A lot of time for the average user is most afraid of computer
become broiler, computer
poisoning and other emergencies, then how For better protection computer
safe operating environment, windows series system has its own security protection mechanism, but if the computer
related improper operation or some permissions are not properly set, it is possible to become Broiler in the hands of hackers.
In the process of using some permissions settings, there are some basic operations carefully. In fact, computer poisoning is not so simple, now most of the experience, the computer has a certain degree of friends on windows They all like to streaking, but they are not necessarily poisoned. Then take a look at the 13 notes that the Bean System Editor has summarized to help you protect your computer environment from infringement.
Notes 1. Decommissioning for the Administrator User
In the Windows
OS
, the Administrator is the most advanced user, in normal login Modes are invisible, so it's easy to ignore security issues caused by Administrator users.
The initial password of the Administrator user is empty. If the firewall is not installed, the hacker can easily access your computer through the Administrator account. It’s too late to do anything at this time.
In fact, this is not a downgrade. It is to create a fake, unrealized Administrator user.
The specific operation is as follows, first log in to Windows with a non-Administrator administrator account, and then open: Control Panel - Administrative Tools - Computer Management - Local Users and Groups - Users, delete the Administrator user, and then create a new one. Administrator user, right-click to set the password, how complicated the password is, make it belong to the lowest level user group, and check the account is disabled in the properties.
This way, even if someone else cracked your Administrator account, it was found to be just an account with no real power.
Notes 2, often check the boot startup items
often enter msconfig in the run to view the startup items, found that there are abnormalities immediately on the Internet to find information to see if it is a virus.
Note 3: Using complex passwords
This is a commonplace topic, but there are still many people who use simple numeric passwords, such as birthdays, ID numbers, etc. This is extremely Easy to guess. “Don't worry, my birthday is only known to my friends.” Who says your friends will not peek into your privacy?
Notes 4. Firewalls and anti-virus software must be installed
No matter what kind of master you are, these two softwares still need to be installed. Although in the face of new viruses, anti-virus software will become overwhelmed, it is better to go online to find anti-virus methods. But there is an additional barrier to anti-virus software. No matter how high or how short this barrier is, it always benefits more than harm.
Windows7 system firewall is also necessary to install, and it is best to install some programs to monitor network processes, and always monitor whether there are malicious programs in the illegal operation.
Note 5: All disks are forbidden to run automatically
U disk viruses are prevalent today, and a little carelessness will result in "grid". The general operating mechanism of the U disk virus is automatically run by double-clicking the drive letter. Therefore, disabling the automatic operation of all disks is a very effective preventive measure.
The specific operation process is: run the input gpedIT.msc-->User Configuration-->Administrative Template-->System, double-click [Close AutoPlay] in the list on the right, select “ All drives & rdquo;, then select “ has been activated & rdquo;. Make sure to quit.
Notes 6. Don't double-click the USB flash drive
If you don't use all the disks to run automatically, or if you use a USB flash drive on someone else's computer, it is best not to double-click the USB flash drive. This is very easy to trigger a U disk virus, the best way is to first scan with anti-virus software.
The general removal method for viruses in the U disk is to go through the resource manager and see if there is an autorun.inf file in the U disk, which is usually hidden. Delete the autorun.inf file and the program it points to, then re-plug the USB flash drive.
Notes 7. Back up important data frequently
Some important data must be backed up frequently, such as important pictures, personal information, and so on. Burn important information for about a month, just in case.
Notes 8. Use Ghost
Use Ghost to back up the operating system disk frequently. If you encounter serious problems, directly restore the entire system disk. This is a lazy way, too lazy to find the hidden place of the virus. But it is also an efficient and fast method. The problem is that you must always use Ghost for backups, otherwise you will lose your system disk and lose at least the recently installed program (registration information).
Notes 9. Privacy files need to be encrypted
Use some encryption programs to encrypt files that you think cannot be blamed on the public. There are many such free software on the Internet. Don't think that you can hide the file. Hidden is just a way of self-deception, encrypted.
Notes 10. Use Google
The reason why Google is recommended is because of the website security information provided in Google Search. Google will give you a hint when a search page contains a virus or Trojan.
Notes 11. Using Firefox
Firefox is not a panacea, but it is better than IE. Compared with IE, using Firefox can effectively reduce the chance of poisoning.
Notes 12. Don't tell anyone your password
Take someone your password in the chat tool. You will face 4 risks:
A, your The computer may be hanged and the password is stolen.
B, chat tool providers may also steal your password.
C. Chatting parties may use your trust in him to do dishonest behavior.
D, the chatter's computer is poisoned, and your password is stolen.
Notes 13. Don't just accept the file
Especially in QQ, someone else sends a file, don't accept it without saying anything, this is very dangerous. Be sure to ask what other people are sending, is he taking the initiative to send it. Do not run immediately after receiving, first scan it with anti-virus software.
These basic precautions are noted, the windows system to be poisoned has become less simple, the security of the system protects our personal privacy, our network virtual asset security, and even the actuality of some online banking Alipay Asset security.
The speed of the Internet affects the speed of our Internet. When we are online, we may often experi
Windows 7 inherits and promotes the burning function in Windows
When you like a website and want to set it as the default to open, what to do, generally can be eas
When do I need to modify the hosts file? Basically, after the webpage has been maliciously tampered
U heroes U disk installation Win7 system tutorial
Microsoft's Win7, Exchange and other seven enterprise-class products unveiled TechEd
Win7 Ultimate system inserts u disk boot start blue screen failure cause and solution
Win7 Ultimate system how to turn off the screen automatically adjust the brightness function
Microsoft released Windows 7 system DVD hot fix
Several practical tips for TAB keys under Windows 7
Win7 mouse right-click menu settings: replace menu background
How to change the background color of cmd command window in Win7 Ultimate system
How do win7 desktop icons become word icons?
What if the win7 language bar is missing? Simple two steps to get
How can I skip user and password input at boot time
Win10 mouse movement operation does not respond, start screen blackening how to do
In the IE9 browser input box can not enter
What are the reasons for Win10 system causing webpage error 403?
Xu Zhimo three women are rich women, but they are not the same? Why
How to turn the automatic maintenance function on or off in the Win10 system
Win7 system WPS document cancels the method of not setting a password
How can I not open qq and qq group files in Win10 system?
Windows 2008 system how to cancel Ctrl+Alt+Delete key combination login