Due to the rapid development of the network and various storage devices, the probability of virus transmission has also increased greatly. Although you can protect your system by installing anti-virus software and network firewall, but because of the rapid development of virus technology, even many web pages contain a lot of malicious code, if the user's awareness is not strong, even if the anti-installation Virus software is also very easy to "trick". After reviewing Microsoft's materials and personal experience, we have come up with a set of methods to prevent viruses, hoping to help everyone.
Insert traps Buried under the cloth
If you are using the Win2000/XP/2003 operating system, then you can try the following methods - let your system immune to the virus from the source.
Step 1: First of all, the newly installed operating system (or you can confirm that the system you are currently using is non-toxic), immediately open: "Start → Programs → Administrative Tools → Computer Management → Local Users and Group → User", change the super administrator password to more than ten digits, and try to use a combination of numbers and uppercase and lowercase letters.
Computer Manager
Step 2: Create a user, set its password to more than ten and promote it to super administrator.
The purpose of this is to double insurance: if you forget one of the passwords, there is room to use another super password to log in, so that you are not allowed to be outside the system; Hackers can no longer remotely gain control of your system by guessing your system's supervised passwords.
Step 3: Add two more users, for example, the user names are: nyh1, nyh2; and specify that they belong to the user group. Ok, all the work is done here, and you will need it later. Do not use the super administrator and nyh2 to log in outside the maintenance computer. Just log in with nyh1.
Tip: When creating a new user, the default is the user group. If you want to create an administrator user, after creating a new user, in the "Group", click the Administrators group, click "Add" to add this account to the Administrators group.
Disguise 欺骗 Deceive an attacker
With a trap, how do you use it? We continue, find IE when logging in online, and create a shortcut for it to the desktop, right click on the shortcut, select "Run as other users" point OK! When you want to access the Internet, click this shortcut, it You will be asked for your username and password. You will enter the username and password for nyh2 at this time!
Ok, now you can use this open window to go online, you can go to any malicious page with confidence. , malicious, website and web pages, and no longer have to worry about the trick!
Tip: Don't use nyh2 to log in to the system, because if so, if nyh2 has had any web virus before, then log in user2 At the same time, they are very likely to be activated!
Here are the steps to create an IE shortcut:
Right click on the desktop and select "New → Shortcut" in the pop-up window. Select Iexplore (located in "C:Program FilesInternet ExplorerIexplore.exe") and click "Next" to complete. Then right-click on the shortcut, select "Properties", then click on "Advanced Button" and check the box before running "Other User".
Golden hull shelling swaying poisoning trouble? ?
When you click IE on the Internet, the following window will appear, enter nyh2 and password. However, when there is always negligence, what should I do if I accidentally receive a virus file from someone else or receive a virus file from the mail? Don't worry, now we can enjoy the golden husking technique!
Restart the computer and log in with the super administrator - don't run any programs after entering the system, you will be surprised to find the system. Even the performance is completely non-toxic! It would be better, now open immediately: "Start → Programs → Administrative Tools → Computer Management → Local Users and Groups → Users"!
Put the nyh1 inside And nyh2 two users are all deleted, you only need to delete this gently, then the virus that existed with these two users will follow the disappearance of these two users and go to sleep together. (It seems to be a funeral, huh, huh!). After doing this, make sure that your Windows is like a new one. Any system files and system processes are completely virus-free!
Good! Now repeat the steps to create two new nyh1 and nyh2. User
The current LAN is quite popular, and often encounters the following conditions: A new client is ad
Step by step to teach you to beautify your computers desktop theme. I believe that long-term f
1, first install in DOS environment, enter DOS and go to the directory disk you want to install WIND
Normally, the user clicks on my computer to view the system properties, but there is a system attrib
Xp system operation beautification one-stop tutorial
The failure of surfing the Internet is related to the performance of the network card.
XP inserts the U disk without a drive letter to display the fault. The
Windows 98 Registry Tips 100 (below)
Microsoft warns Windows 2000/XP DirectX new vulnerability
Win XP SP4 received Microsoft indirect confirmation
A simple move makes the windows registry fault recovery normal
The virus causes the input method to be invalid.
Win8 system development with anti-hacker anti-virus function
QQ is not as simple as the imagination. Open
How to change the Win10 username? How to change the Win10 username?
How to set up win360 system to open or close 360 browser gesture function?
After Win10 system reboots, it is often prompted to click here to enter your latest credentials.
Primary and secondary school campus network server procurement guide
How to solve the Win10 application list blank?
What is the main function of memory in the computer?
Winlogon.exe is corrupted when starting XP
How to solve the shellexperiencehost.exe program under Win10
Installation win7 can not select the first partition Problem Solving