Stay away from system security taboos Master computer security recommendations

  
We have done stupid things, and computer users are no exception. Inadvertently pressing the wrong combination key or unchecked "OK" on the error dialog box may change the important settings, which will affect the behavior of the computer and even cause the system to crash. Nervous newcomers often fear that a wrong operation will permanently damage the computer. Fortunately, the results are not as serious as you might think. Even so, users often create troubles with computers and your network. Here are some common mistakes that you and your users can take to stay away from preventable problems. 1: Use a power supply without overvoltage protection This error can really destroy the computer equipment and the data stored on it. You might think that the system will only be dangerous when a thunderstorm occurs, but in fact any factor that can interfere with the circuit to cause current backflow can burn your device components. Sometimes even a simple action, such as turning on a device in the same circuit as a computer device (especially a high-voltage device such as a hair dryer, electric heater or air conditioner) can cause a surge, or a wire on a branch can cause a surge. . In the event of a power outage, there is also a surge when power is restored. Using a surge protector protects the system from power surges, but keep in mind that most inexpensive surge protectors can only withstand a single surge and then need to be replaced. The uninterruptible power supply (UPS) is better than the surge protector. The UPS's battery can make the current stabilize, even if the power is off, it can give you time to shut down the equipment. 2: Going online without a firewall Many home users will not hesitate to connect their computers to beautiful new cables or DSL modems and start surfing the Internet without realizing that they are exposing themselves to viruses and intruders. Whether it's a broadband modem or a firewall built into a router, a separate firewall device between a modem or router and a computer, or a server running firewall software at the edge of the network, or a personal firewall software installed on a computer (such as built into Windows XP) ICF/Windows Firewall, or third-party firewall software like Kerio or ZoneAlarm) In short, all computers connected to the Internet should be protected by a firewall. The benefit of a personal firewall installed on a laptop is that it has a firewall when the user is on the road with a computer or plugged into a hotel DSL or cable port, or connected to a wireless hotspot. Having a firewall is not all. You also need to make sure that the firewall is turned on and properly configured to protect it. 3: Ignore the operation and upgrade of anti-virus and anti-spyware Let's face it: anti-virus programs are very annoying. They always block some of the apps you want to use, and sometimes you have to stop the antivirus program when you install new software. And in order to ensure utility, you have to upgrade frequently. It seems that the original version is always out of date, and urges you to upgrade, in many cases, the upgrade is a fee. But in the current environment, you can't afford the consequences of not using anti-virus. Malicious programs such as viruses, trojans, and worms can not only weaken and destroy the system, but also spread viruses to other parts of the network through your computer. In extreme cases, it can even destroy the entire network. Spyware is another growing threat; these software can be installed on a computer (usually if you don't know it), collect intelligence from the system and send it to the author or vendor of the spyware program. Anti-virus programs are often undetectable for spyware, so be sure to use a professional spyware detection removal software. 4: Installing and uninstalling a large number of programs, especially beta programs Due to the user's desire for the latest technology, new software is often installed and tried. The free beta program gives you the opportunity to experience new features first. There are also many free software and shareware that can be downloaded from the Internet. We know that some users have also installed pirated software or "warez". The more software you install, the more likely you are to use software that contains malicious code, or to use software that is not well-written to cause the system to malfunction or crash. This risk is much higher than using pirated software. Even if you only install commercial software with an authorized final version, excessive installation and uninstallation can mess up the registry. Not all uninstall steps can clean up the rest of the program, which can cause the system to slow down. You should only install the software you really need to use, use only legitimate software, and minimize the amount of software installed and uninstalled. 5: Disks are always full and very messy Frequent installation and uninstallation of programs (or the addition and removal of any type of data) can cause the disk to become fragmented. The way information is stored on disk causes disk fragmentation: when a file is saved on a new, empty disk, the file is saved on a contiguous cluster. If the file you deleted takes up 5 clusters and then saves a file that occupies 8 clusters, the values ​​of the first 5 clusters will be saved in the 5 empty clusters generated by the deletion, and the remaining 3 will be saved in the next three. Empty clusters. This makes the file fragmented or split. Then when accessing the file, the head does not find all the parts of the file at the same time, but retrieves all the files to different addresses on the disk. This makes the access slower. If the file is part of a program, the program will run slower. A disk that is too fragmented runs very slowly, just like crawling. You can use the Disk Defragmenter tool (Program Attachment System Tool) included with Windows or the third-party disk defragmentation tool defrag to rearrange the various parts of the file so that the files can be stored on disk continuously. Another common cause of performance problems and improper application behavior is that the disk is too full. Many programs generate temporary files that require extra space on the disk at runtime. You can use Windows XP's Disk Cleanup Tool or a third-party program to find and delete files that are rarely used, or you can manually delete files to free up disk space. 6: Open all attachments Some people just can't control themselves: receiving an email with an attachment is like receiving an unexpected gift. You just want to peek at what attachments are. But as if there might be a bomb in the package in front of you, the file attachment in the email may contain a code that can delete the file or system folder, or send a virus to all contacts in the address book. The most dangerous attachments that are most easily inspected are executable files (that is, code that can be run), with extensions .exe, .cmd, and many other types. Files that cannot be run by themselves, such as Word's .doc files, and Excel's .xls files, can contain built-in macros. Scripts (VisualBasic, JavaScript, Flash, etc.) cannot be executed directly by the computer, but can be run through a program. In the past, plain text files (.txt) or image files (.gif, .jpg, .bmp) were generally considered safe, but not now. File extensions can also be disguised; intruders can use Windows defaults to not display normal file extension settings, and set the executable name to something like greatfile.jpg.exe. The actual extension is hidden and only shown as greatfile.jpg. This way the recipient will assume that it is an image file, but it is actually a malicious program. You can only open an attachment if you are sure that the attachment source is reliable and you know what it is. Even if the messages with attachments seem to come from people you can trust, it's possible that some people masquerade their addresses like this, even if the sender's computer is infected with a virus and sends them without their knowledge. Attached. 7: Click on all links Opening an attachment is not the only problem that the mouse can bring you. Clicking on an email or a hyperlink on a web page can take you to a web page that is populated with ActiveX controls or scripts. With these, you can perform various types of malicious behavior, such as cleaning your hard drive or installing backdoor software on your computer. You can sneak into and seize control. Please do not yield to "click madness". Be sure to consider it before clicking on the link. Some links may be disguised as phishing messages or pages that might take you to other websites. 8: Sharing or similar sharing behavior Teachers teach us to share is a good behavior, but on the Internet, sharing may expose you to danger. If you allow file and printer sharing, others can connect to your computer remotely and access your data. Even if you don't set up a shared folder, Windows systems hide the manageable share on the root of each disk by default. A hacker can potentially use these shares to hack into your computer. One solution is to turn off file and printer sharing if you don't need a network to access any files on your computer. If you are using a laptop on a public wireless hotspot to connect. If you do need to share certain folders, be sure to protect the folder with a share-level license and file-level (NTFS) license. Also make sure your account and local administrative account passwords are secure enough. 9: Using the wrong password This is another common mistake that exposes us to intruders: using the wrong password. You should do this even if no administrator in your network environment forces you to choose a strong password and change it regularly. Don't use passwords that are easy to guess, such as your birthday, lover's name, social security number, etc. The longer the password, the less likely it is to be cracked, so your password is at least 8 digits, 14 is better. The commonly used password cracking method uses the "dictionary" cracking method, so do not use the words that can be found in the dictionary as passwords. For security reasons, passwords should be a combination of letters, numbers, and symbols. Very long meaningless string passwords are hard to crack, but if you have to write down the password because you can't remember the password, it violates the original intention of setting the password, because the intruder may find the password. You can make a phrase that is easy to remember and use the first letter of each word, as well as numbers and symbols to generate a password. For example, use "MycatateamouSEOnthe5thdayofJune" to get the password "Mc8amot5doJ." 10: Ignore the need for a backup and recovery plan. Even if you listen to all the suggestions, the intruder may still get rid of your system, your data may be tampered with, or Erase due to hardware problems. Therefore, backing up important information and setting a recovery plan for system failures has a very important position. Most computer users know that they should be backed up, but many users never make backups, or they have done backups but never upgraded them regularly. Use the built-in Windows backup program (Ntbackup.exe built into Windows NT, 2000, and XP) or a third-party backup program and a regular backup program that can automatically back up. The backed up data should be stored on a network server or a removable drive away from the computer itself to prevent disasters such as floods, fires, and tornadoes. Keep in mind that data is the most important thing on your computer. Both the operating system and the application can be reinstalled, but rebuilding the raw data is a task that is difficult or impossible to accomplish. Still, backing up system information can save time and reduce frustration. You can create a disk image using the usual Ghost or Gram program. This allows you to quickly recover your system without having to go through a tedious installation process.
Copyright © Windows knowledge All Rights Reserved