1. Install Real time Anti-spyware tool
Many computer users mistakenly believe that a single anti-virus software that contains anti-spyware capabilities can guard against all threats from adware to spyware. Others argue that free anti-spyware applications, combined with anti-virus tools, can be secure in an era of exploding spyware.
Unfortunately, this is not the case. Most free anti-spyware apps do not provide real-time or active protection against threats from adware, Trojans, and other spyware. Although many free programs can detect their threats at the time the spyware infects the system, only professional (or licensed) Anti-spyware programs are usually available to prevent infection and completely eliminate existing infections.
2. Choose the right Anti-malware application
Antivirus and Anti-spyware programs require regular signature and database updates. If no significant updates are made, the Anti-malware program cannot protect your computer from the latest threats.
Statistics at the beginning of 2009 show that many serious computer threats are moving in secret and fast. Although many of those infected are short-lived, they estimate that a day can infect 10 to 300,000 new sites.
Computer users must ensure that their anti-virus and Anti-spyware software is updated in a timely manner. All Windows users must take steps to prevent the license from expiring, ensuring that their anti-malware programs remain up-to-date and can continue to provide protection against the latest threats. These threats are now spreading at an alarming rate, thanks to the growing popularity of social sites like Twitter, Facebook and MySpace.
3. Stick to daily scan
In some cases, threats from viruses and spyware can escape the monitoring of the active defensive protection engine and successfully infect the system. The number and variety of new threats makes it impossible for security software to be fully controlled. Also, users may inadvertently shut down anti-malware tools, causing them to be infected by a virus or spyware program.
Do not control the source of infection, the daily comprehensive scan of the system's hard disk is equivalent to adding a layer of security protection measures. Daily scans can detect, isolate, and purge infections that bypass security software monitoring.
4. Install a valid antivirus tool
Many computer users believe that the free anti-virus tools provided by Internet service providers through bundled services are effective enough to protect the computer from viruses or spyware. But this is not the case, and there are more and more threats, and these free anti-malware programs are often not able to provide adequate protection.
Instead, all Windows users should install enterprise-class professional antivirus software on their computers. Professional antivirus software updates are more frequent (thus providing fast and timely protection against vulnerabilities), preventing broader threats (such as Rootkit), and providing additional protection features such as custom scans.
5. Disable self-running features
Many viruses run with the need to attach themselves to a drive and automatically install them on any other item in the system. As a result, systems that connect any network drive, external hard drive, or even a flash disk can cause automatic propagation of this threat.
Depending on the type of operating system, computer users can turn off Windows ' Autorun features as recommended by Microsoft. Microsoft Knowledge Base articles 967715 and 967940 describe the specific steps of this recommendation.
6. Do not click on the link or attachment in the email
For most Windows users, this may already be an abrasive topic. Do not click on links or attachments in email. However, users usually do not listen to warnings.
For trusted friends and colleagues you know, and even a cunning cheat message, many users will lose their vigilance and forget to check the source and click on the link or attachment in the email. After clicking on a link or attachment in an e-mail message, the system crashes, other machines are infected, and critical information is destroyed.
Users should not click on an attachment to an e-mail message until they have been scanned using an enterprise-class malware application. As for the link, the user should open the browser to manually enter the network address for access.
7. Use the right way to access Web pages
Many enterprise-class malware applications include browser Plug-ins to prevent sneak infections, phishing attacks (some seemingly provide a Web page that provides a feature, but they are actually trying to steal personal, financial, or other confidential information), and similar attacks. Others provide a "secure link" feature that can be used to reconcile a known malicious Web page with a network-linked database.
Whenever possible, these prevention functions should be deployed and used. Unless the plugin interferes with normal web browsing, users should enable them. This approach also applies to pop-up automatic interceptors running on InternetExplorer8, Google toolbars, and other popular browser toolbars.
Regardless of what happens, users should not open accounts that contain personal, financial, or other confidential information on pages that are not manually entered. They should open the browser, manually enter the actual address of the page you want to visit, and the input of your personal information should be in the same way; you should never click on a link and believe that the connection will take him to the right place. Hyperlinks in e-mail messages are often redirected and take users to fraudulent, forged, or unauthorized sites. By manually entering the URLs, users can ensure that they arrive at the actual page that they want to visit.
However, even manual input is not foolproof. So that's the reason to choose the 10th step. Deploy the DNS protection solution. Provide better security.
8. Disable Outlook's image preview feature
In Outlook, the incoming e-mail message contains only one infection, and malicious code contained in the graphic can execute the virus, causing the system to be infected. Therefore, to prevent the system from being automatically infected, you should deactivate the preview image feature in Outlook.
By default, new versions of Microsoft Outlook do not automatically display images. But if you or another user changes the default security settings, you need to switch back (take Outlook2007 as an example). Go to the Tool Trust Center, select the Automatic download option, and choose not to automatically download pictures from the HTML e-mail or RSS.
9. Deploying a DNS protection solution
Access to the Internet will encounter a variety of security risks. One of the most disturbing may be smuggled infections, where users can only access a toxic Web page that causes their computer to become infected (and may begin to continue the system of victim clients, co-workers, and other workers).
10. Using a hardware based firewall
Now, technical experts and other man-made firewalls should be debated based on hardware or software. Typically, if a software firewall is deployed based on Third-party technology, users often have problems sharing printers, accessing network resources, or performing other tasks. According to my experience in many cases, the result is that the firewall is disabled.
However, a reliable firewall is essential because it protects the computer from various attacks from malicious network traffic, viruses, worms, and other security vulnerabilities. Unfortunately, relying solely on a software-based firewall contained in Windows is far from enough to protect the system from all kinds of automatic attacks that affect all systems connected to the network. Therefore, all personal computers connected to the Internet should be effectively protected by hardware-based firewalls.