Three years of no reinstallation to protect the laptop from virus attacks 13 tips

Source: Internet
Author: User

A few days ago, my friend's computer had a virus and infected A Lot Of EXE files. It was very difficult to fix the virus, so he had to format it and suffered heavy losses. My computer is rarely poisoned. At least I know that my computer has never been poisoned. Virus elimination is very difficult, but it is very easy to do a good job of prevention. The following are some of my practices. I personally think that the following measures will minimize computer poisoning opportunities. These measures are only applicable to Windows operating systems.

1. Firewall and anti-virus software must be installed

No matter how powerful you are, these two types of software still need to be installed. In the face of new viruses, anti-virus software may become helpless, so it is better to find anti-virus solutions on the Internet. However, an anti-virus software adds a barrier. No matter how high or low the barrier is, it always has advantages and disadvantages.

The firewall must also be installed. At the same time, it is best to install some programs that monitor network processes and monitor whether malicious programs are operating illegally at all times.

In addition, some *** kill programs are also very useful, such as 360 security guard and Kingsoft cleaning experts.

2. downgrading Administrator users

In Windows, the Administrator is the most advanced user and cannot be seen in the normal login mode. Therefore, it is easy to ignore the security issues caused by the Administrator user.

The Administrator user's initial password is blank. If no firewall is installed, hackers can easily access your computer through the Administrator account. At this time, it is too late to do anything.

In fact, this is not a matter of downgrading. It is to create a forged Administrator user with no actual rights.

The procedure is as follows: log on to windows with a non-Administrator account, Open Control Panel-Administrative Tools-Computer Management-local users and groups-users, and delete Administrator users, create a new Administrator user, right-click to set the password, and make the password more complex, so that it belongs to the user group at the lowest level, and select the Account Disabled in the attribute. 1.

 

In this way, even if someone has cracked your Administrator account, you will find that it is only an account with no real permissions.

3. Disable automatic operation of all disks

Nowadays, the USB flash drive virus is prevalent, and a slight carelessness will lead to a "lattice disk ". The general operating mechanism of the USB flash drive virus is to automatically run by double-clicking the drive letter. Therefore, disabling automatic operation of all disks is an effective preventive measure.

The specific operation process is: run the input gpedit. msc --> User Configuration --> management template --> system, double-click Disable automatic playback in the list on the right, select "All Drives", and select "started ". Are you sure you want to exit.

4. Do not double-click the USB flash drive

If you do not use a USB flash drive to disable automatic operation of all disks or use a USB flash drive on another computer, you are advised not to double-click the USB flash drive. This can easily trigger the USB flash drive virus. The best way is to first scan it with anti-virus software.

The general method to clear viruses in a USB flash drive is to check whether there is an autorun. inf file in the USB flash drive through the resource manager, which is usually hidden. Delete the autorun. inf file and the program it points to, and re-plug the USB flash drive.

5. Check boot items frequently

You often enter msconfig in the operation to view the startup Item. If any exception is found, you can immediately search for information on the Internet to see if it is a virus. Of course, you don't have to use msconfig, Super Rabbit and other software. 2.

6. Frequently back up important data

Important data must be backed up frequently, such as important images and personal information. I burn important materials about once a month, just in case.

7. Use Ghost

Ghost is often used to back up the operating system disk and directly recover the entire system disk in case of serious problems. This is a lazy practice. It is not too easy to find a hidden place for viruses, but it is also an efficient and fast method. The problem is that you must always use Ghost for backup. Otherwise, you may also lose some loss in restoring the system disk, at least the recently installed program (registration information ).

8. Private files must be encrypted.

Using encryption programs to encrypt files that you think cannot be exposed to the public, there are a lot of such free software on the Internet. Do not hide a file. Hiding is just a method of self-deception. encryption is not dangerous even if you have photos similar to Edison Chen.

9. Use Google

The reason why Google is recommended is not because of my preference for Google, but the website Security Information prompt provided by Google search. When a webpage in the search result contains viruses or Trojans, Google will prompt you.

10. use Firefox

Firefox is not omnipotent, but it is always better than IE. Compared with IE, Firefox can effectively reduce the chance of poisoning.

11. Use a complex password

This is a common topic, but there are still many people using simple digital passwords, such as birthdays and ID card numbers, which are easy to guess. "Don't worry, my birthday is only known to my friends." Who said your friends would never look at your privacy?

12. Don't tell anyone your password

There are four risks to tell others your password in the chat tool:

A. Your computer may be infected with Trojans and your password may be stolen.

B. chat tool providers may also steal your password.

C. chatting with the other party may use your trust in him to do dishonest behavior.

D. The Chat peer's computer is poisoned and your password is stolen.

13. do not receive files at will.

It is dangerous to receive files from others, especially in QQ. You must be sure to know what others are sending and whether they are actively sending it. Do not run it immediately after receiving it. Scan it again with anti-virus software.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.