Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
Because of the rapid development of the network and various storage devices, the probability of virus spreading is also greatly increased. Although you can install anti-virus software and network firewall to protect your system, but because of the rapid development of virus technology, and even many Web pages contain a lot of malicious code, if the user's awareness of prevention is not strong, even if the installation of anti-virus software is easy to "recruit". After consulting Microsoft data and personal experience, we have summed up a set of methods to prevent the virus, we hope to be helpful.
Install traps, lay ambush.
If you are using the WIN2000/XP/2003 operating system, then you can try the following methods-from the source to allow your system to be immune to the virus.
The first step: the first installed operating system (or you can confirm that your current system is non-toxic), immediately open: "Start → procedures → management tools → Computer Management → Local Users and groups → users", the Super Administrator password changed to more than 10 digits, and try to use numbers and uppercase and lowercase letters combination of passwords.
Computer Manager
Step Two: Create a user, set its password to more than 10 digits and elevate it to super admin.
The purpose of this is to double insurance: If you forget one of these passwords, there is room for you to redeem yourself by logging in with another hyper-tube password, so that you are not denied access to the system, and that online hackers can no longer destroy your system remotely by guessing the way your system controls the password.
Step three: Add two more users, such as: Nyh1, NYH2, and specify that they belong to the user group, OK, ready to work here is all done, after you in addition to the necessary maintenance of the computer do not use Super Administrator and NYH2 login. Just use NYH1 to log on.
Tip: When creating a new user, the default is the user group. If you want to set up an administrator user, after the new user, in the "group" inside, click the Administrators group, "add" to the account to join the Administrators group.
Camouflage Puppets Deceive Attackers
With the trap, how to use it? We continue, login after the internet to find IE, and to create a shortcut to the desktop, right click on the shortcut, select the "Run as other user" point OK! When you want to surf the Internet, click this shortcut, It will be with you for username and password at this time you enter NYH2 username and password!
OK, now you can use this open window to surf the Internet, you can go to rest assured to browse any malicious, malicious, web sites and Web pages, and no longer worry about the recruit!
Tip: Do not use NYH2 to log on to the system, because if so, if nyh2 before what web virus, then in User2 login, they are very likely to be activated!
The following are steps for setting up IE shortcuts:
Right click on the desktop, select "new → shortcut", in the pop-up window select Iexplore (position in "C:\Program files\internet Explorer\iexplore.exe"), click "Next" to complete. Then right click on the shortcut, select "Properties", then click "Advanced Button", in the "Other user status" before the hook.
King Swing Poisoning Puzzle
After the Internet click IE, the following window will appear, input nyh2 and password can be. However, there is always a time of negligence, in the event of accidentally receiving someone else sent the virus file, or from the message received virus files, a careless poisoning how to do? Don't worry, now we can come and enjoy the performance of King technology!
Restart your computer, use the Super Admin login--When you enter the system, do not run any programs, you will be surprised to send the current system is completely non-toxic! That would be better, now open immediately: "Start → procedures → management tools → Computer Management → Local Users and groups → users" bar!
Put the inside of the NYH1 and nyh2 two users all delete it, you only need so lightly a delete on it, then with these two users and the existence of the virus with the two users with the disappearance of the rest of the sleep together (as if it was buried with, hehe!)). Once you've done so, make sure that Windows looks like a new outfit, and that any system files and system processes are completely free of viruses!
All right! Now repeat the start step to create a new NYH1 and nyh2 two users to revive them. Their resurrection was resurrected, but the virus that had followed them did not have the opportunity to do so, as WinXP users would redistribute them to their new configuration, which was new and unlikely to contain the virus! Log off the Super administrator immediately after the build is complete, turn to login using NYH1, Go on with what you want to do, and you'll find your system as new! The above methods can be used again and again, coupled with regular to play Microsoft's patch, almost always guarantee that your operating system is non-toxic! However, you must follow the following two rules:
Two tips for ensuring a non-toxic Windows operating system:
Do not log on to the system at any time as a super admin-unless you are going to perform system-level updates and maintenance, when you need to use Super Administrator status, or when you need to add and remove users.
Second, you must use the Super administrator to log in, to ensure that no use and run any other than the operating system's own tools and programs, and all the maintenance only through the Start menu options to complete, and even use the resource Manager to browse the hard drive is not! Only do user and system management and maintenance immediately quit, and never do more stay! (This is Microsoft's request, Microsoft understands its own dongdong, his advice is correct.) Browsing the hard drive, under the status of other users you have a lot of opportunities, under the status of Super Administrator or not!! This should be fully done.
Summary: Through the above methods should be able to ensure that your system is safe, but the development of computer technology is too fast, the system and the operation of the virus may always be innovative, so the above methods can not guarantee 100% of absolute anti-virus.