Eliminating "malware" is better than preventing

Source: Internet
Author: User
Tags new features

Today, "Rogue software" has become between the virus and normal software between a special software exists, and as the general software writers for money bundled "rogue software" increased, the intrusion of the user's behavior more and more fierce, exactly this harm to continue to when? Now that we have no answer to this question, how can we realistically maintain the security of our network and systems and prevent "malware" from entering our system? How do you eliminate them from the system? Act now, friends harassed by rogue!

Protecting your browser's security

At the end of 2006, Microsoft finally officially launched the IE7 browser. New browsers add new features such as search windows, tags, and pop-up filtering. Compared with IE 6, IE 7 has made great improvements in network security and ease of use, as well as more stringent control over malicious software. Although Microsoft IE's "King" is beginning to encounter a sudden rise in the open source browser challenges, but in the security test for the browser, no browser can withstand a destructive attack.

According to two users who have not encountered "rogue software" for a long time, in IE protection, they mainly changed the two default settings:

1. Set the security level to "high"

General users know that the security mechanism of IE is divided into high, medium, low and low four levels, respectively, corresponding to different network functions. Advanced is the safest way to browse, but has the fewest features, and because disabling cookies may cause some sites that need to be validated to be unable to log on, intermediate is a more secure way of browsing, can be prompted before downloading potentially unsafe content, and masks ActiveX control downloads for most sites ; medium-low browsing approaches to intermediate, but you can't give a hint before downloading potentially unsafe content, and most content runs without prompting, for internal networks; low-level security does not mask any active content, and most content is automatically downloaded and run, so it provides minimal security protection. So, sacrificing some of the functionality, but winning the security of IE in the "rogue software" when it is very applicable.

2. Disable "AutoComplete"

IE's automatic completion function is very practical, allows us to achieve fast login, fast fill the purpose, but its flaws are also obvious. Many sites that automatically search for and read your history when you log in to get user information, including the historical address we entered in the Address bar, and some form information that has been filled in. Many victims have been exposed to fake web sites, and anglers can use technical means to allow uninformed users to enter their own "user Name" and "Password", and you may already be aware that you are being cheated, but you may also be able to access those sites if you are not careful. "Safety is more important than convenience!" "If you agree with this, do not use the AutoComplete feature," he said.

The "stupid" way to prevent browser hijacking

Browser hijacking is a common type of online attack in which rogue software operators can control the browser of your computer and change the way you surf the web and what is displayed when you surf. This malicious program, through the DLL plug-ins, BHO, Winsock LSP and other forms of the user's browser to tamper.

If you use the latest security software and updated programs and use secure Intenet browsing methods, you have done a lot of work on hijacking. In addition, how to prevent "browser hijacking" also depends on the experience of the Internet. By default, whenever a new software is downloaded to your computer, a warning window appears, and many users do not read this warning message, so that the "rogue" is introduced to the home in disregard of security.

Some online gaming and video-on-demand sites may attach spyware and other malicious software to the "free" software needed to use its services. Do not download or install a program or software to your computer unless you are sure it is completely trustworthy. Also, if you see a pop-up window that asks if you want to allow the installation of a software, click "No", except that you are very sure that you would like to install the new software on your computer. If you're a friend who likes to try new software, prepare a hijacking kit around, such as AntiSpyware and Spybot, which can help you regain control of your browser and your computer when your browser is hijacked.

To track an installer

Believe that the vast majority of users have used Third-party plug-ins, may be the same size of a plug-in is different, this is a question of questionable. Some malicious plug-ins often have to run their own programs bundled in some software installation program, if you do not pay attention to the possibility of "Wolf", and also difficult to clean, which is "rogue program" one of the origins of notoriety.

Today's software download site, so that we can trust can be said to be very rare, some "Chinese version" is more frightening to people. Some of the anti-black experts in the Forum are using "Universal extractor" (Download Address: http://www.skycn.com/soft/29832.html) This software to prevent their own black, interested friends can go to download a try, But must be careful, the best not to Chinese version of. Universal Extractor can unpack, but it's hard for ordinary users to have the option to install the content after the package, so you may need a software to monitor the installer, such as Total Uninstall (TU) and Ashampoo Unlnstaller Platinum Suite. Tu makes a snapshot of the system before and after the installation of the application, and then compares the snapshots to let us know what changes the system will make after the software is installed, so that we can clearly see the changes in the system. The same method is used in uninstalling the software, and the Tu uninstall function can completely clean up the installed application.

Improve your internet habits

Experts say the current state of "rogue software" is unlikely to change in the short term. For netizens, active prevention, close "rogue software" into the computer's port, it is the best solution.

First, install the Shielding tool software. "Rogue Software" has spawned an anti-"rogue software" industry, the market has dozens of cleaning software for download, we should download some of the formal manufacturer of shielding and removal tools, and ensure that these tools can be updated in a timely manner, so as to effectively reduce the frequency of intrusion.

Second, install IE7 or switch to another browser. A lot of "rogue software" is through Microsoft's IE browser, in the form of Plug-ins to infiltrate the user's computer. If you switch to another browser, and turn off its IE plug-in support, many "rogue software" will not be able to start. If you rely heavily on IE, you can upgrade your system to Vista, Billan has improved system security, and its built-in Windows Defender and Internet Explorer 7 do prevent most rogue software damage and protect your personal data.

Finally, should also try to eliminate their own curiosity, do not login to some bad sites, some of the temptation of the page, do not feel curious and try to click. Be sure to read the accompanying user agreement and instructions carefully for the shared software you want to download. The most important thing is not to follow the actions specified by rogue software, or drag it to the edge of the screen to ignore it. Write down the address of this kind of website or webpage, complain to the website, after all, eliminate "rogue" need everybody's participation.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.