Repair 4: Avoid Social Engineering
Social Engineering, a psychological weakness through the victim Instinctive reactions, curiosity, trust, greed and other psychological traps such as deception, injury and other harmful means, the way to obtain their own interests, has become a trend of rapid rise or even abuse in recent years. Even people who think they are the most vigilant and least minded will be harmed by sophisticated social engineering methods.
To do this, you need an easy-to-use yet powerful tool: VirusTotal.com. It allows you to easily upload any suspicious files (up to 10MB) to the site, and then launch up to 35 different anti-virus software, including Kaspersky, McAfee and Symantec. Scans are performed and the scan results are displayed separately for reference. If you get multiple warnings, even if you include a warning for the file name, you should delete the file.
Figure 6: You can easily send arbitrary files to the VirusTotal free tool for online checks
If you don't have enough comprehensive scan results and warnings, there is no guarantee that every file is safe. If you are not 100% sure, then use VirusTotal.com to scan every email or file you downloaded, at least to help you avoid social engineering violations.
Fix 5: Preventing Rapidly Changing Malware
Previously, signature-based anti-virus software appeared to be a bit overwhelming in the face of massive rogue software. The attacker tried to create more mutated viruses to evade detection by the virus database. Therefore, in addition to signature anti-virus software, it is mostly trustworthy in actively detecting viruses, because some viruses do not all need a complete signature.
In fact, a more effective way is to use behavior analysis. Determine the level of danger by monitoring the operation of malware on your computer in real time. If you only have anti-virus software on your computer, that's probably not enough. We recommend that you use ThreatFire again - also a free tool that provides additional behavioral protection. In a recent test, up to 90% of malware was correctly detected by behavioral analysis.
ThreatFire is very different from traditional anti-virus software. Conventional antivirus products often must identify and detect threats before they provide adequate protection. Once a threat is discovered, antivirus researchers must provide code and then provide the code to the user in the form of a signature or fingerprint update to provide protection. This takes a long time, during which the threat cannot be detected, so even if your computer is equipped with anti-virus software, it will be infected.
ThreatFire continuously protects your computer against attacks by detecting malicious behavior, including detectable keystrokes or data theft, rather than looking for known threats like regular anti-virus software. By using sophisticated real-time behavioral analysis, ThreatFire can stop a "zero-day threat" that has never occurred before by detecting malicious activity.
ThreatFire is an advanced technology designed to serve everyone, not just for experts. Once ThreatFire is installed, you don't need to deal with any technical issues. In fact, you will only be aware that it protects your system when ThreatFire detects malware and requires your attention.
Figure 7: ThreatFire Tools
Fix 6: Keep your mailbox away from spam
The current spam filter is getting more powerful, but some spam Still able to enter your mailbox. Although it's not wise to delete all email addresses, we recommend that you remove the disposable email address.
Such an address is actually something that everyone may have encountered. For example, every time you log in to a forum, shop online, or get some other service, they will ask you to enter your email address. If you find that the forum or website is full of spam or malicious code, you can choose not to enter your own email address, or simply fill in a non-existent email address (eg [email protected]). In addition, I also recommend that you use 2 or more email addresses. what are the benefits? For example, if you participate in online shopping, you can use a mailbox that is not very important, and if you are involved in personal interaction, you can use your personal private mailbox.
In addition, you can also sign up for a paid email account. For example, Yahoo's Web Mail users can choose a $20 pay-per-mail service a year. In addition to providing general services, it can also provide a disposable mail service. With this feature, you can create a new, disposable email address in ten seconds for certain websites. Gmail users can append "+whatever" to the email addresses they use frequently. But if the address starts to receive spam, you can't simply turn it off. You must create a mail filter for this address.
For others, we recommend using the free Spamgourmet.com service (a delicious spam email station). It provides a one-time email address that will get you out of spam. Currently the website has a Chinese interface, you only need to register on the website to use it.
Figure 8: Delicious spam email station
Every function of the control panel in the WinXP system is very useful, especially in the management
When it comes to replacing the Windows boot screen, many friends will not find a tool such as eXeSco
When you use the built-in clean disk function in Windows, you often find that it does not completely
Microsoft released a rather shocking news, stating that the xp system will be out of the historical
Help WindowsXP to do a big cleaning Clean up the garbage tricks to appear
Computer xp system restore does not work for several reasons
Dual system or multiple systems share windowsFonts folder
Windows 98 updates the system without registration
Share the best way to restrict access to your computer's disk using Windows XP Group Policy
The master has gotten the DNS resolution failure. There are coups
Let you use win7 to achieve WIFI sharing online
10 great ideas to make your Vista firewall better
Sharing English XP operating system Chinese characters garbled problem
Microsoft CEO Steve Ballmer demonstrates several new features for Windows 8
Win8 system multi-display function experience
Win8 how to defragment the hard disk
Win7 and Win8.1 versions of the free upgrade Win10 official version of the classification navigation
How to delete desktop IE icon in Win7 system
Solve the method that Windows 7 system menu bar can't hide
What is the use of famine gold? How to get famine gold
Windows XP can't upgrade Windows 10 solution
Cleverly add a shutdown icon to the Win8 start screen method
Win7 computer input 192.168.1.1 address can not open the router interface how to solve