A few days ago, my friend's computer had a virus, the virus infected a lot of EXE files, the repair is very difficult, but had no choice but to format it, the loss is heavy. My computer is rarely poisoned, at least in my case, my computer is useless. It is very difficult to eliminate the virus, but it is very easy to do preventive work. Here are some of my practices. I personally think that the following measures will be taken, and the chances of computer poisoning will be minimal. These measures are only for the Windows operating system.
1. Firewall and anti-virus software must be installed
No matter what kind of master you are, these two softwares still need to be installed. Although in the face of new viruses, anti-virus software will become overwhelmed, it is better to go online to find anti-virus methods. But there is an additional barrier to anti-virus software. No matter how high or how short this barrier is, it always benefits more than harm. Antivirus software I use Kingsoft Internet Security, I think it is good, it is recommended to install Kingsoft Internet Security!
Firewalls must also be installed. It is also a good idea to install some programs that monitor network processes to monitor for malicious programs.
In addition, some rogue software special kills are also very useful, such as 360 security guards, Jinshan cleaning experts.
2, for the Administrator user to reduce the power
In the Windows operating system, the Administrator is the most advanced user, can not be seen in the normal login mode, so it is easy to ignore by the Administrator user The security issue.
The initial password of the Administrator user is empty. If the firewall is not installed, the hacker can easily access your computer through the Administrator account. It’s too late to do anything at this time.
In fact, this is not a downgrade, it is to create a fake, unrealized Administrator user.
The specific operation is as follows, first login to Windows with a non-Administrator administrator account, then open: Control Panel - Administrative Tools - Computer Management - Local Users and Groups - Users, delete the Administrator user, and then create a new one Administrator user, right-click to set the password, how complicated the password is, make it belong to the lowest level user group, and check the account is disabled in the properties. As shown in Figure 1.
This way, even if someone else cracked your Administrator account, after entering, they found that it was just an account that didn't use real power.
3, prohibit all disks automatically run
Now U disk virus is prevalent, a little careless will lead to "grid". The general operating mechanism of the U disk virus is automatically run by double-clicking the drive letter. Therefore, disabling the automatic operation of all disks is a very effective preventive measure.
The specific operation process is: run the input gpedit.msc-->User Configuration-->Administrative Template-->System, double-click the auto-play in the list on the right, select "All Drives" And select "Started". Make sure to quit.
4, do not double-click U disk
If you do not use to prohibit all disks automatically, or you use a USB flash drive on someone else's computer, it is best not to double-click the U disk. This is very easy to trigger a U disk virus, the best way is to first scan with anti-virus software.
The general removal method for viruses in the U disk is to go through the resource manager and see if there is an autorun.inf file in the U disk, which is usually hidden. Delete the autorun.inf file and the program it points to, then re-plug the USB flash drive.
5, often check the boot startup items
often enter msconfig in the run to view the startup items, found that there are abnormalities immediately on the Internet to find information to see if it is a virus. Of course, you don't have to use msconfig, super rabbit and other software is very good. as shown in picture 2.
6, often back up important data
Some important data, must be backed up frequently, such as important pictures, personal information and so on. I will burn an important piece of information about a month, just in case.
7, use GHOST
often use Ghost backup operating system disk, directly recover the entire system disk when encountering serious problems, this is a lazy approach, too lazy to find the hidden place of the virus, but It is also an efficient and fast method. The problem is that you must always use Ghost for backups, otherwise you will lose your system disk and lose at least the recently installed program (registration information).
8. Privacy files are encrypted
Use some encryption programs to encrypt files that you think cannot be exposed to the public. There are many such free software on the Internet. Don't think that you can hide the file. Hidden is just a way of self-deception, encrypted, even if you have a photo like "Chen Guanxi" is not too dangerous.
9, using Google
The reason why Google is recommended is not because of my preference for Google, but the website security information provided in Google search. Google will give you a hint when a search page contains a virus or Trojan.
10, use Firefox
Firefox is not a panacea, but better than IE, compared to IE, using Firefox can effectively reduce the chance of poisoning.
11, using complex passwords
This is a commonplace topic, but there are many people using simple numeric passwords, such as birthdays, ID numbers, etc., which is extremely easy to be Guessing. "Reassured, my birthday is only known to my friends." Who said that your friends will not peek into your privacy?
12. Don't tell anyone your password
Tell your people your password in the chat tool. You will face 4 risks:
A, your computer may be Hanging the horse, the password was stolen.
B. Chat tool providers may also steal your password.
C. Chatting with each other may use your trust in him to do dishonest behavior.
D, the chat party's computer is poisoned, and your password is stolen.
13. Don't just pick up the file
Especially in QQ, someone else sends a file, don't accept it without saying anything, this is very dangerous. Be sure to ask what other people are sending, is he taking the initiative to send it. Do not run immediately after receiving, first scan it with anti-virus software.
Recently, some users have reported that their xp system computer suddenly has no sound, and the prom
Batch system service optimization A large part of the functions in system service are not used for
I believe everyone knows that there is a power-saving mode in the XP system we use. After setting th
A lot of friends have come to reinstall the system or upgrade the system, only to find that the long
Gpedit.msc prohibits the running system from being locked. Solution
Let Win XP no longer display error prompt window
Maintain win xp system from these aspects to start
Teach you how to disable worm replacement of explorer files
Make Windows XP's "Control Panel" more refreshing
How does the system security mode enter and function
Optimization method to improve Windows memory efficiency
Windows XP in-depth analysis of BOOT.INI
Reviewing the various versions of the Internet Explorer browser (1)
Win2K/XP: Cleverly Blocking Messenger Service
XP system computer sound is very small how to solve?
Teach you how to prevent the top ten threats to network security (2)
How to make the lock screen interface
How to use the LAN sharing setting tool Win7 LAN sharing setting method
Entertainment and work are both correct. Feel the magical nature of Win8
Challenge Chrome/FF? Edge's first extension is exposed to
What should I do if the Win7 Explorer cannot be opened? How to solve?
What is the headache of the system update function, how to deal with the win8 system?