An alternative computer virus control method for audit personnel

Source: Internet
Author: User
Tags administrator password

At present, with the popularization of the AO Computer-aided audit, the computer facilities of the auditing organs at all levels are basically up to one, and most of the audit institutions have a local area network, and all of them have access to the Internet, which makes the probability of spreading the virus greatly increased. In recent times, the network appeared a variety of inexplicable viruses, although installed anti-virus software and firewalls, but because of rapid development of virus technology, many pages contain a lot of malicious code, even if the installation of anti-virus software is also impossible to prevent, resulting in computer "strokes" strike, resulting in system crashes, Worked for dozens of days or months AO audit data is missing. This article introduces a set of methods to prevent the virus, in order to help the auditor to guard against "middle recruit".

A clever ambush, dark cloth traps

Step One: First verify that the operating system you are currently using is non-toxic or newly installed win2000/xp/2003 (preferably a new installation). Open now: Start-Program-Administration Tools-Computer Management-Local Users and groups-users, change the Super administrator password to more than 10 digits (password to use numbers, uppercase and lowercase letters, symbols combined).

Step Two: Create a new user, and set 10 digits above password (password requirements with the first step), in the "group", select Administrators group, this user account to add to the Administrators group. There are two main reasons for this: one is to log in when the user is denied access to the user's password, and the second is that online hackers cannot gain control of your system remotely by guessing your system's hyper-tube password.

Step three: Create two more users such as Use1, Use2, and specify that they belong to the user group. Keep in mind that you should not use two Super admin and Use2 logins in the future except for the necessary computer maintenance, and only use the use1 login.

Second, camouflage puppet, deceive the attacker

USE1 User Login system, the desktop to establish IE shortcuts (right-click the desktop, select "New-Shortcut", in the pop-up window select Iexplore, location in the "C:\Program files\internet Explorer\iexplore.exe "and click Next to finish." Then right-click the shortcut, select Properties, and then click Advanced button to take the bait before running as another user. Click this shortcut when you want to surf the Internet. It will ask you to enter the username and password, at which time you enter USE2 username password, use the Open IE browser window to the Internet, you can safely browse any malicious, malicious websites and web pages, and no longer worry about the recruit.

Special Note: Do not use the USE2 user login system, because if you log in with Use2, then Use2 previously in what Web virus, it is very likely to be activated.

Third, King, get rid of the interference

In order to solve the problem of accidentally receiving the virus files from others, we should adopt the King technology. When the computer is found to be poisoned or suspected of poisoning (such as start-up particularly slow or running slow play). Restart your computer Now, use the Super Administrator login, do not run any programs after entering the system, you will find that the current system has not been shown to be non-toxic. Open: "Start-Program-management tools-Computer Management-Local Users and groups-users", the inside of the Use1 and use2 two users all deleted, so that previously with the two users of the virus has been with the two users disappeared and disappeared. After doing so, make sure that your Windows is as new as the new one, and that any system files and system processes are completely free of viruses.

Well, now it's time to repeat the initial steps to re-establish use1 and use2 two users to revive them, and the virus that followed them after the resurrection disappeared. Once the user is established, log off the Super Administrator and use USE1 to log in and continue working, and you will find your system as new. The above method can be reused, so that the basic can always ensure that your operating system is non-toxic state. But two principles must be followed:

1. No time to log on to the system as a super administrator unless you want to update and maintain the system, when you need to use a hyper-control identity, or when you need to add and remove users.

2, must use the super Tube login time, ensure that you do not use and run any programs other than the operating system's own tools and programs, and that all maintenance is done only through the options in the Start menu, even if you use the Explorer to browse the hard drive, just do the user and the system management and maintenance immediately exit, Never stop more.

Through the above methods, can better prevent the auditor's computer because of internet poisoning, so as to ensure the normal operation of AO system.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.