Patching immediately after reinstalling the system
The first thing after reinstalling the system is to patch it. The probability of surfing the Internet without poisoning is not as bad as jumping into the pit.
Second, don't search for software (songs, movies)
Nowadays, many rogue download stations don't even provide any good software downloads, but they get better Baidu rankings through various means. When the user clicks on the download, it is actually downloading the Trojan! There are some normal download stations that sell the advertisement space to the Trojan. The advertisement looks like "Download button", it is very likely that I accidentally clicked on it.
The solution is to go to some websites with good reputation. For example, we have compiled the necessary software for Windows installation, all support win7, Vista system
3. Do not insert U disk with unknown origin. (MP3/camera card/mobile hard disk)
A poisoned USB flash drive may be poisoned as long as it is inserted into the computer without any operation. Because Windows has a metamorphosis function called autoplay, after the USB flash drive is inserted, Windows actively executes the virus on the USB flash drive.
The solution is to disable the automatic playback of the USB flash drive. Method: Vista Optimizer, WIndows 7 Optimizer, Rubik's Cube - System Optimization - Multimedia - Tick "Allow the automatic operation of USB devices"
Beware that Windows has another metamorphosis feature. If the USB flash drive is automatically playable, modify the default action of double-clicking to play automatically (even if there is no security issue, this product design is very stupid). That is to say, although the U disk does not run automatically, but you double-click the drive letter of the USB flash drive to open the USB flash drive, which actually triggers the virus in the USB flash drive.
When you know that the USB flash drive is toxic but you don't have anti-virus software but you have to use the files, right click on the drive letter of the USB flash drive and select “ Resource Manager” in the menu. The experiment proves that the operation file is not Will trigger a virus.
Four Don't be spoofed by file name to actively execute virus files
Windows has a setting that hides file extensions, and many viruses hide themselves through this setting. For example: a virus name is: & ldquo; Yan Zhaomen actually has her .jpg.exe & rdquo;, at the same time change the icon into a picture, to induce users to click.
The solution is to display the file extension: My Computer/Tools/Folder Options/View/Hide the extension of the known file type and undo this item. At the same time, friends who don't know the extension should learn the lesson: There is no free lunch and A film in the world. Please look at the beautiful yellow website. Don't think that there will be a good thing in the sky. Before running an unknown file, you must first check the virus and check its real extension.
5 Don't open the attachment of the email directly and the file from QQ
The attachments that QQ strangers give you will be deleted directly, nothing to be curious. Mail sent by acquaintances should be saved locally. If there is anti-virus software, check it out. No anti-virus software to view the extension, executable attachments (extension: exe /com /vbs /chm /htm /bat /doc, etc.) must be cautious; secure attachments (extension: txt /jpg /Gif) can be opened with confidence.
With these five tricks, the probability of poisoning you is very small, but although good online habits do reduce the chance of poisoning, but now the Trojan virus on the network is hard to prevent, it is better to install a killing soft. Otherwise, it is hard to say that they are not poisoned because they are pervasive. The most frightening thing is that many users think that the system is very safe, but in fact it is poisoned and not knowing.
If you dont have a DVD burner and want to install a single system vista, you can put the installatio
In Vista, there are four different volume control methods for any one audio stream: 1. Stream Volume
The network problem has always been a concern of netizens. The problems of unreaso
CCleaner is a well-received junk file cleaning software with a high reputation both at home and abro
Dual system sharing Vista one-click restore automatic backup
Win Vista operating system practical skills eight
Tasting Vista: Comparison of good and bad six aspects
One trick to get the following software incompatibility problem in Vista system
Solving the Vista SP1 upgrade cycle boot problem
Cleverly remove huge sleep files from Vista system
How do I cancel Vista's prompt to change my password periodically?
Microsoft XP/Vista System IIS Vulnerability Temporary Solution
Vista Areo interface (glass effect) Raiders
How to solve the problem that IE can't download under Vista
Modify Phoenix Bios to install OEM version VISTA
Vista system commonly used English professional words to explain Daquan
VideoStudio how to edit video? VideoStudio Clip Video Tutorial
What should I do if the Win7 system screen font is blurred? ClearType setting graphic tutorial
How Win8 manages the credentials for automatic login
Common shell command parsing in Windows 7
How to fix IE in Windows XP SP2
Windows8 how to open the drawing tool
Win10 technology preview version 9860 after installation no sound, all applications have no sound
Based on the Windows 2008 environment, some of the main objectives of the management test
Windows XP operating system memory performance optimization tips