Ten repair methods to eliminate hidden dangers in one step (2)

  

Repair 4: Avoid Social Engineering

Social Engineering, a psychological weakness through the victim Instinctive reactions, curiosity, trust, greed and other psychological traps such as deception, injury and other harmful means, the way to obtain their own interests, has become a trend of rapid rise or even abuse in recent years. Even people who think they are the most vigilant and least minded will be harmed by sophisticated social engineering methods.

To do this, you need an easy-to-use yet powerful tool: VirusTotal.com. It allows you to easily upload any suspicious files (up to 10MB) to the site, and then launch up to 35 different anti-virus software, including Kaspersky, McAfee and Symantec. Scans are performed and the scan results are displayed separately for reference. If you get multiple warnings, even if you include a warning for the file name, you should delete the file.

Figure 6: You can easily send arbitrary files to the VirusTotal free tool for online checks

If you don't have enough comprehensive scan results and warnings, there is no guarantee that every file is safe. If you are not 100% sure, then use VirusTotal.com to scan every email or file you downloaded, at least to help you avoid social engineering violations.

Fix 5: Preventing Rapidly Changing Malware

Previously, signature-based anti-virus software appeared to be a bit overwhelming in the face of massive rogue software. The attacker tried to create more mutated viruses to evade detection by the virus database. Therefore, in addition to signature anti-virus software, it is mostly trustworthy in actively detecting viruses, because some viruses do not all need a complete signature.

In fact, a more effective way is to use behavior analysis. Determine the level of danger by monitoring the operation of malware on your computer in real time. If you only have anti-virus software on your computer, that's probably not enough. We recommend that you use ThreatFire again - also a free tool that provides additional behavioral protection. In a recent test, up to 90% of malware was correctly detected by behavioral analysis.

ThreatFire is very different from traditional anti-virus software. Conventional antivirus products often must identify and detect threats before they provide adequate protection. Once a threat is discovered, antivirus researchers must provide code and then provide the code to the user in the form of a signature or fingerprint update to provide protection. This takes a long time, during which the threat cannot be detected, so even if your computer is equipped with anti-virus software, it will be infected.

ThreatFire continuously protects your computer against attacks by detecting malicious behavior, including detectable keystrokes or data theft, rather than looking for known threats like regular anti-virus software. By using sophisticated real-time behavioral analysis, ThreatFire can stop a "zero-day threat" that has never occurred before by detecting malicious activity.

ThreatFire is an advanced technology designed to serve everyone, not just for experts. Once ThreatFire is installed, you don't need to deal with any technical issues. In fact, you will only be aware that it protects your system when ThreatFire detects malware and requires your attention.

Figure 7: ThreatFire Tools

Fix 6: Keep your mailbox away from spam

The current spam filter is getting more powerful, but some spam Still able to enter your mailbox. Although it's not wise to delete all email addresses, we recommend that you remove the disposable email address.

Such an address is actually something that everyone may have encountered. For example, every time you log in to a forum, shop online, or get some other service, they will ask you to enter your email address. If you find that the forum or website is full of spam or malicious code, you can choose not to enter your own email address, or simply fill in a non-existent email address (eg [email protected]). In addition, I also recommend that you use 2 or more email addresses. what are the benefits? For example, if you participate in online shopping, you can use a mailbox that is not very important, and if you are involved in personal interaction, you can use your personal private mailbox.

In addition, you can also sign up for a paid email account. For example, Yahoo's Web Mail users can choose a $20 pay-per-mail service a year. In addition to providing general services, it can also provide a disposable mail service. With this feature, you can create a new, disposable email address in ten seconds for certain websites. Gmail users can append "+whatever" to the email addresses they use frequently. But if the address starts to receive spam, you can't simply turn it off. You must create a mail filter for this address.

For others, we recommend using the free Spamgourmet.com service (a delicious spam email station). It provides a one-time email address that will get you out of spam. Currently the website has a Chinese interface, you only need to register on the website to use it.

Figure 8: Delicious spam email station

Copyright © Windows knowledge All Rights Reserved