Microcomputer is the most commonly used computer, emblem of the use of the machine safety concerns tens of thousands of households, and the road by the virus damage is the emblem of the use of the most common problems, so, this section first introduced the general knowledge of the use of microcomputer security, and then focus on the prevention of computer virus knowledge.
The use of microcomputer safety
Microcomputer system consists of hardware and software, is a more expensive electronic equipment, if used improperly, easy to cause hardware or software damage. In the use of the computer generally should pay attention to the following points:
(1) Environmental requirements generally include: clean dust-free, ambient temperature and humidity to meet the requirements of electromagnetic waves have a good shielding, stable and reliable power, preferably equipped with a voltage regulator or uninterruptible power supply (UPS).
(2) In use, should first open the peripheral power, and then open the host power. When the shutdown, you should first turn off the host power, and then turn off the peripheral power.
(3) Avoid switching power supply repeatedly, especially not in the instantaneous switching power supply, or it will generate power spikes, burning the electronic circuit in the computer. Freeze state, try to use hot start.
(4) Smoking, drinking water and eating food in the computer room should be prohibited. Smoke can damage the disk; Food and dust off the keyboard can cause mechanical dysfunction; moisture and rollover may cause the device to short-circuit.
(5) Prevent the Hui machine from being exposed to sunlight directly.
(6) Huizhou machine and magnetic medium should be away from the strong magnetic field. A strong magnetic field interferes with the normal operation of electronic devices in the computer. Magnetic media change information in strong magnetic fields.
(7) The operation of the software should follow the instructions or prompts to operate, the operation is completed, should exit through the normal way, without exiting the software in the case of the opportunity caused by the loss of data.
(8) In the editing operation, should pay attention to save in time to prevent sudden power loss caused by the data.
(9) Pay attention to the confidentiality of important data such as door order, encryption and decryption key.
(10) The use and maintenance of microcomputers shall be registered.
This article from the Internet and the search engine IT Technology blog http://www.guhongtao.com/issued reprint please be sure to indicate