Properly setting and preventing bad habits from threatening Windows System Security

Source: Internet
Author: User

In the process of frequent computer operations, we often develop some bad operation habits, which seem to provide work efficiency, but through these operational habits, there are many operations that threaten system security. For example, after downloading the REG file from the Internet, when most people close their eyes, they simply double-click it and import it to the system registry, it is unknown that such an operation can cause a system crash. For example, if the system administrator is authorized to access the Internet through IE, the system may be damaged or attacked by Trojans or other malicious code. The operation habits cannot be changed overnight. To prevent bad habits from threatening the security of Windows systems, we can reasonably set them to reduce the security threats of bad operation habits.

1. Reduce the threat of double-clicking the REG file

Sometimes, to achieve some functional purpose, we can download the relevant REG file from the Internet, and then import it to the system registry by double-clicking the mouse. However, there are many malicious REG files in the Internet network. If you rashly double-click them, Windows may encounter illegal attacks. To reduce the security threats of this kind of operation habits, we can manually set and change the open mode of the REG file so that after the Windows system receives the double-click Operation Command, call the text editor such as WordPad to open the REG file, so that we can identify whether there is malicious code in the REG file that harms system security. The following describes the specific implementation steps of this method:

First, click the start/Run Command, in the pop-up system run dialog box, enter the string command cmd, click the Enter key, switch the System screen to the MS-DOS work window;

Then, at the command line prompt in the window, enter the string command "ftype regfile1_write.exe % 1" and click the Enter key. Then, the Windows system will successfully change the REG file import method, when we double-click the file again later, the Windows system will use the WordPad program to open the contents in the REG file, in the text editing window, we can see at a glance whether there is malicious code that harms the system. If no malicious code exists, right-click the target REG file and execute the "merge" command from the shortcut menu (1 ), the contents of the file can be imported into the local registry.

 
Right-click menu

Of course, if you download the BAT file from the Internet, you can change the Open Method in the same way to ensure the running security of Windows. We can execute the string command ftype batfile1_write.exe % 1 at the command line prompt in the MS-DOS workwindow, so that when you double-click the BAT file later, the text edit window is opened first. If you find that the target BAT file meets the running requirements, you just need to enter the path of the BAT file at the command line prompt in the MS-DOS work window and click the Enter key.

  1. Windows 2000 Server intrusion monitoring
  2. "Medical parents' hearts" create trustworthy network security expert Trend Micro
  3. System Security calls for collaborative protection terminal collaborative protection on the agenda
  4. Windows Vista operating system security Performance Analysis

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.