13 basic measures to do Windows security guard

Source: Internet
Author: User
Tags backup

The Windows operating system, while leaving us with many unpleasant memories, has to admit that Windows is still one of the most widely used systems. Faced with such a large and numerous operating systems, it is imperative to protect their security. For the current security technology and concepts on Windows, this article will recommend the following methods to help users better understand the Windows security mechanism.

1, must install the firewall and the anti-virus software

Although in the face of a new virus, anti-virus software will become helpless, rather than their own internet to find anti-virus methods. But there is a anti-virus software is a barrier, no matter how high or how low the barrier, always is more advantages than disadvantages.

Firewalls are also required to be installed, and it is also best to install a number of programs to monitor the network process, at all times to monitor whether malicious programs are operating illegally.

2, for the administrator to reduce the rights of users

In the Windows operating system, the administrator is the most advanced user and cannot be seen in normal login mode, so it is easy to ignore security issues that are caused by administrator users.

The initial password for the administrator user is empty, and if the firewall is not installed, it is easy for the hacker to enter your computer through the administrator account. It's already too late to do anything.

In fact, this is not the right to drop, is to create a fake, no real rights to the user of the administrator.

To do this, log on to Windows with an administrator account that is not an administrator, and then open: Control Panel-management tools-Computer Management-Local Users and groups-users, remove administrator users, Create a new administrator user, right-click to set the password, how complex the password is, make it subordinate to the lowest-level user group, and check that the account has been deactivated in the attribute.

In this way, even if someone else cracked your administrator account, you'll find that it's just a worthless account. In fact, directly delete the user on the line. This method is wasted on the internet, which is a waste of affection and time.

3. Prohibit all disks from running automatically

U disk virus is prevalent today, a little careless will lead to "lattice plate." U disk virus general operating mechanism is by double-clicking the letter automatically run, therefore, disabling all disk Autorun is a very effective means of prevention.

The specific process is: Run the input gpedit.msc--> User Configuration--> Management template--> system, double-click the right-hand list "Turn off AutoPlay", select "All drives," and then select "Started." OK exit. Turn off one of the services used in automatic playback

Run-->services.msc-->shell Hardware Detection service--> Startup type--> disabled

4, do not double-click u disk

If you do not prohibit all disks from running automatically, or you use a U disk on someone else's computer, it is best not to double click U disk. This is easy to trigger a U disk virus, the best way is to use antivirus software scan first.

U disk in the general elimination method of virus is, through the explorer to see if there is no Autorun.inf file, usually hidden. Delete the Autorun.inf file and the program it points to, and reseat the USB drive.

5, often check the boot start

Often in the operation of the input Msconfig view startup items, found that there are abnormal immediately find information on the Internet to see if it is a virus. Then use Regedit. Locate the Run key and check the startup project.

6, regular backup of important data

Some important data, such as important pictures, personal information, and so on, must be backed up frequently. It takes about one months to burn an important material, just in case.

7. Use Ghost

Often use Ghost backup operating system disk, encountered serious problems directly restore the entire system disk, this is lazy people's approach, lazy to find the hidden virus, but also efficient and quick method. The problem is that you have to use ghost frequently to make backups, or you can recover the system disk and lose at least the most recently installed program (registration information).

8, the privacy file to encrypt

Use some encryption programs to encrypt files that you don't think are public, and there's a lot of free software on the web. Do not think that hidden files on the line, hiding is just a way of self-deception, encryption.

9, the use of Google

Because the Web site security information provided in Google search prompts. Google gives a hint when a page containing a virus or trojan is found in the search results. Believe that domestic Baidu will be better.

10. Use other browsers

Compared with IE, using other browsers can effectively reduce the risk of poisoning.

11, the use of complex passwords

This is a cliché, but there are a lot of people who use simple digital codes, such as birthdays, ID numbers, etc., which are extremely easy to guess. "Rest assured, my birthday is only my friends know," who said that your friends will not peep at your privacy? Haha, actually tell everyone a small way, with friends birthday, ID number and so on.

12, do not tell anyone your password.

Telling others is the equivalent of betraying yourself.

13, do not randomly receive documents

Especially in QQ, others send documents, do not apart to receive, this is very dangerous. If you don't know it, reject it immediately. If you are a friend, you must ask clearly that he made the offer. After receiving also don't run immediately, first use antivirus software scan again. There is also the website class.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.