In the previous article, I gave you a personal computer security strategy to avoid social engineering harm. This article describes how to prevent malware and how to use ThreatFire.
First, take the initiative to deal with malware
Traditional signature-based anti-virus software is increasingly under suspicion, so cloud security is becoming increasingly popular. As malicious software authors and attackers try their best to escape detection, even the laboratories of some famous security companies may temporarily fail to analyze the latest malicious activity features. Therefore, in addition to the signature technology, any promising anti-virus software attaches great importance to the use of the so-called active protection technology, which does not require a complete signature to be able to locate malware.
Among them, a particularly promising method is to use behavior analysis to identify malware, which is based on how it operates on the user's computer. However, only the user's anti-virus software is not enough. Here I recommend ThreatFire, a popular software in foreign countries, developed by the famous pctools company and added a behavior-based protection layer. It is said that in recent tests, it can correctly identify 90% of malware only based on its own behavior analysis.
Let's take a look at the use of this software.
Although the software can proactively defend against threats, users can still use it to scan their systems. Double-click the ThreatFire icon in Step 1:
498) this. style. width = 498; "border = 0> |
Figure 1 |
You can see the main interface displayed on the 15th page:
498) this. style. width = 498; "border = 0> |
Figure 2 |
Click the Start Scan button to display the window shown in 16:
498) this. style. width = 498; "border = 0> |
Figure 3 |
You can set the Scan method here. Generally, you can select Basic Scan. to be cautious, you can also select Full Scan ). Click Start Scan to Start scanning the user's system. In this case, 4 is displayed:
498) this. style. width = 498; "border = 0> |
Figure 4 |
Note that ThreatFire can scan some rootkit code to improve system security. I think that the firewall and the latest anti-virus software installed with patches are safe. The XP system is also infected with a malicious program, as shown in Figure 5:
498) this. style. width = 498; "border = 0> |
Figure 5 |
Select the detected threats and click "Quarantine Selected" to isolate the Selected threats. See Figure 6:
498) this. style. width = 498; "border = 0> |
Figure 6 |
The system uses the red font to tell us that the threat has been isolated, as shown in Figure 20:
498) this. style. width = 498; "border = 0> |
Figure 7 |
In the process of use, I feel that it is best to use the scan with anti-virus software to improve the security of the system.
The most valuable thing is that this software can be further customized. You can click the "Threat Control", "Advanced Tools", and "Settings" buttons to further set the Settings to better protect your system.
For example, as shown in Figure 21, after the "Advanced Tools" dialog box is opened, click the "System Activity Monitor" tab to Monitor the Activity status of each program in the System:
498) this. style. width = 498; "border = 0> |
Figure 8 |