· Taking a look at 10 silly things will make your computer insecure
Users will always use endless ways to bring themselves into trouble. They use shared software to expose themselves to intruders or forget to use voltage protection devices. Share this silly list with your users to prevent them from making the mistakes they could have avoided.
We have all done silly things, and computer users are no exception. Accidentally pressing the wrong combination key or selecting "OK" in the error dialog box without knowing it may change important settings, which may affect computer behavior and even cause system crash.
Nervous new users often fear that a wrong operation will permanently damage the computer. Fortunately, the results are not as serious as you think. Even so, users often create various troubles for computers and your networks. The following are common errors that you and your users can take as a precaution to stay away from preventive problems.
#1: Use a power supply without Overvoltage Protection
This error can really destroy computer devices and the data stored above. You may think that the system is dangerous only when a thunderstorm occurs, but in fact, any factors that can interfere with the circuit so that the current flow can burn your device components. Sometimes, even a simple action, such as opening a device that is in the same circuit as a computer device (especially a hair dryer, electric heater, or air conditioner, or other high-voltage electrical appliances) can lead to a surge, or electrical surges can also be caused by electrical connections on branches. If a power outage occurs, a power surge occurs when the power supply is restored.
The use of surge protector can protect the system from the danger of surge, but remember that most of the cheap surge protectors can only defend against one surge and need to be replaced later. The uninterruptible power supply (UPS) is better than the surge protector. The UPS battery can stabilize the current. Even if the power is down, it can also provide you with time to close the device.
#2: access the Internet without using the Firewall
Many home users do not hesitate to connect their computers to beautiful new cables or DSL modems to access the Internet without realizing they are exposing themselves to viruses and intruders. Whether it is a firewall built in a broadband modem or router, an independent firewall device between the modem or the router and the computer, or a server running firewall software on the edge of the network, or the personal firewall software installed on the computer (such as the built-in ICF/Windows Firewall in Windows XP, or third-party firewall software similar to Kerio or ZoneAlarm). In short, all computers connected to the Internet should be protected by firewalls.
The advantage of a personal firewall installed on a laptop is that a user has a firewall when taking the computer on the road or inserting a hotel DSL or cable port, or connecting to a wireless hotspot. Not all firewalls are available. You also need to make sure that the firewall has been enabled and configured properly to provide protection.
#3: Ignore the running and upgrade of anti-virus software and Anti-Spyware
Let's face the reality: anti-virus programs are annoying. They always block some applications you want to use, and sometimes you have to stop anti-virus programs before installing new software. In addition, upgrades are required frequently to ensure the effectiveness. It seems that the original version is always about to expire, and you are urged to upgrade, in many cases, the upgrade is charged. However, in the current environment, you cannot bear the consequences of not using anti-virus. Viruses, Trojans, worms, and other malware not only weaken and damage the system, but also spread viruses to other parts of the network through your computer. In extreme cases, the entire network can be damaged.
Spyware is another increasing threat. These software can be installed on your computer (usually when you don't know it ), collect information from the system and send it to the author or seller of the spyware program. Virus defense programs are often unable to detect spyware, so be sure to use a professional spyware probe cleanup software.
#4: Install and uninstall a large number of programs, especially test programs
Due to users' desire for the latest technology, they often install and try new software. Free beta apps give you the opportunity to experience new features first. There are also many free software and shared software that can be downloaded from the Internet. We know that some users have installed pirated software or "warez ".
The more software you install, the more likely you will be to use software containing malicious code or use software that may cause system malfunction or crash if you write improperly. This is much more risky than using pirated software.
Even if you only install the commercial software of the authorized final version, excessive installation and uninstallation will disrupt the registry. Not all uninstallation steps can clean up the remaining part of the program, which will cause the system to slow down gradually.
You should only install the software you really need, only use valid software, and minimize the number of software installation and uninstall.
#5: the disk is always full and messy
Frequent installation and uninstallation of Programs (or addition and deletion of any type of data) will make the disk scattered. The storage of information on a disk leads to the generation of disk fragments: When files are saved in a new empty disk, the files are saved in a continuous cluster. If the file you deleted occupies 5 clusters and a file occupies 8 clusters is saved, the values of the first five clusters are saved in the five empty clusters generated after deletion, and the remaining three are saved in the next three empty clusters. In this way, the file is scattered or split. Then, when accessing the file, the head does not find all the parts of the file at the same time, but Retrieves all the files from different addresses on the disk. This slows down access. If the file is a part of the program, the program runs slowly. A scattered disk is very slow, just like crawling.
You can use the disk fragment tool (Program | attachment | System Tool) in Windows or the third-party disk fragment tool defrag to reschedule all parts of the file, this enables continuous storage of files on disks.
Another common cause of performance problems and improper application behavior is that the disk is full. Many programs generate temporary files, and the disk needs to provide extra space for running. You can use the disk cleanup tool of Windows XP or a third-party program to find and delete rarely used files, or you can manually delete files to release disk space.
· Taking a look at 10 silly things will make your computer insecure
#6: open all attachments
Some people cannot control themselves: they receive emails with attachments as if they were given an unexpected gift. You just want to see what the attachment is. However, just as there may be a bomb in the package in front of you, the file attachment in the email may contain a code that can delete files or system folders, or send viruses to all contacts in the address book.
The most vulnerable attachment is the executable file (that is, the extension name is .exe,. cmd, and many other types (see the http://antivirus.about.com/od/securitytips/a/fileextview.htm to view a list of different types of executable file extensions ). Files that cannot be operated independently, such as word.doc files. Excel files can contain built-in macros. Scripts (Visual Basic, JavaScript, Flash, etc.) cannot be directly executed by computers, but can be run through programs.
In the past, it is generally regarded as a pure Upload File (.txt.pdf or image file (.gif,. jpg,. bmp), which is safe, but not now. Then. Only greatfile.jpg is displayed. In this way, the recipient will think it is an image file, but it is actually a malicious program.
You can open an attachment only when you are sure that the attachment source is reliable and that you know what it is. Even if emails with attachments seem to come from people you can trust, some may disguise their addresses as such, or even the sender's computer is infected with viruses, they sent attachments without their knowledge.
#7: Click All links
Opening an attachment is not the only trouble you can bring with the mouse. By clicking an email or hyperlink on a webpage, you can be taken to a webpage embedded with ActiveX control or script. Using these links, you can perform various types of malicious behaviors, such as clearing hard disks, or install backdoor software on the computer so that hackers can gain control of the system.
An incorrect link may also take you to a website with pornographic images, pirated music, software, and other undesirable content. If you are using a work computer, you may be in trouble or even get involved in a lawsuit.
Please do not give in to click dry fever. Before clicking the link, consider it. Some links may be disguised as phishing information or webpages that may take you to other websites. For example, the link address may be www.safesite.com, but it actually points to www.gotcha.com. Generally, you can slide over the link with the mouse instead of clicking it to see the actual URL.
#8: shared or similar behavior