A unique stunt! Anti-Trojan three strokes two

Source: Internet
Author: User
Tags modify

In a dormitory, sharing the same broadband, papaya computer is always infected with some Trojan virus or rogue software, and the author of the computer is "spotless." In this way in the papaya every time when the reload system, will say the author is not loyalty. Hear brothers say so, still really feel some wronged, in fact, the way to protect the system but on these two or three strokes, or all are taught to him!

First, unarmed anti-Trojan

Papaya's Windows XP system can be said to be a "poison nest", not only Trojan program "latent", all kinds of malicious plug-ins in which the stalker bad play. The main reason for this situation is to give the login account and the Internet users too much access, so that Trojans and plug-ins can be the entrance and exit system. Therefore, in order to effectively enhance the security of the system, it is necessary to limit the permissions on the account.

Step one: Establish a limited account

Open the Run dialog box, where you enter the command "NET user Xiaoyao 123456/add", and after carriage return executes, you can add a new account named "Xiaoyao" to the system with the password "123456".

The new account, added with the "NET User" command, has the default permissions of the Users group, so only licensed programs can be run, and deletions and system settings cannot be added at will, thus avoiding the destruction of most Trojans and malicious Web pages.

Figure 1

Step two: Golden silkworm shelling reinforcement ie

Malicious Web page is the system of Trojan virus and rogue plug-ins the most important way, so it is necessary for IE to make some protection settings.

1. Build shell

Delete the IE icon on the desktop, open the "C:\Program files\internet Explorer" folder, right-click "Iexplore.exe" program, select "Send To" → "Desktop shortcuts" command, create a new IE shortcut icon on the desktop. Then back to the desktop, right click on the new IE icon, select the "Properties" command, in the pop-up window, switch to the "Shortcut" tab, click the "Advanced" button, check the "Run as other users" option (Figure 2), OK, and then close the dialog box.

Figure 2

2. Shelling

Now after you log on to the Windows XP system with an administrator account or other non-"Xiaoyao" account, when you double-click the IE shortcut on your desktop, a Run Identity dialog box pops up, entering the newly created account name "Xiaoyao" and the password, and then you can perform normal Internet operations (Figure 3).

Figure 3

Next, try to see if IE can still be harassed by malicious plug-ins. Enter the "Www.baidu.com", click on Baidu page "Baidu Set as the homepage" button, modify IE's homepage. Then click on the page "more" → "search pa" link, download "Baidu Search Pa." When the download is complete, the plugin will automatically run Setup, and you will see that it pops up an Identity authentication dialog box, which is installed by default as "Xiaoyao" (Figure 4).

Figure 4

After the installation is completed, to "Xiaoyao" account identity run IE again, will find that the home page has become a Baidu. When you run IE with a non "Xiaoyao" account, you can see that there is no change to IE home page. And the previous installation of Baidu search PA, no matter what account to run IE, will not see its traces!

This is the "Xiaoyao" of the Users group account, to do the internet operation. Because the "Xiaoyao" account in the current does not log in, so Baidu search PA can not install and load into IE, the Web page can only "Xiaoyao" account of the IE homepage to modify. In other words, the "Xiaoyao" account to run IE, the browse to the malicious Web page can only be "Xiaoyao" account of the IE settings to modify, and malicious Web page rogue software or Trojan spy running, can not have any impact on the current account and system.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.