XP operating system security settings six steps

  
        

TAG: Operating System Security Settings

Install the same operating system, strictly speaking, three or two years. Therefore, we must base ourselves on the current situation and focus on the long-term. We must not act rashly. Before and after installation, it should be rigorous and scientific, follow the "six steps"

Step 1: Before the installation, use a variety of virus detection, Trojan software to perform a full scan and kill, to ensure that each disk is free of virus Trojans class. After that backup: 1.C disk (or intended to install the disk) important information; 2. IE collection of hidden pages; 3. Drivers (preferably using the driver wizard generated from the installation of .EXE files).

Step 2: Make sure to reserve sufficient disk space for the intended installation system (NTFS file format is recommended). Use the original version (do not advocate the use of so-called "beautified version", "lite version" or "XX version") + crack to install the operating system. It is best to take a formatted installation.

Step 3: Install the driver (running from the installation .EXE file) and adjust the network, display and sound settings. Note: Do not browse the web at this time.

Step 4: Install the network security software (note that it is reasonable and tacit). Turn on automatic updating of system and security software (recommended to Microsoft Update to download all custom updates, which helps some software to work properly).

Step 5: Run activation and genuine verification crack. Back up the system root directory related files. Record the following data: 1. Boot time from boot to run; 2. Speed ​​of opening a specific web page; 3. Whether there is any abnormality in all aspects.

Step 6: Make system optimization settings. At the same time, in the principle of "not much, but in the fine" and "use the original, step by step", gradually install common software: install one, confirm that the system runs without exception, then install the next one. During the installation of the software, note: 1. Increase the scanning frequency of killing viruses and Trojans; 2. Compare the data with the fifth step to determine the cause. After the installation is complete and the system is running properly, make a GHOST backup in case you need it.

Follow the "six steps" to install the operating system, which can be fully achieved: 1. Completely save important data and system startup files. 2. Avoid virus trojans taking advantage of the sneak attack. 3. Avoid hidden dangers caused by system overload caused by indiscriminate software.

Copyright © Windows knowledge All Rights Reserved