Immediately is the school holiday, may have most of the students will go to the Internet café to play, but the Internet café is most of the Internet thieves are the best place to show their skills, is there any way to protect security?? The answer is yes, there are, we will take a step-by-step look at how to let themselves in the Internet Café safe Internet, If there are problems can also come to our forum discussion in fact you do not have to panic, to the Internet café, first do not rush to grab a machine on the open play, you should first carefully selected. Most of the more well maintained Internet cafes, each equipped with a restore card or similar to "virtual restore" such software. You can see it before the computer appears in Windows screen. A computer equipped with a restore system can restore the operating system to the state of the administrator's original installation after reboot. This will not only ensure that the operating system is in the best state, but also to ensure that the operating system has not been done by people (Internet cafes inside the foot of the despicable behavior excluded).
But just pick out the machine, all right? To be safe in Internet cafes, there are a few points to pay attention to.
10 seconds to build a pure system
In the Internet café, the first thing is to use a "process killer" software (download address: Sina download). The interface that appears after running the program, on the left, is a list of all the processes in the system, and the right side is the function button, followed by the refresh process, the streamline process, the abort process, the lockdown process, process information, and delete files.
The "Streamline process" feature is used to abort all processes except those required for the operating system to function correctly, as set by the software defaults.
Hint: The streamlined process is consistent with the clean system process of the new installation, that is, the suspension except PROCKILLER.EXE, RUNDLL32. EXE, Taskmon. EXE, Mstask. EXE, KERNEL32. DLL, Mmtask. TSK, SPOOL32. EXE, EXPLORER. EXE, Internat. EXE, MSGSRV32. EXE, MDM. EXE, Mprexe. EXE, DDhelp. EXE for all processes.
This creates a completely non-toxic environment, do not worry about Trojan horse code stolen.
If you are a careful user, the Internet Café machine is not at ease, the "Internet Bar," a article in the registry using the relevant content. Check the following key values:
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices]
These key values include all of the startup program information, so you can say that there is no program to escape!