firewall software installed on a computer (such as built into Windows XP) ICF/Windows Firewall, or third-party firewall software like Kerio or ZoneAlarm) In short, all computers connected to the Internet should be protected by a firewall.
The advantage of a personal firewall installed on a laptop is that it has a firewall when the user is on the road with a computer or plugged into a hotel DSL or cable port, or connected to a wireless hotspot. Having a firewall is not all. You also need to make sure that the firewall is turned on and properly configured to protect it.
3: Ignore the operation and upgrade of anti-virus and anti-spyware
Let us face the reality: anti-virus programs are very annoying. They always block some of the apps you want to use, and sometimes you have to stop the antivirus program when you install new software. And in order to ensure utility, you have to upgrade frequently. It seems that the original version is always out of date, and urges you to upgrade, in many cases, the upgrade is a fee. But in the current environment, you can't afford the consequences of not using anti-virus. Malicious programs such as viruses, trojans, and worms can not only weaken and destroy the system, but also spread viruses to other parts of the network through your computer. In extreme cases, it can even destroy the entire network.
Spyware is another growing threat; these software can be installed on your own computer (usually if you don't know it), collect intelligence from the system and send it to the author of the spyware program or Sellers. Anti-virus programs are often undetectable for spyware, so be sure to use a professional spyware detection removal software.
4: Install and uninstall a large number of programs, especially the beta program
Due to the user's desire for the latest technology, often install and try new software. The free beta program gives you the opportunity to experience new features first. There are also many free software and shareware that can be downloaded from the Internet. We know that some users have also installed pirated software or "warez”.
The more software you install, the more likely you are to use software that contains malicious code, or to use software that is not well-written to cause the system to malfunction or crash. This risk is much higher than using pirated software. Even if you only install commercial software with an authorized final version, excessive installation and uninstallation can mess up the registry. Not all uninstall steps can clean up the rest of the program, which can cause the system to slow down.
You should only install the software you really need, use only legitimate software, and minimize the amount of software installed and uninstalled.
5: Disks are always full and very messy
Frequent installation and uninstallation (or adding and removing any type of data) can make the disk fragmented. The way information is stored on disk causes disk fragmentation: when a file is saved on a new, empty disk, the file is saved on a contiguous cluster. If the file you deleted takes up 5 clusters and then saves a file that occupies 8 clusters, the values ​​of the first 5 clusters will be saved in the 5 empty clusters generated by the deletion, and the remaining 3 will be saved in the next three. Empty clusters. This makes the file fragmented or split. Then when accessing the file, the head does not find all the parts of the file at the same time, but retrieves all the files to different addresses on the disk. This makes the access slower. If the file is part of a program, the program will run slower. A disk that is too fragmented runs very slowly, just like crawling.
You can use the Disk Defragmenter (Program Attachment System Tool) included with Windows or the third-party disk defragmentation tool defrag to rearrange the various parts of the file so that the files can be stored on disk continuously. Another common cause of performance problems and improper application behavior is that the disk is too full. Many programs generate temporary files that require extra space on the disk at runtime. You can use Windows XP's Disk Cleanup Tool or a third-party program to find and delete files that are rarely used, or you can manually delete files to free up disk space.
Copyright © Windows knowledge All Rights Reserved