Point 5: Install anti-virus software, and often check if it works properly, whether it can update virus features
Don't put security issues only Responsible for anti-virus software, security is system engineering, anti-virus software is just one of them. There will always be a virus before there will be an anti-virus software update. In many cases, after installing the anti-virus software, there will be a variety of viruses. But this does not mean that anti-virus software is unnecessary. On the contrary, anti-virus software is very important. If there is no anti-virus software, your system may be worse.
More and more viruses in order to invade your system, first try to abolish anti-virus software. Destroying anti-virus software may be easier than anti-virus software. Because the destroyer's goal is clear, it is the most popular software on the market. It is very easy to work on these kinds of security software. Moreover, virus makers, unlike anti-virus software, must consider the compatibility issues associated with each update. The attacker only focuses on the tasks that the Trojan needs to accomplish. Other consequences, the virus maker does not have to spend a lot of time to consider.
Trojan virus makers hate anti-virus software like this, so that after a lot of Trojans invade, they will first destroy the anti-virus software. As long as the destroyers are willing, targeted anti-virus software can always do When you arrive, users should not expect anti-virus software to be made into a wall. Even the operating system can be destroyed, not to mention anti-virus software.
We can also use the working status of anti-virus software as another testing tool: as long as you observe that anti-virus software suddenly does not work, you should first consider whether it is destroyed by Trojans.
Solution:
Install an anti-virus software that suits you, and check the function frequently during the validity period, such as whether it can start normally, whether it can be upgraded normally, and so on.
Point 6: Be careful with mobile storage devices
Before the Internet evolved, the spread of viruses relied on floppy disks and then gave way to the network. Nowadays, the public is increasingly using mobile storage devices (mobile hard drives, USB flash drives, digital memory cards) to transfer files. These mobile storage devices have become an important channel for Trojan horses to spread. Computer users often refer to such viruses as U disk viruses or AUTO viruses. This means that inserting a USB flash drive will allow the virus to spread from one USB stick to another.
Solution:
Immediately do not hesitate to disable the automatic playback function of the USB flash drive. The convenience of this function is negligible, but the risk of exposure is very important.
Point 7: Safe Internet
One of the important reasons for becoming a broiler is to browse unsafe websites, distinguish between what website is safe and what is not safe. This is for ordinary users. Very difficult. There is also the possibility that the original normal website will be invaded into the Trojan, and there is also the risk of downloading the Trojan on any web page after being attacked by ARP.
There are always opportunities to download Trojans online, and no one can avoid them. It can only mitigate this risk.
The security of the browser needs special attention. The vulnerability of browsers and browser plugins is the favorite of hackers. The flash player vulnerability is a plugin vulnerability. This vulnerability is cross-browser platform, any use. This risk may exist in flash player situations.
Solution:
Fix browser vulnerabilities in a timely manner, and upgrade your browser to the latest version in time to reduce the time it takes to expose a risky system to an attacker.
Avoid browsing some gray sites. Usually such sites have a lot of traffic, such as a large number of living communities, online video communities, chat dating communities, porn sites, gambling sites, and so on. If you visit such a website, if you find that the system is abnormal, you should immediately check it by the method described in "How to detect whether the computer is a 'broiler'."
The above is by no means the whole safety protection. It can be said that it is the most important risk link. Pay attention to the safety protection from the above points. At least the three-legged cat hacker can't take you.
Security protection is dynamic, always be vigilant. For the Internet, it is necessary to have a view that everything is a threat. Just like for a surgeon, in his eyes, everything is contaminated by bacterial viruses, and disinfection is the most basic principle.
Remember that there was a write-protect switch on the floppy disk? When you close it, the computer c
in the first quarter of 2008 Microsoft officially updated the Windows XP Service Pack program to po
The xp system, which is no longer brilliant, always has a headache for us. Users often use the xp op
A friend who has multiple operating systems installed on the computer knows that after the computer
Share crack windowsXP system login password tips
Xp implements a convenient method for automatic restart
Use Group Policy to manage Windows XP
How to solve the problem of computer chassis squeaking
Change the remote login Windows system access step
XP prompts "Insufficient virtual memory" Cause
WinXP common system service introduction (1)
Xp hard disk partition follows the 7 major principles of
Rookie Collection: How to use the Notepad to remove the virus
After upgrading to XP, the performance of the optical drive and the hard disk is degraded
XP Explorer tool does not have "folder options" how to fix it?
Copy WINNT.XPE to the root directory of the mobile hard disk active partition
Win8 software set "run as administrator" steps
What does the Windows 10 interface look like? Win10 pure quick installation icon
Win8 system desktop iconization set trick
QQ audio and video PC home audio and video sharing function using tutorial
Win10 Mobile Innovator Update Slow Preview Edition 14965 Today Push
Win10 system version number view method
Win7 shows hidden folder method
Win8 notebook how to cancel the automatic sleep setting when closing the cover
The latest support for running Win10 Mobile system device model list exposure (unofficial)