How Windows is immune to viruses

Source: Internet
Author: User
Tags firewall

1, must install the firewall and the anti-virus software

No matter what kind of master you are, these two kinds of software still need to be installed. Although in the face of a new virus, anti-virus software will become helpless, rather than their own internet to find anti-virus methods. But there is a anti-virus software is a barrier, no matter how high or how low the barrier, always is more advantages than disadvantages.

Firewalls are also required to be installed, and it is also best to install a number of programs to monitor the network process, at all times to monitor whether malicious programs are operating illegally.

2, for the administrator to reduce the rights of users

In the Windows operating system, the administrator is the most advanced user and cannot be seen in normal login mode, so it is easy to ignore security issues that are caused by administrator users.

The initial password for the administrator user is empty, and if the firewall is not installed, it is easy for the hacker to enter your computer through the administrator account. It's already too late to do anything.

In fact, this is not the right to drop, is to create a fake, no real rights to the user of the administrator.

To do this, log on to Windows with an administrator account that is not an administrator, and then open: Control Panel-management tools-Computer Management-Local Users and groups-users, remove administrator users, Create a new administrator user, right-click to set the password, how complex the password is, make it subordinate to the lowest-level user group, and check that the account has been deactivated in the attribute.

In this way, even if someone else cracked your administrator account, you'll find that it's just a worthless account.

3. Prohibit all disks from running automatically

U disk virus is prevalent today, a little careless will lead to "lattice plate." U disk virus general operating mechanism is by double-clicking the letter automatically run, therefore, disabling all disk Autorun is a very effective means of prevention.

The specific operation process is: Run input gpedit.msc--"User Configuration-" Management template-"system, double-click the right-hand list of" Turn off AutoPlay ", select" All drives ", and then select" Started. " OK exit.

4, do not double-click u disk

If you do not prohibit all disks from running automatically, or you use a U disk on someone else's computer, it is best not to double click U disk. This is easy to trigger a U disk virus, the best way is to use antivirus software scan first.

U disk in the general elimination method of virus is, through the explorer to see if there is no Autorun.inf file, usually hidden. Delete the Autorun.inf file and the program it points to, and reseat the USB drive.

5, often check the boot start

Often in the operation of the input Msconfig view startup items, found that there are abnormal immediately find information on the Internet to see if it is a virus.

6, regular backup of important data

Some important data, such as important pictures, personal information, and so on, must be backed up frequently. It takes about one months to burn an important material, just in case.

7. Use Ghost

Often use Ghost backup operating system disk, encountered serious problems directly restore the entire system disk, this is lazy people's approach, lazy to find the hidden virus, but also efficient and quick method. The problem is that you have to use ghost frequently to make backups, or you can recover the system disk and lose at least the most recently installed program (registration information).

8, the privacy file to encrypt

Use some encryption programs to encrypt files that you don't think are public, and there's a lot of free software on the web. Do not think that hidden files on the line, hiding is just a way of self-deception, encryption.

9, the use of Firefox

Firefox is not omnipotent, but always better than ie, compared to IE, using Firefox can effectively reduce the risk of poisoning.

10, the use of complex passwords

This is a cliché, but there are a lot of people who use simple digital codes, such as birthdays, ID numbers, etc., which are extremely easy to guess. "Rest assured, my birthday only my friends know," who said that your friends will not peep at your privacy?

11, don't tell anyone your password

You will face 4 risks when you tell someone your password in a chat tool:

A, your computer may be hung horse, the password has been stolen.

B, chat tool providers may also be able to steal your password.

C, chatting the other side may use your trust in him to do dishonest behavior.

D, chat each other's computer poisoned, your password is stolen.

12, do not randomly receive documents

Especially in QQ, others send documents, do not apart to receive, this is very dangerous. Be sure to ask what is the other person's hair, whether he made the initiative. After receiving also don't run immediately, first use antivirus software scan again.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.