One attack to kill all viruses! No firewall for Internet access

Source: Internet
Author: User

Haha, if you are using Windows 2 K or xp, you will be taught to get rid of the virus !!

If you are a newly installed system (or you can confirm that your system is currently non-toxic), it would be better to open it now:

"Start> program> Management Tools> Computer Management> local users and groups> Users!

The first step is to change the super administrator password to more than ten, and then create a user, set the password to more than ten and upgrade it to super administrator. The purpose of this operation is to achieve double insurance: If you forget one of the passwords, you can use another super-managed password to log in and save it, so that you are not denied from the system; moreover, hackers on the Internet cannot remotely gain control of your system by making guesses about your system's hypervisor password. Then add two users, for example, user1 and user2, respectively, and specify that they belong to the user group. Now, the preparation is complete, in the future, you should not log on to the super administrator or user2. Only use user1 to log on.

After logging on to the Internet, find ie and create a shortcut for it to the desktop. Right-click the shortcut and select "Run as another user". Click OK! Click this shortcut when you want to access the Internet. It will ask you for a user name and password. At this time, you will enter user2's user name and password !!! Now, you can use this window to access the Internet. You can browse any vicious, malicious, website, or webpage with your confidence, without worrying about the trick! Because user1. User2 is an inactive user. When we use this inactive user to access the Internet, no matter how smart the website is, all the information obtained through ie will make it think that user2 is the user of your current activity, if it is to use malicious code to corrupt your system during your browsing, it will not work at all, even if it can work, therefore, only one configuration file of use2 is modified, but many malicious code and viruses attempt to destroy the activity through user2, because user2 is not running at all, how can we obtain the operation right of the system ?? Since it is not desirable, it is helpless to you. And they are even more likely to operate across users, because Microsoft's configuration is originally independent of all users, just as someone else could not come to my house to occupy the bed I used for sleeping, they cannot occupy the location of user1! Therefore, you only need to ensure that you always use this user2 user as a proxy to access the internet (but do not use user2 to log on to the system, because if that is the case, if user2 previously had any webpage virus, so while logging on to user2, they are very likely to be activated !), Therefore, no matter how many web pages of your website are infected with viruses, they cannot be run or loaded by your current user1 user. Therefore, your current system will never be toxic!

But what should I do if I accidentally get poisoned ??

Don't worry. Now we can enjoy the shell-removing technology!

Start shelling:

Restart the computer and log on to the super administrator-do not run any program after entering the system

You will be surprised to find that the system is completely non-toxic !!, It would be better to open it now:

"Start> program> Management Tools> Computer Management> local users and groups> Users!

Delete the user1 and user2 user permissions. You only need to delete them so gently, in the past, the virus that existed with these two users also went to sleep with the disappearance of these two users-(it seems like a funeral, haha !). After doing so, I guarantee that your win2k is like a newly installed one. No virus exists in any system file or system process! Http://www.jz5u.com

Good! Now, repeat the steps to create two new users, user1 and user2, and let them recover. They are resurrected, but the virus that once followed them does not have this opportunity, because win2k will re-allocate new configurations to them when re-establishing users, this configuration is completely new and cannot contain viruses !!! Log out of the Super administrator immediately after the establishment. For example, log on to user1. Continue with what you do. You will find that your system is brand new! The above methods can be used repeatedly, and Microsoft patches are often used to ensure that your operating system is not toxic forever! As long as you can follow the following rules:

1. Do not log on to the system as a super administrator at any time-unless you want to perform system updates and maintenance, use the super administrator identity, or add or delete users.

2. ensure that you do not use or run anything except the tools and programs that come with the operating system when you log in as a super administrator, in addition, all maintenance tasks can only be completed through the options in the Start menu, or even browsing the hard disk using the resource manager! If you only manage and maintain users and systems, you can immediately exit and never stop! (This is also Microsoft's requirement. Microsoft knows its own stuff best and his suggestion is correct. When you browse the hard disk, you have a great chance to access it as another user. As a super administrator, you still don't need it !! This should be done completely ).

If all of the above are done, the reason for hardware and misoperations, viruses, and system paralysis will be excluded from you .......

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.