Sometimes our computer will be unknowingly poisoned, how to prevent or know that computer poisoning has always been a concern of friends who often go online, in the end can make you The computer no longer has a virus intrusion.
1. Use common sense to judge
Never open attachments from unknown sources or attachments that you did not expect to receive. It is consciously not open to email attachments that appear suspicious. Don't be fooled, think that you know the contents of the attachment, even if the attachment looks like a .jpg file -- because Windows allows users to use multiple suffixes when naming files, and many email programs only display the first suffix, for example The name of the email attachment you see is wow.jpg, and its full name is actually wow.jpg.vbs. Opening this attachment means running a malicious VBScript virus instead of your .jpg viewer.
2, install anti-virus products and ensure that the latest virus definition code is updated
It is recommended that you update the virus definition code at least once a week, because anti-virus software is only the most effective. Need to remind you that the Norton anti-virus software you purchased is not only to update the virus definition code, but also to update the product engine, which is different from other anti-virus software. This has the advantage of meeting the needs of the new engine for detection and repair, effectively suppressing viruses and worms.
3, when installing anti-virus software for the first time, be sure to do a thorough virus scan on the computer
When you install anti-virus software on your computer for the first time, you must spend some time on the machine. Do a thorough virus scan to make sure it has not been infected with a virus. Advanced anti-virus software vendors now use virus scanning as an automated program that is automatically executed when users first install their products.
4, before inserting floppy disks, CDs and other pluggable media, you must scan them for viruses.
Make sure your computer performs automatic virus checking on inserted floppy disks, CDs and other pluggable media, as well as email and Internet files.
5. Don't download any software from any unreliable channel
This is hard to do because we usually can't judge what is unreliable. It's easier to make sure that all the more famous online libraries are not infected with the virus, but there are too many websites that provide software downloads. We can't be sure that they must all take anti-virus measures, so the insurance method is correct. The securely downloaded software is scanned for viruses before installation.
6. Be wary of deceptive viruses
If you receive an email from a friend claiming to have a new virus that is most lethal, and let you warn this warning The mail is forwarded to all the people you know. This is a deceptive virus. It is recommended that you visit the anti-virus software vendor to verify that it does. These deceptive viruses not only waste the recipient's time, but may also be as lethal as the virus they claim.
7. Use other forms of documentation, such as .rtf (Rich Text Format) and .pdf (Portable Document Format)
Common macro viruses use Microsoft Office programs to spread and reduce these Opportunities for file types will reduce the risk of viral infection. Try to store files with Rich Text. This does not mean that the .rtf suffix is used only in the file name. Instead, in Microsoft Word, use the "Save As" command to select the Rich Text form in the dialog box. Although the Rich Text Format may still contain embedded objects, it does not natively support Visual Basic Macros or Jscript. And pdf files are not only cross-platform, but also more secure. Of course, this is not the perfect solution to completely avoid the virus.
8. Don't install software with a shared floppy disk, or worse, copy a shared floppy disk
This is how the virus spreads from one machine to another. At the same time, if the software is not registered, it will be considered as non-genuine software, and we can basically reasonably infer that people who copy illegal software generally do not care about copyright law and legal use of software. Similarly, they have adequate virus protection for installation and maintenance. The measures will not be too concerned. Piracy software is the main channel for virus infection.
9. Disable Windows Scripting Host
Windows Scripting Host (WSH) runs various types of text, but is basically VBScript or Jscript. In other words, Windows Scripting Host acts as a translator between text languages. The language may support ActiveX Scripting interfaces, including VBScript, Jscript or Perl, and all Windows features, including access to folders, file shortcuts, and network access. And Windows registration and so on. Many viruses/worms, such as Bubbleboy and KAK.worm, use Windows Scripting Host to automatically open an infected attachment without the user having to click on the attachment.
10, using a client-based firewall or filtering measures
If you use the Internet, especially using broadband, and always online, it is very necessary to use a personal firewall to protect your privacy and Prevent uninvited guests from accessing your system. If your system does not have effective protection, your home address, credit card number and other personal information may be stolen.
Our computers have been used for a long time, and naturally there will be various p
XP system may not be used by many people, most people now use Win7, Wi8 system. Users who have used
After using the computer for a period of time, the installed software is much more,
In todays media age, the use of projectors has also increased in various households. Many users are
How to solve the WinXP mouse right button failure?
4 major principles to pay attention to when using U disk
Must know the windows7 ten intimate features
WinXP system will convert FAT32 to NTFS format
Windows XP can't complete defragmentation
What about computer screen jitter and flicker? Professionals help you
XP blue screen prompt code 0X0000000A solution
What should I do if WinXP is inserted into memory and the mobile hard disk is not recognized?
How does WinXP install the Ipv6 protocol? Method of installing IPV6 Internet Protocol
WinXP configuration Java environment variables specific steps
How to use XP system startup management to solve Vista, XP dual system
How to speed up your WinXP search function clever method
What should I do if the Win10 system theme is too small?
How to cancel the Win10 system user account control? Win10 cancel user account control method
Distributing software, a magical Win2003 offload function
Windows 7 system commonly used shortcut operation method
Deep analysis of Windows 7 device driver management principles
Diablo 3 microblogging sun suit selection new joy activities multiple gifts waiting for you to
What are the requirements for windows10 configuration? Win10 minimum configuration requirements
Win10 Build 9901 System Update Preview Version New Version Download
Solving the problem of Windows 7 rejecting the wireless router has a trick