My computer has been running naked (without anti-virus software installed) for several years, and I have never been impressed by the virus. The old machine N years ago, with a low configuration, ran like a fly while using it properly. I have summarized my anti-virus experience into seven and shared it with you, hoping to see more computers running naked.
Install patches immediately after the system is reinstalled.
Patch is the first thing after the system is reinstalled. Without patching, the probability of surfing the Internet without being poisoned is similar to jumping into the dung pit, but it is spotless. Do not use Windows update for patching. It is best to use professional patching tools such as QQ doctor and 360 security guard. After patching these tools, a copy of the hard disk is retained. You do not need to download the patches next time. You can also install offline patches. It is best to back up the patch this time. Next time you reinstall the system, unplug the network cable and finish all the patches before accessing the Internet.
2. Do not search for software (songs or movies)
Nowadays, many rogue download sites do not even provide any good software downloads. They just get better Baidu rankings through SEO. When users click to download, they are actually downloading Trojans! Some normal download stations sell ad spaces to Trojans. The advertisements look like "Download buttons", and they may just spot them accidentally.
The solution is to search for websites with good reputation, rather than Baidu.
My personal homepage provides free download of commonly used software, non-toxic, simple, fast, often updated, URL is: http://www.setuppc.cn
Find the song to Baidu MP3, no virus, URL is: http://mp3.baidu.com
3. Do not insert an unknown USB flash drive (MP3, camera card, or mobile hard drive)
Virus-infected USB flash drives can be poisoned as long as they are inserted into the computer without any operation. Because Windows has a abnormal function called automatic playback, after the USB flash disk is inserted, Windows takes the initiative to execute the virus on the USB disk.
The solution is to disable automatic playback of the USB flash drive. The solution is as follows: 360 security guard/common/repair system vulnerabilities. Click "Enable USB flash drive virus immunity, other security software also has similar functions.
Be careful that there is another abnormal function in Windows. If the USB flash drive can be automatically played, change the default double-click operation to automatic playback (even if there is no security problem, this product design is also very stupid ). That is to say, although the USB flash drive does not run automatically, you double-click the drive letter of the USB flash drive to open the USB flash drive, which actually triggers the virus in the USB flash drive.
When you know that the USB flash drive is toxic but you have no antivirus software, you have to use the files in it. Right-click the drive letter of the USB flash drive and select "Resource Manager" in the menu. This experiment proves that the operating file will not trigger a virus.
4. Do not actively execute virus files by file name Spoofing
In Windows, one setting is to hide the file extension. Many viruses use this setting to hide themselves. For example, the name of a virus is "" .jpg.exe". At the same time, the icon is changed to an image to induce users to click.
The solution is to display the file extension: My computer/tool/Folder Options/View/hide the extension of known file types. Just cancel this item. At the same time, friends who do not know the extension should learn the lesson: there is no free lunch and a film in the world, please visit the regular yellow website to see beautiful women, do not think there will be a good thing in the sky. Before running an unknown file, check for its real extension.
Shantou's first law: the file name that makes you feel uneasy is a virus!
5. Do not open email attachments or files sent from QQ.
Attachments from QQ strangers are deleted directly. There is nothing to be curious about. Emails sent from acquaintances should be saved locally first. If there is anti-virus software, check it. You do not need to view the extension of any antivirus software. You must be cautious when you need to view the extensions of executable attachments (extensions: exe/com/vbs/chm/htm/bat/doc). secure attachments (extensions: txt/jpg/gif.
6. Do not click the unfamiliar Link (Remarks) sent by email or QQ)
Unless you clearly know that this link is okay, it may be because the virus uses your friend's identity to trick you into clicking a malicious link.
7. Use a non-IE kernel browser to access vulgar websites (Remarks)
Vulgar websites have the highest probability of being infected with Trojans. We recommend several non-IE kernel browsers: Firefox, Opera, and Chrome.
Remarks
All network horses use system vulnerabilities! If none of the system's vulnerabilities exist, direct access to websites infected with Trojans will not be poisoned. However, when a vulnerability is detected, it is not patched. At this time, the website infected with Trojans has a attack rate.
With these seven lessons, the probability of further poisoning is very small. If you are still in the middle of the process, I will reply ten million times to tell you that I will add and write another 2.0.
Compile a foreign language:
Some people often ask me, "My computer is poisoned and rising cannot kill me. What should I do ?" My answer is simple:
"You have two options:
Reinstalling the system on disk A (directly restore the system if you have previously performed Ghost)
B continues to replace one or two anti-virus software for three or four hours. The system prompts that the virus has been killed, and then restarts taosheng again. Then, the system is reinstalled without making any moves"
I recommend that you select A, but generally you select B. In fact, I don't even remember the last time when the computer poisoning antivirus software was restored to normal.
Steamed Bread's second law: anti-virus software is essentially a placebo.