Step 1:
Make sure the system is currently free of viruses, then open: "Start → Programs → Administrative Tools → Computer Management → Local Users and Groups → Users" to change the password of the super administrator to a high level. The best combination of numbers and letters, preferably, is changed to ten or more digits, such as 1A2B3D&2core.
Second Step:
Create another new super administrator user. His password security level is as complex as the super administrator. The purpose is to keep the administrator's backup. The system maintenance will not be done. Rejected.
The third step:
Add one or two users, for example, the user name is: temp1, temp2; the permission is given to the user group, the normal login only uses temp1 or temp2, open IE browser And create his shortcut on the desktop, right click on the shortcut and select "Run as other user" point OK! Username and password, enter the temp1 or temp2 username and password.
Step 4:
When you open any webpage, you are not afraid of virus erosion. You can browse the website with you without worrying about poisoning and so on! Because your current system is active when the user is temp1. And he is an inactive user, because when we use this inactive user to go online, no matter how many websites, the information obtained through IE will make it think that this user is your current active user, if it wants If you use malicious code to destroy your system when you browse, it will not work at all. Even if it is done, then the modified one is only a configuration file of the temporary user, and many malicious code and viruses try. The sabotage activities carried out by this user will all fail, because the user is not running at all, how can I get the operating rights of the system? ? Since you can't take it, you can't help it. And they are less likely to operate across users, because Microsoft has to be configured to be independent of each other, just as others can not go to my home to occupy the bed I sleep, they can not occupy the position of temp1 or temp2! So as long as you can guarantee that you always use this user as a proxy to access the Internet (but don't use temp1 or temp2 to log in to the system, because if so, if temp1 has had any web virus before, then when he logs into the system, they are infected. The virus is very likely to be activated!)
windows system font installation method: create font shortcut method Method 1: 1, open the system
After upgrading to WIN7, I found that VMware cant access the Internet through NAT. Many netizens hav
; now many friends should use the graphical interface to send and receive mail, although the company
How to check the network connection status of Windows 7 1, start menu and click Control Panel. 2.
Local connection "repair" function is wonderful with two
Sharing with host files in VirtualBox
Retrieving the Lost Windows Taskbar Icon
How to recover files deleted from the recycle bin
Five practical tips: Lose a completely deleted file.
How to change the color of translucent window in Windows 7
Recover lost "graphics desktop" shortcuts
How to delete desktop shortcut arrow
Interpret the multi-boot boot file - BOOT.INI
Windows 7 time and date method
Windows 7 settings open the window in a new tab
It can still be used like this! Windows loggers use skills 2
Modify the windows7/xp dual system startup item big strategy (2)
Solve the WIN8 boot prompt igfxTray Module has stopped working
Win10 system installs the Edge browser plug-in method
What should I do if the QQ icon of the Win10 taskbar is missing?
13 major initiatives make Windows systems more secure
How to enlarge the desktop icon How to enlarge the desktop icon
WinXP can not access Win7 file
How Windows 8 System Uses Windows Network Diagnostics to Repair Network Faults
Memory can not be read the problem solved
Application normal initialization (0xc0000135) failed to solve one example