No firewall is used to eliminate all viruses.

Source: Internet
Author: User

If you are using Windows 2 K or Windows XP, you can take this trick to death.
Virus exists !!
If you are a newly installed system (or you can confirm that your system is currently non-toxic), it would be better to open it now:
"Start →Program→ Management tools → Computer Management → local users and groups → users!
The first step is to change the super administrator password to more than ten, and then create a user, set the password to more than ten and upgrade it to super administrator. The purpose of this operation is to achieve double insurance: If you forget one of the passwords, you can use another super-managed password to log on to the system, so that you will not be rejected from the system; moreover, hackers on the Internet cannot remotely gain control of your system by making guesses about your system's hypervisor password. Then add two users, for example, user1 and user2, respectively, and specify that they belong to the user group. Now, the preparation is complete, in the future, you should not log on to the super administrator or user2. Only use user1 to log on.
After logging on to the Internet, find IE and create a shortcut for it to the desktop. Right-click the shortcut and select "Run as another user". Click OK! Click this shortcut when you want to access the Internet. It will ask you for a user name and password. At this time, you will enter user2's user name and password !!! Now, you can use this window to access the Internet. You can browse any vicious, malicious, website, or webpage with your confidence, without worrying about the trick! Because user1. User2 is an inactive user. When we use this inactive user to access the Internet, no matter how smart the website is, all the information obtained through IE will make it think that this user2 is the user of your current activity.Code If you break down your system, it will not work at all. Even if you can do it, then only one configuration file of use2 will be modified, however, many malicious code generation and virus attempts to perform destructive activities through user2 will fail, because user2 is not running at all. How can we obtain the operation right of the system ?? Since it is not desirable, it is helpless to you. And they are even less likely to cross-user operations, because the configuration for Microsoft was originally independent of all users, just as other people could not run to my house to occupy the bed I used for sleeping, they cannot occupy the location of user1! So as long as you can ensure that this user2 user is always used as a proxy
To access the internet (but do not use user2 to log on to the system, because in that case, if user2 previously had any webpage virus, they are very likely to be activated !), Therefore, no matter how many web pages of your website are infected with viruses, they cannot be run or loaded by your current user1 user. Therefore, your current system will never be toxic!

But what should I do if I accidentally get poisoned ??

Don't worry. Now we can enjoy the shell-removing technology!

Start shelling:

Restart the computer and log on to the super administrator-do not run any program after entering the system
You will be surprised to find that the system is completely non-toxic !!, It would be better to open it now:

"Start> program> Management Tools> Computer Management> local users and groups> Users!

Delete the user permissions of user1 and user2. You just need to delete them, in the past, the virus that existed with these two users went to sleep with the disappearance of these two users -- (it seems like they were buried together, haha !). After doing so, I guarantee that your Win2k is like a newly installed one. No virus exists in any system file or system process! Good! Now, repeat the steps to create two new users, user1 and user2, and let them recover. They are resurrected, but the virus that once followed them does not have this opportunity, because Win2k will re-allocate new configurations to them when re-establishing users, this configuration is completely new and cannot contain viruses !!! Log out of the Super administrator immediately after the establishment. For example, log on to user1. Continue with what you do. You will find that your system is brand new! The above methods can be used repeatedly, and Microsoft patches are often used to ensure that your operating system is not toxic forever! As long as you can follow the following rules:

1. Do not log on to the system as a super administrator at any time-except for system-level updates and maintenance, when you need to use the super administrator identity, or when you need to add or delete users.
2. When a super Administrator is required to log on, make sure that nothing except the tools and programs provided by the operating system is used and run, in addition, all maintenance tasks can only be completed through the options in the Start menu, or even browsing the hard disk using the resource manager! If you only manage and maintain users and systems, you can immediately exit and never make more fun! (This is also Microsoft's requirement. Microsoft knows its own stuff best and his suggestion is correct. When you browse the hard disk, you have a great chance to access it as another user. As a super administrator, you still don't need it !! This should be done completely ).
If all of the above are done, the reason for hardware and misoperations, viruses, and system paralysis will be eliminated from you.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.