11 Knowledge of computer system security

Source: Internet
Author: User
Tags mail

Strengthen self-protection consciousness is our first step to defend the network threat, in this article we 11 aspects to introduce peacetime use network process need to strengthen the prevention consciousness.
1, prevention of the first

Keep getting information. Do you know that virus and security warnings appear almost every day? Get the latest outbreak by adding our security and Repair homepage to our favorites.

2. Be protected

If you don't have virus protection software installed on your machine, you'd better install one. If you are a home or personal user, downloading any one of the best ranked programs is fairly easy, and you can follow the Setup wizard. If you are in a network, first consult your network administrator.

3. Periodically scan your system

If you're just starting antivirus software for the first time, it's best to let it scan your entire system. It's a good thing to start your computer with clean and virus-free problems. In general, antivirus threads can be set to scan the system every time the computer starts up or run on a regular schedule basis. Some programs can also scan the system in the background when you connect to the Internet. Regularly scan the system for infection with viruses, preferably become your habit.

4, update your anti-virus software

Now that you have the virus protection software installed, you should make sure it is up to date. Some antivirus programs come with an automatic connection to the Internet, and as long as the software vendor discovers a new threat, it adds functionality to the new virus detection code. You can also find the latest security update files in this scan system.

5, do not easily implement the attachment in the EXE and COM and other executable programs

These attachments are most likely to carry a computer virus or hacker program, easy to run, is likely to bring unpredictable results. Attachments to the electronic mail that can be sent to a known friend or stranger must be checked and determined to be used.

6, do not easily open the attachment of the document file

The e-mail and related attachments sent by the other side of the document, the first to use the "Save As ..." command ("Save As ...") to save to the local hard disk, to be used to check the computer virus software is non-toxic before you can open the use. If you use the mouse directly click on the two doc, XLS, and other attachment documents, will automatically enable Word or Excel, if there is a computer virus in the attachment will immediately infect; if there is "whether to enable Macros" prompt, it is absolutely not easy to open, otherwise very likely to infect the e-mail computer virus.

7, do not directly run the attachment

Attachments that are strange to the file name extension, or with script files such as *. VBS, *. SHS and other accessories, do not directly open, you can generally delete the e-mail containing these attachments to ensure that the computer system is not affected by computer viruses.

8, mail settings

If you are using Outlook as your e-mail software, you should make some necessary settings. Select the Options command on the Tools menu, set the security for attachments to high in security, press the Advanced Options button in other, press the Add-on Manager button, and do not select Server script to run. Finally press the OK button to save the settings.

9, use the preview function cautiously

If you are using Outlook Express as your e-mail software, you should also make some necessary settings. When you select Options on the Tools menu, the automatically show news messages in the Preview pane and automatically display picture attachments in news messages are not selected in reading. This prevents some e-mail viruses from using the default settings of Outlook Express to run automatically, destroying the system.

10. Uninstall Scripting Host

For computers using the Windows 98 operating system, in Add/Remove Programs in Control Panel, select Check to see if Windows Scripting Host is installed. If it is already installed, uninstall it, and check the Windows installation directory for Wscript.exe files and delete them if they exist. Because some e-mail viruses use Windows Scripting Host for destruction.

11, alert to send out the mail

For their own outward transmission of the attachment, also must be carefully checked, to determine non-toxic, before you can send. Although the electronic computer virus is quite scary, as long as the protection is proper, or can avoid the infection of computer viruses, can still be assured to use.

Through the above description of the worm virus and the symptoms of outbreaks, I believe that we have a deeper understanding of it. Because the worm is spread through the network, in today's highly developed network period, worm is impossible, we only build their own computer on the firewall and develop good surfing habits, to minimize the harm.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.