How experts "streaking"

Source: Internet
Author: User

Streaking in the eyes of experts

Without any security protection, you can access the internet. Instead of streaking, you can stop yourself. In the master's mind, streaking is nothing more than installing anti-virus software. They will be equipped with a variety of security gadgets to form a good habit of surfing the Internet, so that they can protect themselves even if they do not need anti-virus software.

Generally, there are four types of security gadgets configured by experts: scan analysis tools, powerful deletion tools, registry tools, and network tools.

Scanning and analysis tools are mainly used to analyze the system security status, whether there are any dangerous processes, system vulnerabilities, and protect the system to prevent dangerous operation and system injury. Scan and analysis tools to detect problems, especially virus files, and then use powerful deletion tools to delete stubborn virus files. The Registry tool is mainly used to monitor the Registry. Is there anything to write to the registry? Is it dangerous to write to the registry. Network Tools are mainly used when accessing the Internet, such as anti-Trojan tools for webpage Trojans and arpfirewall for Preventing ARP attacks in the LAN.

External Golden Bell Hood

1. Recommended tool: Sreng

Alternative tools: hijackthis and system diagnostic tools

You can use Sreng to automatically fix some registry-related system problems. Open Sreng, click the "advanced Repair" tab in "System Repair", and click "Automatic Repair. If the system damage is very serious, raise the "Automatic repair level" to "high-strength repair level" and then repair it.

2. Recommended tool: wsyscheck

Alternative tools: Weapons blade, unlocker, and killbox

If it is really poisoned, the Experts use wsyscheck to manually kill viruses and look for virus processes and threads. Wsyscheck uses different colors to mark processes with different security levels. Black indicates normal system processes, red indicates non-Microsoft processes, and purple indicates that although processes are Microsoft processes, there are non-Microsoft files, if the virus hides the process, it is marked in red in wsyscheck. Find the suspicious process and select "End Process and delete file.

3. Recommended tool: Kingsoft Network Security

Alternative tools: ruijia and ruixingkaka netassistant

Generally, experts are equipped with a webpage Trojan interception tool, which is no inferior to anti-virus software in dealing with webpage Trojans.

4. Recommended tools: Sandbox

Alternative tool: Movie Subsystem

When running the downloaded software, the experts are very careful. Maybe there is a virus in it. Drag the software to the sand table of the security environment, so that even if the software is bound with a virus, it will not cause harm to the real system. Sandbox is a security software. Operations in the sand table are performed on the virtual network, and real files and registries are not modified.

Easy Training

Fix vulnerabilities in a timely manner

Most Web Trojans require vulnerabilities to take effect. Otherwise, even if a web Trojan is activated, it cannot take effect.

In the past, webpage trojans used mostly system vulnerabilities. However, as security awareness increases, people who do not know how to fix system vulnerabilities are called "National Treasures ", webpage Trojans gradually turn to common software vulnerabilities.

Do you know the number of common software vulnerabilities that are second only to system vulnerabilities? Adobe's software has a large number of vulnerabilities, which are frequent.

Disable automatic playback

In addition to Trojans, viruses can intrude into the computer through flash memory. When the automatic playback function is disabled on the computer, the flash memory virus cannot run automatically and can only lie in the flash memory alone.

"Start-Run" and enter "gpedit. MSC, open the "Group Policy" window, click "Computer Configuration"-"management template"-"system", and double-click "Disable automatic playback" in the right column ", select "enabled" and select "All Drives" in "Disable automatic playback.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.