Golden Hill poison PA Defense Monitoring Use tutorial

Source: Internet
Author: User

  Virus immunity of 1,u disk

U disk virus immunity, can effectively prevent the virus through the U disk run, copy, spread, to ensure that your system files are not infected or damaged.

As USB disk and other mobile storage devices have been widely used by computer users, often because of the need for work in many computers to exchange files and data, some of the virus is the use of this, they hide themselves in mobile devices in the transmission between multiple computers. Targeted scanning of mobile storage devices will effectively remove the virus file source, to prevent multiple computers cross infection. and can be repaired by the virus Trojan damaged files.

Jinshan Poison PA 2011 By default opened the "U Disk virus Immune" function, when your computer inserted u disk and other mobile storage devices, will automatically eject the device for virus scanning reminders.

If you do not need this feature, click the "Close" button. Recommend the use of U disk class equipment, scan.

  2, cloud Security Defense

Based on the "cloud security" technology, Jinshan poison PA 2011 Further enhanced and strengthened the active defense function, enhanced the unknown virus defense resistance ability.

The cloud security defense defaults to open and does not recommend that you close it.

Because cloud security defense may collect your virus files, you can also close them if you think this will involve your privacy. It is recommended that you click the details setting in the feature profile and click View "Privacy agreement" in the following figure to learn more:

  3, self-protection

Self-protection can effectively protect Kingsoft's own file process and run poison Tyrant's resource files to ensure that your computer is always in the full protection of the poison Pa. (Note: This feature is temporarily not supported on 64-bit operating systems)

In order to ensure that antivirus software itself is not infringed by malware authors, most anti-virus software has a "self protection" function, does not allow the software itself to access or other control process.

Poison Fighter 2011 "Self-protection" is turned on by default, and users are usually not advised to close. If you have special applications that require access to and use of poison program files, you can add "trusted Program Files" in the detailed settings enabling the trust list.

Click "Detailed Settings" on the right side of the "Self-protection" page to expand the Setup dialog box:

Check the "Exclude and self-protection conflict file", click on the right side of "add" to add to the trusted program.

  4, online chat protection
according to various surveys, Internet chat has become the main purpose of Internet users and basic needs. Poison PA 2011 can be a chat tool (such as MSN, Amoy Wangwang, etc.) the transmission of files for security scanning, for the removal of toxic files to deal with, remove the network in the process of security risks, while very good to protect the privacy of users.

This option is turned on by default, and if you do not need this protection, you can click the Close button to complete the shutdown operation.

  5, download protection

The sharing of Internet resources makes us feel the joy of sharing, but the security of downloading files is really worrying.

Poison PA 2011 Download Protection, you can automatically detect commonly used download tools (thunder, Express, QQ cyclone, etc.) the security of downloaded files, closely obstruct the security threats from the network.

Icon:

  6, Gold Mountain Poison Trojan virus standby Library

Jinshan Poison Bully virus Trojan Standby library is to facilitate the user in the network offline status of virus killing for the preparation.

If your computer is interrupted by a network failure, you can use the Golden Hill virus Trojan Standby library to help you clear the virus and return to your computer's security status.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.