Tips to effectively prevent the operating system from being non-toxic

Source: Internet
Author: User

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

Because of the rapid development of the network and various storage devices, the probability of virus spreading is also greatly increased. Although you can install anti-virus software and network firewall to protect your system, but because of the rapid development of virus technology, and even many Web pages contain a lot of malicious code, if the user's awareness of prevention is not strong, even if the installation of anti-virus software is easy to "recruit". After consulting Microsoft data and personal experience, we have summed up a set of methods to prevent the virus, we hope to be helpful.

If you are using the WIN2000/XP/2003 operating system, then you can try the following methods-from the source to allow your system to be immune to the virus.

The first step: the first new installation of the operating system (or you can confirm your current use of the system is non-toxic), immediately open:

"Start → procedures → management tools → Computer Management → Local Users and groups → users", change the Super administrator password to more than 10 digits, and try to use the combination of numbers and uppercase and lowercase passwords.

Step Two: Create a user, set its password to more than 10 digits and elevate it to super admin.

The purpose of this is to double insurance: If you forget one of these passwords, there is room for you to redeem yourself by logging in with another hyper-tube password, so that you are not denied access to the system, and that online hackers can no longer destroy your system remotely by guessing the way your system controls the password.

Step three: Add two more users, such as: Nyh1, NYH2, and specify that they belong to the user group, OK, ready to work here is all done, after you in addition to the necessary maintenance of the computer do not use Super Administrator and NYH2 login. Just use NYH1 to log on.

Tip: When creating a new user, the default is the user group. If you want to set up an administrator user, after the new user, in the "group" inside, click the Administrators group, "add" to the account to join the Administrators group.

Camouflage Puppets Deceive Attackers

With the trap, how to use it? We continue, login after the internet to find IE, and to create a shortcut to the desktop, right click on the shortcut, select the "Run as other user" point OK! When you want to surf the Internet, click this shortcut, It will be with you for username and password at this time you enter NYH2 username and password!

OK, now you can use this open window to surf the Internet, you can go to rest assured to browse any malicious, malicious, web sites and Web pages, and no longer worry about the recruit!

Tip: Do not use NYH2 to log on to the system, because if so, if nyh2 before what web virus, then in User2 login, they are very likely to be activated!

The following are steps for setting up IE shortcuts:

Right click on the desktop, select "new → shortcut", in the pop-up window select Iexplore (position in "C:\Program files\internet Explorer\iexplore.exe"), click "Next" to complete. Then right click on the shortcut, select "Properties", then click "Advanced Button", in the "Other user status" before the hook.

King Swing Poisoning Puzzle

After the Internet click IE, the following window will appear, input nyh2 and password can be. However, there is always a time of negligence, in the event of accidentally receiving someone else sent the virus file, or from the message received virus files, a careless poisoning how to do? Don't worry, now we can come and enjoy the performance of King technology!

Restart your computer, use the Super Admin login--When you enter the system, do not run any programs, you will be surprised to send the current system is completely non-toxic! That would be better, now open immediately: "Start → procedures → management tools → Computer Management → Local Users and groups → users" bar!

Put the inside of the NYH1 and nyh2 two users all delete it, you only need so lightly a delete on it, then with these two users and the existence of the virus with the two users with the disappearance of the rest of the sleep together (as if it was buried with, hehe!)). Once you've done so, make sure that Windows looks like a new outfit, and that any system files and system processes are completely free of viruses!

All right! Now repeat the start step to create a new NYH1 and nyh2 two users to revive them. Their resurrection was resurrected, but the virus that had followed them did not have the opportunity to do so, as WinXP users would redistribute them to their new configuration, which was new and unlikely to contain the virus! Log off the Super administrator immediately after the build is complete, turn to login using NYH1, Go on with what you want to do, and you'll find your system as new! The above methods can be used again and again, coupled with regular to play Microsoft's patch, almost always guarantee that your operating system is non-toxic! However, you must follow the following two rules:

Always guarantee the operating system non-toxic two rationale:

Do not log on to the system at any time as a super admin-unless you are going to perform system-level updates and maintenance, when you need to use Super Administrator status, or when you need to add and remove users.

Second, you must use the Super administrator to log in, to ensure that no use and run any other than the operating system's own tools and programs, and all the maintenance only through the Start menu options to complete, and even use the resource Manager to browse the hard drive is not! Only do user and system management and maintenance immediately quit, and never do more stay! (This is Microsoft's request, Microsoft understands its own dongdong, his advice is correct.) Browsing the hard drive, under the status of other users you have a lot of opportunities, under the status of Super Administrator or not!! This should be fully done.

Summary:

Through the above methods should be able to ensure that your system is safe, but the development of computer technology is too fast, the system and the operation of the virus may always be innovative, so the above methods can not guarantee 100% of absolute anti-virus. This is just a few tips that the http://www.dgbaohumo.com found when they were doing the website.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.