I. Preparing for the rain-taking preventive measures
1. One is good, two wonderful
Anti-virus software and network firewall are required for cainiao and birds. The software runs immediately before or after the machine is connected to the Internet. It is like a thick "protective clothing" for your machine. Even if it cannot completely prevent cybervirus attacks, at least most network viruses can be shut out ". At present, there are a lot of anti-virus software and features are very similar. You can purchase genuine (not expensive) as needed, or download free sharing anti-virus software online (there are many ), however, do not use anti-virus software that is cracked to avoid loss. After installing the software, you must update the virus database and antivirus programs on a regular basis to maximize the benefits of the software and provide the computer with an "iron bucket" protection.
2. Check the downloaded file carefully.
The spread of Network viruses is largely related to people's inertia and luck. After downloading a file, you 'd better scan it immediately with anti-virus software. Don't worry about it, especially for Flash files, MP3 files, and text files, because there are already viruses that can be hidden in these files that are easily overlooked.
3. Reject bad temptations
Many of my friends who are infected with webpage viruses are suffering from poor Website access. Therefore, it will save you a lot of effort if you do not browse such webpages. In addition, when you see a recommended URL in forums, chat rooms, and other places, be careful to avoid "being killed", or take the following steps to prevent it:
1) enable anti-virus software and network firewall;
2) set the security level of Internet Options to "high ";
3) Try to use IE-based browsers (such as myie2), create a blank tag in myie2, disable the script, javaapple, and ActiveX functions, and then enter the URL.
TIPS: This method can not only effectively deal with webpage viruses, but also play a role in "worms.
4. Free Lunch: Online Virus Detection
Although "free lunch" on the Internet is getting fewer and fewer, some websites still insist on providing free online drug detection services to netizens, which is worthy of praise. If you are not installed with the anti-virus software and are worried about making a "trick", you can use the online anti-virus service to scan your "Ai Ji" for the whole body ":
TIPS: 1) All websites have different online drug detection services. before using the service, you must carefully read the instructions on the website and try again to eliminate the virus;
2) Because ActiveX Control of the browser needs to be called during virus detection, you must first check whether this function is enabled on Internet Options \ Security page of IE before virus detection, and correspondingly reduce the security level (generally "medium") and then check for viruses.
5. Never call
If you find "You win !" "Opening Attachments will surprise you !" Don't trust these words! If you see a mail title similar to an advertisement, you 'd better delete it immediately. Do not open suspicious emails (especially in HTML format). If they are sent by a friend you are familiar with, you can verify with the recipient before processing. At the same time, it is also necessary to take certain measures to prevent mail viruses:
1) Try not to use outlook as your mail client, replace it with Foxmail, and write and read emails in text, so that you don't have to worry about viruses lurking in HTML;
2) use the remote mailbox function and use the remote mailbox preview function (view the mail header and part of the body) to promptly identify spam and suspicious emails, in this way, virus emails are directly removed from the server;
3) do not read suspicious emails directly in your web mailbox, because this reading method is similar to the principle of Web Page browsing. You need to execute some scripts or applets to display information, which is risky.
6. Repair and repair, fill in Vulnerabilities
Various Security Vulnerabilities have opened the door for network viruses (among which, the most are Internet Explorer and PHP scripting vulnerabilities ), in addition to timely updating system software and network software, we also need to install the latest patches for various vulnerabilities as soon as possible. One of the easiest ways to detect vulnerabilities is to directly use the "Windows Update" feature in the system, so that Microsoft can perform a "full body check" for your computer and install security patches. Of course, other software can also be used for Computer Security Detection (for example, the "System Vulnerability Detection genie" of Eastern guard is a good software) to detect vulnerabilities as soon as possible.
7. Add "Lock" to dangerous files"
According to this feature, we can prevent these dangerous files by renaming, changing the suffix, changing the storage directory, and using software for encryption and protection.
8. There are "slave" and no problems, creating the final line of defense
As the saying goes, "The wise may worry, there must be one loss." To ensure the security of important data in the computer, regular backup is indispensable. If we do a good job of backup, we can minimize the loss even if we suffer full damage from network viruses. Of course, the premise is that the data before the backup must not be infected with viruses, otherwise it can only be futile. In addition, try to burn the backup file to the disc or store it in a hidden partition to avoid "No loss ".
2. For details, refer to the anti-virus software FAQ.
What should I do if I conflict with other software after installing anti-virus software?
1) because most anti-virus software and firewalls run automatically after being turned on by default, check whether anti-virus software and firewall are enabled in case of software conflict, then, try to temporarily disable the monitoring functions of anti-virus software and firewall, and check whether the problem has been solved;
2) Go to the anti-virus software website to check whether the patch or upgrade version is available. If any, install the patch or upgrade it to the latest version;
3) if the above measures cannot solve the problem, you can contact the author via email to find a solution.
What should I do if I cannot upgrade normally?
1) if you are using genuine software, try to completely uninstall the old version before installing the new version (for security reasons, we recommend that you back up the version before uninstalling it );
2) Check whether multiple anti-virus software is installed. Uninstall other anti-virus software before installing it;
3) check whether the entered serial number is correct and whether the key disk (disk A) is damaged. If any problem exists, contact the dealer to solve the problem;
4) Try the following operations: success ".
What if the virus cannot be cleared?
1) Upgrade the virus database before virus removal;
2) use a clean boot disk to start the machine and perform anti-virus in the DOS state;
3) back up and isolate the infected files, send the virus sample to the author, and obtain the new virus database before virus removal.
3. Make up for the virus-first aid measures after the virus attack
Although we have already taken preventive measures, what is the saying: "There are unexpected circumstances in the sky"? What emergency measures should we take in case of a move?
1. Software
1) first disconnect all network connections to prevent viruses from spreading to other online computers, and then immediately scan anti-virus software (remember to scan the memory and boot area first );
2) quickly back up and transfer important documents to a safe place (floppy disk or CD), record account and password, and wait until the virus is cleared before processing;
3) If you have used ghost backup at ordinary times, you can use the image file to restore the system. This not only immediately restores the system, but also clears the system together with all viruses. Of course, this requires that your ghost backup is not infected with viruses. In addition, you must back up important data before restoring the system.
4) if no ghost backup is performed and the data in the machine is not important, you can use a clean boot disk to start the machine and format the hard disk, and then reinstall the system and program.
2. Hardware
1) if BIOS or CMOS is damaged, you need to find the same type of motherboard and use hot swapping to recover it. This method is highly risky. It is best to contact a professional technician to recover it on your behalf.
2) If the Hard Drive boot area or the Main Boot Sector is damaged, you can try to fix it with KV antivirus king, KingSoft Antivirus and other hard drive repair tools.