What should computer system security pay attention to

Computer security and network security are very hot topics now. Every netizen has the responsibility to maintain security. We are always worried that our carelessness will damage the computer. If we are familiar with the security knowledge of the computer, can we take preventive measures.

Method introduction

1: use the power supply without overvoltage protection

This error can really destroy the computer equipment and the data stored on it. You may think that the system will be dangerous only in case of thunderstorm, but in fact, any factor that can interfere with the circuit and make the current return can scorch your equipment components. Sometimes even a simple action, such as turning on a device in the same circuit as a computer device (especially a high-voltage appliance such as a hair dryer, electric heater or air conditioner), can lead to a surge, or a branch connected to a wire can also lead to a surge. In case of power failure, power surges will also occur when the power supply is restored. Using surge protectors can protect the system from surges, but remember that most cheap surge protectors can withstand only one surge and need to be replaced later. Uninterruptible power supply (UPS) is better than surge protector. The battery of UPS can stabilize the current and provide you with time to turn off the equipment calmly even in case of power failure.

2: surf the Internet without using firewall

Many home users will not hesitate to connect their computers to beautiful new cables or DSL modems and start surfing the Internet without realizing that they are exposing themselves to viruses and intruders. Whether it is the firewall built in the broadband modem or router, or the independent firewall device between the modem or router and the computer, or the server running firewall software at the edge of the network, or the personal firewall software installed on the computer (such as ICF / Windows Firewall built in WindowsXP, or the third-party firewall software similar to Kerio or ZoneAlarm), in short, All computers connected to the Internet should be protected by a firewall.

The advantage of the personal firewall installed on the laptop is that when the user takes the computer on the road, or plugs into the hotel DSL or cable port, or connects with the wireless hotspot, there is already a firewall. Having a firewall is not all. You also need to make sure that the firewall is turned on and properly configured to play a protective role.

3: ignore the operation and upgrading of anti-virus software and anti spyware software

Let's face it: antivirus programs are very annoying. They always block some applications you want to use. Sometimes you have to stop the anti-virus program before installing new software. Moreover, in order to ensure its effectiveness, it has to be upgraded frequently. It seems that the original version always expires and urges you to upgrade. In many cases, the upgrade is charged. But in the current environment, you can't bear the consequences of not using anti-virus. Viruses, Trojans, worms and other malicious programs will not only weaken and destroy the system, but also spread viruses to other parts of the network through your computer. In extreme cases, it can even destroy the whole network.

Spyware is another growing threat; These software can be installed on the computer itself (usually without your knowledge), collect information in the system, and then send it to the author or seller of spyware programs. Antivirus programs often fail to detect spyware, so be sure to use a professional spyware detection and removal software.

4: install and uninstall a large number of programs, especially beta programs

Due to users' desire for the latest technology, they often install and try new software. The free beta program gives you the opportunity to experience new features first. In addition, there are many free software and shareware that can be downloaded from the Internet. We know that some users have also installed pirated software or "warez".

The more software you install, the more likely you are to use software that contains malicious code, or use software that is improperly written and can cause the system to malfunction or crash. This risk is much higher than using pirated software. Even if you only install the authorized final version of commercial software, too many installations and uninstallations will mess up the registry. Not all uninstall steps can clean up the rest of the program, which will cause the system to slow down gradually.

You should only install the software you really need to use, only use legal software, and minimize the number of installed and uninstalled software.

5: the disk is always full and very messy

Frequent installation and uninstallation of programs (or addition and deletion of any type of data) will make the disk fragmented. The way information is saved on disk leads to disk fragmentation: when saving files in a new empty disk, the files are saved in continuous clusters. If you delete a file that occupies five clusters and then save a file that occupies eight clusters, the values of the first five clusters will be saved in the five empty clusters generated by deletion, and the remaining three will be saved in the next three empty clusters. This makes the file fragmented or fragmented. Then, when accessing the file, the magnetic head will not find all parts of the file at the same time, but will retrieve all the files at different addresses on the disk. This slows down access. If the file is part of a program, the program will run slower. Too fragmented disks run very slowly, just like crawling.

You can use the disk defragmentation tool (program attachment system tool) or the third-party disk defragmentation tool defrag in windows to rearrange the various parts of the file so that the file can be stored continuously on the disk. Another common cause of performance problems and improper application behavior is that the disk is too full. Many programs generate temporary files, which require additional disk space when running. You can use the Disk Cleanup tool of Windows XP or a third-party program to find and delete rarely used files, or you can manually delete files to free up disk space.

Add: computer practical skills can not be missed

Press and hold the windows + L key to quickly lock the screen, and press and hold the windows + e key to turn on the computer.

Press and hold windows + D to quickly return to the desktop, and press and hold windows + tab to display the switching window.

Press and hold the windows + R key and enter PSR Exe enter and turn on the self-contained video recording function. Press and hold the windows + X key to open the power options, device manager and other function menus.

Press and hold the windows + R key, enter OSK and press enter to open the virtual keyboard. Press and hold the windows and + keys to enlarge the screen.

In the multi tab program, press Ctrl + tab to switch the page, press Ctrl + Shift + tab to switch in reverse, press Ctrl + w to close the current page, press windows + FN + home to open the system properties.

Related reading: computer shortcuts

CTRL + C copy.

CTRL + X cut.

CTRL + V paste.

CTRL + Z undo.

Delete delete.

Shift + delete permanently deletes the selected item without putting it in the recycle bin.

While dragging an item, press Ctrl to copy the selected item.

Press Ctrl + shift while dragging an item to create a shortcut for the selected item.

F2 rename the selected item.

CTRL + right to move the insertion point to the beginning of the next word.

CTRL + left to move the insertion point to the beginning of the previous word.

CTRL + down to move the insertion point to the beginning of the next paragraph.

CTRL + up to move the insertion point to the beginning of the previous paragraph.

CTRL + Shift + any arrow keys highlight a piece of text.

Shift + any arrow keys to select multiple items on the window or desktop, or to select text in the document.

CTRL + a Selects everything.

F3 search for files or folders.

Alt + enter to view the properties of the selected item.

Alt + F4 close the current project or exit the current program.

Alt + enter displays the properties of the selected object.

Alt + spacebar opens the shortcut menu for the current window.

CTRL + F4 closes the current document in a program that allows multiple documents to be opened at the same time.

Alt + Tab toggles between open items.

Alt + ESC cycles through the items in the order they are opened.

F6 cycle through screen elements on the window or desktop.

F4 displays a list of addresses in my computer and windows explorer.

Shift + F10 displays the shortcut menu of the selected item.

Alt + spacebar displays the system menu of the current window.

CTRL + ESC displays the start menu.

Alt + underlined letters in the menu name display the corresponding menu.

The underlined letter in the command name displayed on the open menu executes the corresponding command.

F10 activates the menu bar in the current program.

The right arrow key opens the next menu on the right or opens a submenu.

The left arrow key opens the next menu on the left or closes the submenu.

Refresh the current window F5.

Backspace view folders one level above in my computer or Windows Explorer.

ESC cancels the current task.

When inserting a disc into the CD-ROM drive, press shift to prevent the disc from playing automatically.