System tutorial training your WINDOWS immune virus

  
                Is the computer immune to human beings? The following system home will teach you some ways to prevent computer poisoning to reduce the chance of computer poisoning. This tutorial is for the WINDOWS operating system. 1. Firewall and antivirus software must be installed. No matter what kind of master you are, these two softwares still need to be installed. Although in the face of new viruses, anti-virus software will become overwhelmed, it is better to go online to find anti-virus methods. But there is an additional barrier to anti-virus software. No matter how high or how short this barrier is, it always benefits more than harm. The firewall must also be installed. It is also best to install some programs that monitor the network process to monitor whether malicious programs are operating illegally. 2, for the Administrator user to reduce the rights In the Windows operating system, the Administrator is the most advanced user, can not be seen in the normal login mode, so it is easy to ignore the security problems brought by the Administrator user. The initial password of the Administrator user is empty. If the firewall is not installed, the hacker can easily access your computer through the Administrator account. It’s too late to do anything at this time. In fact, this is not a downgrade, it is to create a fake, unrealized Administrator user. To do this, log in to Windows as a non-Administrator administrator account, then open: Control Panel - Administrative Tools - Computer Management - Local Users and Groups - Users, delete the Administrator user, create a new Administrator user, right click on Settings Passwords, how complex and complex the passwords are, make them belong to the lowest level of user groups, and check the account is disabled in the properties. In this way, even if someone else cracked your Administrator account, after entering, they found that it was just an account that did not use real power. 3, prohibit all disks automatically run Now U disk virus is prevalent, a little careless will lead to "grid". The general operating mechanism of the U disk virus is automatically run by double-clicking the drive letter. Therefore, disabling the automatic operation of all disks is a very effective preventive measure. The specific operation process is: run the input gpedIT.msc-->User Configuration-->Administrative Template-->System, double-click [Automatically Close] in the list on the right, select “All Drives, and then Select “Started”. Make sure to quit. 4, do not double-click the U disk If you do not use to prohibit all disks automatically run, or you use a USB flash drive on someone else's computer, it is best not to double-click the U disk. This is very easy to trigger a U disk virus, the best way is to first scan with anti-virus software. The general way to clear the virus in the U disk is to go through the resource manager and see if there is an autorun.inf file in the U disk, which is usually hidden. Delete the autorun.inf file and the program it points to, then re-plug the USB flash drive. 5, often check the boot startup items often enter msconfig in the run to view the startup items, found that there are abnormalities immediately on the Internet to find information to see if it is a virus. 6. Back up important data frequently Some important data must be backed up frequently, such as important pictures, personal information, and so on. Burn important information for about a month, just in case. 7, use Ghost often use Ghost backup operating system disk, directly recover the entire system disk when encountering serious problems, this is lazy practice, too lazy to find the hidden place of the virus, but at the same time is also an efficient and fast method. The problem is that you must always use Ghost for backups, otherwise you will lose your system disk and lose at least the recently installed program (registration information). 8. Privacy files need to be encrypted Use some encryption programs to encrypt files that you think cannot be circulated to the public. There are many such free software on the Internet. Don't think that you can hide the file. Hidden is just a way of self-deception, encrypted. 9, using Firefox Firefox is not a panacea, but better than IE, compared to IE, using Firefox can effectively reduce the chance of poisoning. 10, the use of complex passwords This is a commonplace topic, but there are many people using simple digital passwords, such as birthdays, ID numbers, etc., which is extremely easy to guess. “Don't worry, my birthday is only known to my friends”, who said your friends will not peek at your privacy? 11, do not tell anyone your password In the chat tool to tell others your password you will face four kinds of risks: A, your computer may be hanged, the password was stolen. B. Chat tool providers may also steal your password. C. The chat partner may use your trust in him to do dishonest behavior. D, the chat party's computer is poisoned, and your password is stolen. 12. Don't just pick up the files casually. Especially in QQ, if someone sends a file, don't accept it without saying anything. This is very dangerous. Be sure to ask what other people are sending, is he taking the initiative to send it. Do not run immediately after receiving, first scan it with anti-virus software, understand the above 12 points, and practice them in daily work, I think your computer is a robust PC. System home makes your computer healthier.
Copyright © Windows knowledge All Rights Reserved