Seven tricks to avoid illegal intrusion without hacking broilers (2)

  

Point 5: Install anti-virus software, and often check if it works properly, whether it can update virus features

Don't put security issues only Responsible for anti-virus software, security is system engineering, anti-virus software is just one of them. There will always be a virus before there will be an anti-virus software update. In many cases, after installing the anti-virus software, there will be a variety of viruses. But this does not mean that anti-virus software is unnecessary. On the contrary, anti-virus software is very important. If there is no anti-virus software, your system may be worse.

More and more viruses in order to invade your system, first try to abolish anti-virus software. Destroying anti-virus software may be easier than anti-virus software. Because the destroyer's goal is clear, it is the most popular software on the market. It is very easy to work on these kinds of security software. Moreover, virus makers, unlike anti-virus software, must consider the compatibility issues associated with each update. The attacker only focuses on the tasks that the Trojan needs to accomplish. Other consequences, the virus maker does not have to spend a lot of time to consider.

Trojan virus makers hate anti-virus software like this, so that after a lot of Trojans invade, they will first destroy the anti-virus software. As long as the destroyers are willing, targeted anti-virus software can always do When you arrive, users should not expect anti-virus software to be made into a wall. Even the operating system can be destroyed, not to mention anti-virus software.

We can also use the working status of anti-virus software as another testing tool: as long as you observe that anti-virus software suddenly does not work, you should first consider whether it is destroyed by Trojans.

Solution:

Install an anti-virus software that suits you, and check the function frequently during the validity period, such as whether it can start normally, whether it can be upgraded normally, and so on.

Point 6: Be careful with mobile storage devices

Before the Internet evolved, the spread of viruses relied on floppy disks and then gave way to the network. Nowadays, the public is increasingly using mobile storage devices (mobile hard drives, USB flash drives, digital memory cards) to transfer files. These mobile storage devices have become an important channel for Trojan horses to spread. Computer users often refer to such viruses as U disk viruses or AUTO viruses. This means that inserting a USB flash drive will allow the virus to spread from one USB stick to another.

Solution:

Immediately do not hesitate to disable the automatic playback function of the USB flash drive. The convenience of this function is negligible, but the risk of exposure is very important.

Point 7: Safe Internet

One of the important reasons for becoming a broiler is to browse unsafe websites, distinguish between what website is safe and what is not safe. This is for ordinary users. Very difficult. There is also the possibility that the original normal website will be invaded into the Trojan, and there is also the risk of downloading the Trojan on any web page after being attacked by ARP.

There are always opportunities to download Trojans online, and no one can avoid them. It can only mitigate this risk.

The security of the browser needs special attention. The vulnerability of browsers and browser plugins is the favorite of hackers. The flash player vulnerability is a plugin vulnerability. This vulnerability is cross-browser platform, any use. This risk may exist in flash player situations.

Solution:

Fix browser vulnerabilities in a timely manner, and upgrade your browser to the latest version in time to reduce the time it takes to expose a risky system to an attacker.

Avoid browsing some gray sites. Usually such sites have a lot of traffic, such as a large number of living communities, online video communities, chat dating communities, porn sites, gambling sites, and so on. If you visit such a website, if you find that the system is abnormal, you should immediately check it by the method described in "How to detect whether the computer is a 'broiler'."

The above is by no means the whole safety protection. It can be said that it is the most important risk link. Pay attention to the safety protection from the above points. At least the three-legged cat hacker can't take you.

Security protection is dynamic, always be vigilant. For the Internet, it is necessary to have a view that everything is a threat. Just like for a surgeon, in his eyes, everything is contaminated by bacterial viruses, and disinfection is the most basic principle.




Copyright © Windows knowledge All Rights Reserved