Some cool tricks to deal with computer viruses

Source: Internet
Author: User
Tags firewall

First, take precautions--do a good job of preventive measures

1. A good, two wonderful

Both the rookie and the bird, anti-virus software and network firewalls are required. Before the Internet or start the machine to run these software immediately, as if to your machine "wear" on a thick layer of "protective clothing", even if not completely eliminate the network virus attacks, at least can also most of the network virus "shut out". Antivirus software is very many at present, the function is very close, we can go to buy the genuine (are not expensive), can also download the Internet free of the sharing of anti-virus software (there are a lot of OH), but do not use some cracked anti-virus software, lest the penny wise and foolish. Install the software, to adhere to regularly update the virus and anti-virus program, in order to maximize the effectiveness of the software, to the computer "bucket"-like protection.

2. Download the file carefully check

The Internet virus is rampant, largely related to people's inertia and lucky mentality. When you download the file, it is best to use antivirus software immediately scan, do not worry about trouble, especially for some flash, MP3, text files can also not be taken lightly, because there are already viruses to hide in these easy to be overlooked in the file.

3. Reject Undesirable Temptations

A lot of friends in the Web virus, are due to visit the bad site, therefore, not to browse this kind of Web pages will make you worry a lot. In addition, when you are in forums, chat rooms and other places to see a recommendation to browse a URL, you must be careful to avoid the unfortunate "killed", or try to use the following steps to prevent:

1 open antivirus software and network firewall;

2 to set the security level of Internet options to "high";

3) Try to use IE as the kernel of the browser (such as MyIE2), and then create a new blank label in MyIE2, and close the script, Javaapple, ActiveX function and then enter the URL.

Small hint: This method not only can effectively deal with the webpage virus, but also has certain function to "worm".

4. Online Virus Search

Although there are fewer "free lunches" on the internet, there are still some websites that provide online drug search services to netizens, which are commendable. For those who do not have virus-checking software and are worried that they will "recruit", they can use the online virus-search service to "scan" a whole body for their "Love Ji":

Rising online: online.rising.com.cn/

Tips: 1 Each site's online search service are different, before use to carefully read the relevant instructions on the site before the operation, and strive to kill the virus;

2) As a result of the need to call the browser's ActiveX control, so before the drug detection in IE, "Internet Options" \ "Security" page to check whether the feature is turned on, and reduce the level of security (generally "medium" can) and then check the virus.

5. long-awaited should not end

If you find that there is "you won!" "," open the attachment will be an unexpected surprise oh! "These words, but don't believe!" If you see an email headline like an ad, it's best to delete it right away. For suspicious-looking mail (especially HTML format), do not open, if you are familiar with the friend sent, you can check with each other before processing. At the same time, it is necessary to take some measures to prevent mail viruses:

1 try not to use Outlook as your mail client, instead of foxmail and so on, while writing and reading the text of the message, so you do not have to worry about the virus lurking in the HTML;

2 The use of remote mailbox functions, the use of Remote mailbox preview function (see Mail header and part of the body), can be found in time spam and suspicious mail, so that the virus mail directly from the server away;

3 do not read the suspicious mail directly in the Web mailbox, because this reading method and the principle of browsing the web, you need to execute some script or applet to display information, there is a certain risk.

6. Tinkering, filling holes

At present, a variety of security vulnerabilities to the network opened the door to the virus (ie and PHP scripting language of the most loopholes), we usually in addition to pay attention to the system software and network software to carry out the necessary upgrades, as soon as possible to make the latest patches for various vulnerabilities. One easy way to detect vulnerabilities is to use the Windows Update feature that comes with your system, allowing Microsoft to have a "full-body check" on your computer and a security patch. Of course, other software can also be used to detect the computer security (such as the Oriental Defender of the "System Vulnerability Detection Wizard" is a good software) in order to detect vulnerabilities early.

7. Add "lock" to dangerous documents

No matter how the network virus is "resourceful", it will destroy the computer, always call the system file execution procedures (such as Format.exe, Delete.exe, Deltree.exe, etc.), according to this feature, we can change these dangerous documents by renaming, changing the suffix, Replace the storage directory, the use of software encryption protection and other methods to prevent the virus from getting out of the way.

8. Have a "ready" without suffering, to create the last line of defense

Is the so-called "wise thousand worry, must have a loss", in order to ensure the safety of important data in the computer, regular backup is indispensable. If we can do a good job of backup, even if the network virus to the total damage, can reduce the loss to the minimum. Of course, the prerequisite is to ensure that the data before the backup is not infected with the virus, otherwise it can only be futile. In addition, try to burn the backup files to the disc or to the hidden partition, so as not to "annihilated."

Second, see Recruit and remove the recruit--antivirus software FAQ

What happens when you install antivirus software that conflicts with other software?

1 because most anti-virus software and firewalls in the default settings are automatically run after the boot, so when there is a software conflict to check whether to open antivirus software and firewalls, and then try to temporarily shut down the anti-virus software and firewall monitoring functions, and then see if the problem has been resolved;

2 to the anti-virus software home page to see if the relevant patch or upgrade version, there are patches or upgrade to the latest version;

3 If the above measures do not solve the problem, you can contact the author through e-mail to find solutions.

What if you can't upgrade normally?

1 if the use of genuine software, you can try to completely uninstall the old version, and then install a new edition (for the sake of security, we recommend that the first backup before unloading);

2 Check whether the installation of a variety of anti-virus software, uninstall other anti-virus software and then install;

3 Check the input serial number is correct, key plate (a) there is no damage, there are problems, please contact the dealer to solve;

4 Try the following methods: Empty the Temp folder → Turn off the antivirus software → Open the path reinstall → Copy the installation directory on the installation CD to the hard drive, then run the "Setup.exe" in the directory.

What if you can't clean the virus?

1) First upgrade virus and then antivirus;

2 Use a clean system boot disk to start the machine, in the DOS state for antivirus;

3 Backup infected files and isolate, and then send the virus samples to the author, get a new virus library and then antivirus.

Third, mend-first aid after the virus attack

Although has done enough precautions, but is the so-called: "The wind and cloud of the day", in case of the recruit, we have what first aid measures?

1. Software aspects

1 First Disconnect all network connections, so as not to spread the virus to other online computers, and then immediately use anti-virus software to scan antivirus work (remember to scan memory, boot area);

2) quickly back up and transfer important documents to a safe place (floppy disk, CD-ROM), record accounts, passwords and other information, such as the virus cleared and then processed;

3 usually used ghost Backup, can use image file to restore the system, so not only can immediately resume work, and together with all the virus also cleared, of course, this requires that your ghost backup is not infected with the virus. Also, before restoring the system, you need to do a good job of backing up important data.

4 No Ghost Backup, and the data in the machine is not important, you can start the machine with a clean boot disk to format the hard disk, and then reinstall the system and programs.

2. Hardware aspects

1 BIOS or CMOS damaged, need to find the same type of motherboard, and then use hot-swappable method to recover. This method has a great danger, it is best to find professional and technical personnel on behalf of you to restore.

2 The hard disk boot area or the main boot sector is damaged, you can try to use KV antivirus king, Jinshan poison PA and other hard disk repair tools to repair.

Do the above prevention and response measures, network virus no longer want to harass you, surfing of course more safe!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.