Streaking in the eyes of experts
Without any security protection, you can access the internet. Instead of streaking, you can stop yourself. In the master's mind, streaking is nothing more than installing anti-virus software. They will be equipped with a variety of security gadgets to form a good habit of surfing the Internet, so that they can protect themselves even if they do not need anti-virus software.
Generally, there are four types of security gadgets configured by experts: scan analysis tools, powerful deletion tools, registry tools, and network tools.
Scanning and analysis tools are mainly used to analyze the system security status, whether there are any dangerous processes, system vulnerabilities, and protect the system to prevent dangerous operation and system injury. Scan and analysis tools to detect problems, especially virus files, and then use powerful deletion tools to delete stubborn virus files. The Registry tool is mainly used to monitor the Registry. Is there anything to write to the registry? Is it dangerous to write to the registry. Network Tools are mainly used when accessing the Internet, such as anti-Trojan tools for webpage Trojans and arpfirewall for Preventing ARP attacks in the LAN.
External Golden Bell Hood
1. Recommended tool: Sreng
Alternative tools: hijackthis and system diagnostic tools
You can use Sreng to automatically fix some registry-related system problems. Open Sreng, click the "advanced Repair" tab in "System Repair", and click "Automatic Repair. If the system damage is very serious, raise the "Automatic repair level" to "high-strength repair level" and then repair it.
2. Recommended tool: wsyscheck
Alternative tools: Weapons blade, unlocker, and killbox
If it is really poisoned, the Experts use wsyscheck to manually kill viruses and look for virus processes and threads. Wsyscheck uses different colors to mark processes with different security levels. Black indicates normal system processes, red indicates non-Microsoft processes, and purple indicates that although processes are Microsoft processes, there are non-Microsoft files, if the virus hides the process, it is marked in red in wsyscheck. Find the suspicious process and select "End Process and delete file.
3. Recommended tool: Kingsoft Network Security
Alternative tools: ruijia and ruixingkaka netassistant
Generally, experts are equipped with a webpage Trojan interception tool, which is no inferior to anti-virus software in dealing with webpage Trojans.
4. Recommended tools: Sandbox
Alternative tool: Movie Subsystem
When running the downloaded software, the experts are very careful. Maybe there is a virus in it. Drag the software to the sand table of the security environment, so that even if the software is bound with a virus, it will not cause harm to the real system. Sandbox is a security software. Operations in the sand table are performed on the virtual network, and real files and registries are not modified.
Easy Training
Fix vulnerabilities in a timely manner
Most Web Trojans require vulnerabilities to take effect. Otherwise, even if a web Trojan is activated, it cannot take effect.
In the past, webpage trojans used mostly system vulnerabilities. However, as security awareness increases, people who do not know how to fix system vulnerabilities are called "National Treasures ", webpage Trojans gradually turn to common software vulnerabilities.
Do you know the number of common software vulnerabilities that are second only to system vulnerabilities? Adobe's software has a large number of vulnerabilities, which are frequent.
Disable automatic playback
In addition to Trojans, viruses can intrude into the computer through flash memory. When the automatic playback function is disabled on the computer, the flash memory virus cannot run automatically and can only lie in the flash memory alone.
"Start-Run" and enter "gpedit. MSC, open the "Group Policy" window, click "Computer Configuration"-"management template"-"system", and double-click "Disable automatic playback" in the right column ", select "enabled" and select "All Drives" in "Disable automatic playback.