Five methods to keep your computer away from viruses

Source: Internet
Author: User
Although the network virus is amazing, if you have mastered the following techniques, you can keep your computer away from the virus.

Regular backup

Are you hesitant to purchase a backup system, such as a zip drive or a CD recorder, for a few hundred dollars? Don't hesitate. The value of your data is far more than that. Every time you log on to the Internet, you put data in danger.

Install anti-virus software

There are more than 20 anti-virus software packages worldwide. In the United States, Norton or mcfee.com, the two most famous companies, can provide adequate protection. However, do not run more than one anti-virus software program at a time. These programs will cause "file hooking", that is, they will stop running and check any process that causes changes to your computer. If an anti-virus program is run at the same time, several security guards may conflict with each other and bring each other to the ground.

Update anti-virus software at least once a week

You can ask Symantec's Norton Antivirus to automatically access the company's website and download the latest version. You will be notified every time you update the mcafee.com version. The frequency is as high as Wednesday. It also allows you to choose to download the latest version immediately or later, but remember that the latest version of anti-virus software is valid. Since the number of stealth programs (stealth program) released on the Internet each month is between 300 and 500, including viruses, worms, and Trojans.

Enable the anti-virus software to run automatically. Do not disable the monitoring function for each part of downloaded data. Resume the scanning function for each start of the computer, and then perform a manual scan at least once a week. In addition, if you hear the news of a virus outbreak, update the software every day.

Word carefully

. Doc attachments may contain "macros", that is, a series of commands, and viruses may use macros to infect your computer. You should ask the sender to save the file in the. rtf (Multi-text format) of word. This format cannot use macros, or ask the recipient to copy the text and paste it directly into another email. You may wish to simply disable the Word Macro function. In addition, before you open the Excel attachment (.xls), you can also think twice, because it may contain macros.

Watch out for attachments

If you cannot determine the file type embedded in the file or why you want to send it to yourself, you should be careful with attachments. Never open such files even if you know who the sender is. The virus will quietly infect the computer, lurking for weeks or even months.

Disable the scripting Host in windows ). Most people do not need it. This feature of the Windows operating system makes small programs such as the worm virus messy. On Windows 98, it is easy to disable the Script Host function. Click "start", select "Settings"> "Control Panel", double-click "Add/delete programs", and select the "Windows Installer" tab. Double-click "attachment", move the mouse down to "Windows Scripting Host", and then deselect the check box next to it. Occasionally, you may encounter this problem: a webpage cannot run scripts on your machine and an error message is returned. However, you may not want a strange Web server to run programs on your computer. Another advantage of disabling the Script Host function is that it shields viruses that are embedded in the body of an email message, which is harmful and extremely large. This is wise, because even if you do not open an attachment, some email viruses will infect your computer.

In addition, If you subscribe to the email virus notification service provided by the website of the anti-virus software manufacturer, even if you only run one anti-virus program. Knowing what viruses are outside helps you avoid them.

If you use a "always-connected" Broadband connection method, such as DSL or cable modem, you can install a "firewall ". Such a firewall may include a simple software program such as the personal firewall of mcafe.com, or a secondary computer named a vro, so that the network "cannot see" your connection. Without a firewall, hackers may intrude into your machine, destroy or steal files, or use your computer to join thousands of other computers to launch so-called denial-of-service attacks on some websites.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.