How to completely repair Windows system vulnerabilities

Source: Internet
Author: User

At present, the virus group on the internet is becoming more and more rampant, and the harm to users is getting worse, so we should know how to protect your computer from being violated and privacy not to be stolen. I remember a while ago a netizen consulted me, complain in the use of 360 dozen after the patch, and install the Thunderbolt software, then take pains to remind you how many patches do not play, and then after the study on the market a lot of software such as Lu Master, Jinshan, Kaka and so will not bother to remind you that the system did not hit the patch. For ordinary users are dizzy, in the end dozen that, listen to the software? Recall that Microsoft's vulnerabilities have been patched from Windows98 to Windows XP and subsequent operating systems, which has become a default security setting, and Microsoft also targets desktop and server-side Mbsa,sus , WSUS and other software.

One, what is Windows System vulnerability

System vulnerabilities here are the logical design flaws of your Windows operating system, or errors that occur at the time of writing. This flaw or error can be exploited by unscrupulous or computer hackers to attack or control the entire computer by implanting Trojans and viruses, thereby stealing important information and information from your computer and damaging your system. Windows System vulnerability issues are closely related to time.

A Windows system from the day of the release, as the user's in-depth use, the system has been exposed to vulnerabilities, these previously discovered vulnerabilities will continue to be the system vendor: Microsoft release Patch software repair, or in the later release of the new system to be corrected.

While the new system corrects the vulnerability in the old version, it also introduces a number of vulnerabilities and errors. For example, the previous popular mouse vulnerability, is due to the use of Windows system on the mouse icon processing defects, Trojan Author made malformed icon file to overflow, Trojan can be in the user without the knowledge of the implementation of malicious code.

Two, patching is the more the more the better?

The more the patch is, the better? Ordinary users will feel that the more the patch is the better, a breath of all the patches, thinking that their computer is found to be vulnerable to attack the smaller the probability, in fact, we carefully analyzed, before the third party to patch software, we are using Windows Update to repair the system, so there are few problems because Microsoft has put the patch order has been lined up, we also need to have a question, why is there order? Because the last important patch for the next patch to pave the way, if the reverse, light is not patched, heavy system error can not shutdown, No boot or even a direct crash needs to be reinstalled! Just like wearing clothes, you should wear underwear first, and then wear a coat, patching is the same. And a lot of third party patching software (some individuals do the bulk installation patch) is not the case, in order to save time, a few patches to download together, which first download to finish playing which, just like wearing clothes when you get the coat on the first coat, and then put the underwear outside, your computer system is not "Superman", How can you wear clothes like this without a problem?

Now the new system has UAC (user Account Control), Third-party software permissions can not be higher than Windows Update, even if one repair, there will be a patch because the permissions of the problem can not repair or repair incomplete! The patch has two time, one is the release time, the other is the last update time, If the installation is based on the release time, then obviously the patch is up to date.

For important patches that need to be repaired immediately, for functional update patches to update the system or software features, such as Office updates to update the Windows system Security update Outlook patches, you can postpone the fix.

Third, why to restart the computer after installing the patch

The file cannot be modified during patch installation because the system is running and should be updated before logging on to the system. Typically, office patches are installed directly, and patches are often installed and restarted to take effect.

A reboot is required because some systems in the system run must not be replaced by processes and files.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.