How to remove system garbage that software has not noticed

  
System cleaning is like a cleaning before a health check. Even if you use your milk to clean up all possible places, you will leave behind the corners. The following system home Xiaobian tells you how to remove system garbage that the software has not noticed. With the improvement of computer security awareness, more and more friends began to pay attention to their own computer security, and also know to install 360 series software to "armed" themselves. I especially pay attention to the information such as online records and passwords that involve my own privacy. I use these security software to clean up from time to time, and I am confident that the security issue will be fixed. In fact, the problem is far from simple. This article takes you into these forgotten corners to explore. Index.dat A place to hide big secrets If you use the default local search function of Windows to search Index.dat, then I believe that you basically get nothing, even if you open the resource manager, click on the "Tools" "/“ file The "Clip Options" command opens the "View" option, the "Hide Protected Operating System Files (Recommended)" checkbox is canceled, and the "Show all files and folders" item is selected and re-selected. Search, the ending is basically the same. But if you change a search tool, such as the light speed search & rdquo; used by the author, with Index.dat as the keyword, the result will surprise you, because the speed of light search will list the Index.dat files scattered in multiple places on the hard disk. , as shown. What is the Index.dat file used for? What's in it? Through the professional Index.dat analysis software Index.dat Suite can help you see everything. Run the software, click the Index.dat finder button on the toolbar, select Index.dat in the “Searcher for" item, select the system disk (default all hard disks) in “Search in", click the “Finder” button You will see a lot of Index.dat files and their locations later. The larger the file, the more privacy it contains. Choose one of them, such as C:\\Users\\Administrator.GXNWJZASZGHTLHT\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\index.dat, right click and select &ldquo ;View file contents”/“Using internal viewer” command, click the "OK" button in the dialog box that appears, you will find that the online records after 360 software cleanup are saved here, including the URL , pictures, animations, etc. are many, as shown. How to delete it? In Windows, even traces are not found, and deletion is even more difficult. Of course, you have to choose the professional software Index.dat Suite. In addition to deleting the file after clicking the “Clear Results” button, you can also delete it automatically. Click on “Generate File” on the toolbar. After clicking the “OK" button in the window that appears, the software will automatically create a batch file called Run.bat, which will be restarted on the computer. Automatically runs when the selected Index.dat file is deleted. Because the system will be rebuilt after the Index.dat is deleted, the batch file will automatically delete the contents of the file to be empty, so that others have no way of knowing your online records. Cookie cookies are not sweet. Cookie English cookies are originally used to provide us with a convenient cache file, such as remembering our login status, etc. to reduce duplicate input. But everything has its two sides, and today's cookies are also tools for collecting personal information from users with ulterior motives. Moreover, from the perspective of the development of cookies, a variety of cookies have been generated and exist in multiple locations of the user system (the JavaScript API evercookie displayed on the website by hacker Samy Kamkar is 13 locations). The most common of these include HTTP cookies and Flash cookies. Http cookies are more common, and Flash cookies are a bit strange to some friends. So what does the Flash cookie do? For example, open any browser to enter Baidu MP3 search, open Baidu music box without logging in to Baidu account, just listen to a few songs, then you can see the audition in the audition history of Baidu music box. song. Next, we use the browser's own delete function to clear the cookie, and then re-open the Baidu music box after cleaning, you will find the song information you tried before, open the Baidu music box with any browser, you can find the previous audition history. This is one of the functions of the Flash cookie. Compared to Http cookies, Flash cookies are more powerful, not only have larger capacity, but also have no default expiration time, and can be stored in different locations, so it is difficult for ordinary users to handle them. After upgrading Flash Player to the latest version, click on the “Flash Player” setting option in the “Control Panel> and then go to the "Storage" tab to access the locally stored Flash cookie. Click the “Local Storage Settings...” button to view the current Flash cookies on your computer. As shown in the figure, after the deletion, the previous audition records will no longer appear. If you prefer personal privacy, you can check the "Allow all sites to store information on this computer" checkbox, but all Flash-related information that was previously retained is gone. Password Forms Clearing the software ignores the fact that when you browse the web, especially when you visit the forum, the account and password are required. To this end, many browsers have also set up features such as "smart filling" & rdquo;. In fact, it is safe to say that it is not necessary to say more, through the small software WebBrowserPassview (http://xingke.newhua.com/down/webbrowserpassview.zip) can explain the problem. After the author completes the cleanup operation using 360 security guards, the software will be found, and the three information in the IE login process will be listed in the window, as shown in the figure, two of which indicate the password in plain text. It can be seen that the automatic saving of the password form set for convenience is very insecure. Even some browsers that are known for their security are not as safe as they are supposed to be. For example, the automatic filling of the 360 ​​security browser and the quick login plug-in, the account password is stored in the subfolder of the “extensions” folder under its data folder. Users simply migrate their entire account to another computer and overwrite the same folder to quickly log in to the relevant account. Therefore, for online banking and other accounts, do not set to automatically save. Try to use the browser's invisible mode when logging in, and use a special set of accounts and passwords for these accounts to ensure security. The secret and careful friends you are directed to online advertising may find that when you open some websites or software, you will see ads related to your browsing content. You must be very strange, how did you get targeted by targeted advertising? There may be at least two aspects. One is that when the browser accepts the cookie, the server detects whether the user's computer has accessed the website. If the first visit, a cookie is created on the user's computer, and the user accesses again. When the website is used, the website will be able to identify the user through the cookie. Even if the user does not register on the website, the website can understand the user's preferences and recommend related products. The solution to this situation is relatively simple, just update the relevant Hosts file. At http://mvps.org/winhelp2002/hosts.htm, there are enthusiasts who have compiled the Hosts file and added it to the Hosts file under Windows\\System32\\drivers\\etc" (Windows Vista and Windows 7 need to be managed). The privilege of the user can prevent you from collecting your personal information, and you can prevent the browser from rejecting the cookie and continue to enjoy the convenience of the cookie. There is also a situation where some software you trust is sold. To solve this problem, it is necessary to highlight the value of the HIPS firewall. This is mainly to solve the problem by using the powerful Defense+ function of Comodo Firewall (http://www.comodo.cn/product/download/firewall_w.php). Step 1: After the software is running, select the “Defense+” label, which is the most essential part of the Comodo firewall, namely “Active Defense”. Here, QQ is used as an example. Click the “Computer Security Rule” link and select the “Trust Software Vendor” tab in the pop-up window to find all the vendor signature information with Tencent as the keyword. The keyword Tencent, the software will automatically list the name of the manufacturer with the keyword, otherwise it will be very difficult to find it. Click on the “Remove” button and “OK” to confirm it from the list of trusted software vendors. Remove; then click the “trusted files” link to remove the qq.exe and TXPlatform processes from the list of trusted files. The explanation here is the same, because Comodo Firewall considers Tencent and its products to be safe by default, so it needs to be deleted. For companies or processes that have not been certified by the firewall, this step is exempt. In addition, the firewall is also prohibited from being updated, otherwise the default trusted company and products will be added to the trust list. Step 2: Next, Comodo Firewall will monitor and block the behavior of QQ. Here you can find QQ in the “Computer Security Rules” setting window, click on the “Defense+” tab window, click &ldquo ; Edit & rdquo; button, select the "Use custom rules" check box in the pop-up window, and then click the "Customize" button to open the rule settings window, in the "Access rights" tab will be "<quo; ; Prevent inter-memory memory accesses, "access protected COM interfaces", "protected registry keys", "protected files/directories" and other items set to "block" Behavior, & ldquo; determine & rdquo; then switch to & ldquo; protected files and folders & rdquo;, the protection of the web cache folder, basically can prevent software voyeur privacy. This article comes from [System Home] http://www.xp85.com
Copyright © Windows knowledge All Rights Reserved