Xuanbing weapon teaches you to play with your computer as you like

  
        Speaking of playing computer, many friends may think that the computer will not be used. I want you to teach. Actually, there are actually a lot of skills in computer use. Today, we will share with you the usual use skills to make your computer more Ok work for you! 1. View CPU dynamics and processes: Press CTRL+ALT+DELETE to enter the task manager. First, check if there are some suspicious processes, and if suspicious processes are deleted in time; second, you can always master the CPU usage of your PC. In the 100% state of use, it is likely to be a virus. 2. Regularly clean up the computer disk: There are many ways, the simplest is that there is a disk defragmentation program in the system tool, you can do it, and you can download and use the 3721 Internet Assistant ( In foreign countries, this is listed as rogue software, huh, huh), repair IE that has been maliciously tampering, you can also clean up the COOKIES and records generated by the Internet. Of course, it is sometimes inconvenient to use this, it will prevent some windows from popping up. However, this is more beneficial than harm. 3, anti-virus software for use: Do not use an anti-virus software for a long time, may also have a decline in immunity. I have used a lot of anti-virus software before, but now I recommend Jinshan to everyone Drug tyrant anti-virus suit, it automatically updates the virus database every day, automatic upgrade, very convenient, monitoring the Internet process at any time. Active defense ability is strong. Of course, Regardless of the anti-virus software, the key is to remember to update the virus database and upgrade in a timely manner. 4. Trojan killing: For Trojans, there are also some ways: first understand the route of Trojans: mail spread: Trojans are likely to be placed Send it to you in the attachment of the mailbox. Therefore, generally you do not know the person sent by the mail with attachments, you better not download and run, especially the attachment name is *.exe; qq spread: because qq has file transfer function, so now there are many Trojans through QQ propagation. The vandals usually tie the Trojan server program through the merge software and other executable files, and then lie to you that it is a fun stuff. If you accept it, you will become the victim of the Trojan; 3: Download Communication: When downloading software on some personal websites, it may be downloaded to the Dongdong with a Trojan server. Therefore, it is best to compare well-known websites if you want to download the tools. For the prevention and control of Trojans, I recommend the use of Trojan scavengers. You can kill many Trojans and their variants. Some daily maintenance and use of computers must be done. If your computer is used smoothly, it must be used normally. Be careful!
Copyright © Windows knowledge All Rights Reserved