Cainiao: two tips to make Windows systems non-toxic

Source: Internet
Author: User

The rapid development of networks and various storage devices has greatly increased the probability of virus transmission. Although anti-virus software and network firewall can be installed to protect your system, due to the rapid development of virus technology, even many webpages contain a lot of malicious code, if the user is not aware of the attack, even if the anti-virus software is installed, it is easy to "trick ". After reading Microsoft documents and personal experience, I have summarized a set of methods to prevent viruses, hoping to help you.

Install traps and lay an ambush

If you are using a Win2000/XP/2003 operating system, you can try the following methods to make your system immune from viruses at the source.

Step 1: First open the newly installed operating system or you can confirm that the system you are using is non-toxic: "Start → program → Administrative Tools → Computer Management → local users and groups → users", change the super administrator password to dozens or more, try to use a password that combines numbers with uppercase and lowercase letters.

Step 2: create a user, set the password to more than 10, and upgrade it to a super administrator.

The purpose of this operation is to achieve double insurance: If you forget one of the passwords and use another super-managed password to log on, you will not be rejected from the system; moreover, hackers on the Internet cannot remotely gain control of your system by making guesses about your system's hypervisor password.

Step 3: add two more users, for example, the user names are nyh1 and nyh2 respectively, and specify that they belong to the user group. Now, the preparation is complete, in the future, you should not use the super administrator or nyh2 to log on to the computer except for necessary maintenance. Only use nyh1 to log on.

TIPS: when a new user is created, the default user group is used. If you want to create an administrator user, after creating the user, in the "Group", click the Administrators group and click "add" to add this account to the Administrators group.

Disguising and deceiving attackers

What should I do if there is a trap? Continue. After logging on to the Internet, find IE and create a shortcut for it to the desktop. Right-click the shortcut and select "Run as another user". Click OK! Click this shortcut when you want to access the Internet. It will ask you for the user name and password. At this time, you will enter the user name and password of nyh2!

Now, you can use this window to access the Internet. You can browse any vicious, malicious, website, or webpage with your confidence, without worrying about the trick!

TIPS: Do not use nyh2 to log on to the system. If that is the case, if nyh2 has a webpage virus before, it is very likely to be activated when user2!

The following describes how to create an IE shortcut:

Right-click on the desktop, select "New> shortcut", select Iexplore in the pop-up window, and click "C: Program FilesInternet ‑eriexplore.exe"), and click "Next. Right-click the shortcut, select "properties", and click "advanced" to hook up before "running as another user.

Jinxi shelling and swinging poisoning problems

When you click IE on the Internet, the following window will appear. Enter the nyh2 and password. However, when there is always negligence, what should I do if I accidentally receive a virus file from someone else or receive a virus file from an email? Don't worry. Now we can enjoy the performance of the treasure shell technology!

Restart the computer and log on to the super administrator. after entering the system, do not run any programs. You will be surprised to find that the system is completely non-toxic! That would be even better. Now, we can immediately open "Start> program> Management Tools> Computer Management> local users and groups> Users!

Delete all users in nyh1 and nyh2. You only need to delete them so gently, in the past, the viruses that existed with these two users went to sleep with the disappearance of these two users, as if they were buried together !). After doing so, make sure that your Windows is like a newly installed version. No virus exists in any system file or system process!

Good! Now let's repeat the steps to create two new users, nyh1 and nyh2. They are resurrected, but the virus that once followed them does not have this opportunity, because WinXP will re-allocate their new configurations when re-establishing users, this configuration is brand new and cannot contain viruses! Log out of the Super administrator immediately after the establishment. If you use nyh1 to log on, continue what you want to do. You will find that your system is brand new! The above methods can be used repeatedly, and Microsoft patches are often used to ensure that your operating system is not toxic forever! However, you must follow the following two rules:

Two tips to ensure that Windows operating systems are non-toxic:

1. Do not log on to the system as a super administrator at any time-unless you want to perform system updates and maintenance, use the super administrator identity, or add or delete users.

2. ensure that you do not use or run anything except the tools and programs that come with the operating system when you log on as a super administrator, in addition, all maintenance tasks can only be completed through the options in the Start menu, or even browsing the hard disk using the resource manager! If you only manage and maintain users and systems, you can immediately exit and never stop! This is also Microsoft's requirement. Microsoft knows its own stuff best and his suggestion is correct. When you browse the hard disk, you have a great chance to access it as another user. As a super administrator, you still don't need it !! This should be completely possible ).

Summary:

The above methods should ensure that your system is secure, but the computer technology is growing too fast, and the operating methods of systems and viruses may be innovated at any time, therefore, the above method cannot guarantee 100% absolute anti-virus.

  1. Windows security technical concepts
  2. Be careful when setting startup items to protect Windows System Security
  3. Topic: Windows System reinforcement

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.