13 coups to cast Windows King Kong is not bad body

  

A few days ago, my friend's computer had a virus, the virus infected a lot of EXE files, the repair is very difficult, but had no choice but to format it, the loss is heavy. My computer is rarely poisoned, at least in my case, my computer is useless. It is very difficult to eliminate the virus, but it is very easy to do preventive work. Here are some of my practices. I personally think that the following measures will be taken, and the chances of computer poisoning will be minimal. These measures are only for the Windows operating system.

1. Firewall and anti-virus software must be installed

No matter what kind of master you are, these two softwares still need to be installed. Although in the face of new viruses, anti-virus software will become overwhelmed, it is better to go online to find anti-virus methods. But there is an additional barrier to anti-virus software. No matter how high or how short this barrier is, it always benefits more than harm. Antivirus software I use Kingsoft Internet Security, I think it is good, it is recommended to install Kingsoft Internet Security!

Firewalls must also be installed. It is also a good idea to install some programs that monitor network processes to monitor for malicious programs.

In addition, some rogue software special kills are also very useful, such as 360 security guards, Jinshan cleaning experts.

2, for the Administrator user to reduce the power

In the Windows operating system, the Administrator is the most advanced user, can not be seen in the normal login mode, so it is easy to ignore by the Administrator user The security issue.

The initial password of the Administrator user is empty. If the firewall is not installed, the hacker can easily access your computer through the Administrator account. It’s too late to do anything at this time.

In fact, this is not a downgrade, it is to create a fake, unrealized Administrator user.

The specific operation is as follows, first login to Windows with a non-Administrator administrator account, then open: Control Panel - Administrative Tools - Computer Management - Local Users and Groups - Users, delete the Administrator user, and then create a new one Administrator user, right-click to set the password, how complicated the password is, make it belong to the lowest level user group, and check the account is disabled in the properties. As shown in Figure 1.

This way, even if someone else cracked your Administrator account, after entering, they found that it was just an account that didn't use real power.

3, prohibit all disks automatically run

Now U disk virus is prevalent, a little careless will lead to "grid". The general operating mechanism of the U disk virus is automatically run by double-clicking the drive letter. Therefore, disabling the automatic operation of all disks is a very effective preventive measure.

The specific operation process is: run the input gpedit.msc-->User Configuration-->Administrative Template-->System, double-click the auto-play in the list on the right, select "All Drives" And select "Started". Make sure to quit.

4, do not double-click U disk

If you do not use to prohibit all disks automatically, or you use a USB flash drive on someone else's computer, it is best not to double-click the U disk. This is very easy to trigger a U disk virus, the best way is to first scan with anti-virus software.

The general removal method for viruses in the U disk is to go through the resource manager and see if there is an autorun.inf file in the U disk, which is usually hidden. Delete the autorun.inf file and the program it points to, then re-plug the USB flash drive.

5, often check the boot startup items

often enter msconfig in the run to view the startup items, found that there are abnormalities immediately on the Internet to find information to see if it is a virus. Of course, you don't have to use msconfig, super rabbit and other software is very good. as shown in picture 2.

6, often back up important data

Some important data, must be backed up frequently, such as important pictures, personal information and so on. I will burn an important piece of information about a month, just in case.

7, use GHOST

often use Ghost backup operating system disk, directly recover the entire system disk when encountering serious problems, this is a lazy approach, too lazy to find the hidden place of the virus, but It is also an efficient and fast method. The problem is that you must always use Ghost for backups, otherwise you will lose your system disk and lose at least the recently installed program (registration information).

8. Privacy files are encrypted

Use some encryption programs to encrypt files that you think cannot be exposed to the public. There are many such free software on the Internet. Don't think that you can hide the file. Hidden is just a way of self-deception, encrypted, even if you have a photo like "Chen Guanxi" is not too dangerous.

9, using Google

The reason why Google is recommended is not because of my preference for Google, but the website security information provided in Google search. Google will give you a hint when a search page contains a virus or Trojan.

10, use Firefox

Firefox is not a panacea, but better than IE, compared to IE, using Firefox can effectively reduce the chance of poisoning.

11, using complex passwords

This is a commonplace topic, but there are many people using simple numeric passwords, such as birthdays, ID numbers, etc., which is extremely easy to be Guessing. "Reassured, my birthday is only known to my friends." Who said that your friends will not peek into your privacy?

12. Don't tell anyone your password

Tell your people your password in the chat tool. You will face 4 risks:

A, your computer may be Hanging the horse, the password was stolen.

B. Chat tool providers may also steal your password.

C. Chatting with each other may use your trust in him to do dishonest behavior.

D, the chat party's computer is poisoned, and your password is stolen.

13. Don't just pick up the file

Especially in QQ, someone else sends a file, don't accept it without saying anything, this is very dangerous. Be sure to ask what other people are sending, is he taking the initiative to send it. Do not run immediately after receiving, first scan it with anti-virus software.

Copyright © Windows knowledge All Rights Reserved