Computers play an important role in our life work and study. We inevitably deal with the outside world through computers every day. Many things are promoted by computers. . Therefore, we need to protect the safety of the computer in particular, and we need to start maintenance in our daily life so that our computer can stay away from the virus and not invade. Here are 10 smart ways to get our computer running in a safe environment. Let's learn together now.
1. Use common sense to judge
Never open attachments from unknown sources or attachments that you did not expect to receive. It is consciously not open to email attachments that appear suspicious. Don't be fooled, think that you know the contents of the attachment, even if the attachment looks like a .jpg file -- because Windows allows users to use multiple suffixes when naming files, and many email programs only display the first suffix, for example The name of the email attachment you see is wow.jpg, and its full name is actually wow.jpg.vbs. Opening this attachment means running a malicious VBScript virus instead of your .jpg viewer.
2, install anti-virus products and ensure that the latest virus definition code is updated
It is recommended that you update the virus definition code at least once a week, because anti-virus software is only the most effective. Need to remind you that the Norton anti-virus software you purchased is not only to update the virus definition code, but also to update the product engine, which is different from other anti-virus software. This has the advantage of meeting the needs of the new engine for detection and repair, effectively suppressing viruses and worms.
3, when installing anti-virus software for the first time, be sure to do a thorough virus scan on the computer
When you install anti-virus software on your computer for the first time, you must spend some time on the machine. Do a thorough virus scan to make sure it has not been infected with a virus. Advanced anti-virus software vendors now use virus scanning as an automated program that is automatically executed when users first install their products.
4, before inserting floppy disks, CDs and other pluggable media, be sure to scan them for viruses
Make sure your computer has inserted floppy disks, CDs and other pluggable media. And automatic virus checking for emails and networked files.
5. Don't download any software from any unreliable channel
This is hard to do because we usually can't judge what is unreliable. It's easier to make sure that all the more famous online libraries are not infected with the virus, but there are too many websites that provide software downloads. We can't be sure that they must all take anti-virus measures, so the insurance method is correct. The securely downloaded software is scanned for viruses before installation.
6. Be wary of deceptive viruses
If you receive an email from a friend claiming to have a new virus that is most lethal, and let you warn this warning The mail is forwarded to all the people you know. This is a deceptive virus. It is recommended that you visit the anti-virus software vendor to verify that it does. These deceptive viruses not only waste the recipient's time, but may also be as lethal as the virus they claim.
7. Use other forms of documentation, such as .rtf (Rich Text Format) and .pdf (Portable Document Format)
Common macro viruses use Microsoft Office programs to spread and reduce these Opportunities for file types will reduce the risk of viral infection. Try to store files with Rich Text. This does not mean that the .rtf suffix is used only in the file name. Instead, in Microsoft Word, use the "Save As" command to select the Rich Text form in the dialog box. Although the Rich Text Format may still contain embedded objects, it does not natively support Visual Basic Macros or Jscript. And pdf files are not only cross-platform, but also more secure. Of course, this is not the perfect solution to completely avoid the virus.
8. Don't install software with a shared floppy disk, or worse, copy a shared floppy disk
This is how the virus spreads from one machine to another. At the same time, if the software is not registered, it will be considered as non-genuine software, and we can basically reasonably infer that people who copy illegal software generally do not care about copyright law and legal use of software. Similarly, they have adequate virus protection for installation and maintenance. The measures will not be too concerned. Piracy software is the main channel for virus infection.
9. Disable Windows Scripting Host
Windows Scripting Host (WSH) runs various types of text, but is basically VBScript or Jscript. In other words, Windows Scripting Host acts as a translator between text languages. The language may support ActiveX Scripting interfaces, including VBScript, Jscript or Perl, and all Windows features, including access to folders, file shortcuts, and network access. And Windows registration and so on. Many viruses/worms, such as Bubbleboy and KAK.worm, use Windows Scripting Host to automatically open an infected attachment without the user having to click on the attachment.
10, using a client-based firewall or filtering measures
If you use the Internet, especially using broadband, and always online, it is very necessary to use a personal firewall to protect your privacy and Prevent uninvited guests from accessing your system. If your system does not have effective protection, your home address, credit card number and other personal information may be stolen.
The safe and stable computer environment is what we are pursuing. We always hope that our computers can be protected from viruses, but these are not achieved through anti-virus software, but we need us at peacetime. The computer can also be maintained in the middle, so that it can be poisoned.
During the use of the computer, the blue screen problem is our most common problem. Recently, some u
In daily life, Word documents are an office software that we usually use. Recently, some users have
Recently, some users have reported a loud and long sound when the computer is turned on and cannot s
As a Windows system user, you will begin to envy Linux, because Linux file system does not need defr
In-depth analysis of the degree of hazard of the virus
Brief introduction to Linux system commands and Tomcat maintenance
Little-known hacker attack computer program
Does the host open the cover to help dissipate heat?
How to cancel the default share of Windows
How IIS Security Protects You Five Skills
How to easily deal with computer silent problems
Clear windows access LAN cache username and password
You ask me to answer: Deep analysis of Windows security mode
IE browser can not open the web page how to solve
u disk reloading system error Internal Error 36000 how to solve?
Win8 create, delete or format the hard disk partition full diagram
How to set the user account password in Windows 8 system?
DNF Abyss Party How to get the Fortune Gift Box DNF Fortune Gift Box Get Method
Win10 preview version 10061 upgrade can not activate the solution
What is the Windows 10 step record? Win10 recording operation steps tutorial
Solution for not being able to drag files under Win8
The difference between 32-bit and 64-bit Windows 7 and XP
How to create a self-extracting file in Windows XP