In order to avoid computer poisoning, Xiaobian specially collected some data. About 13 moves
1. Firewall and antivirus software must be installed
No matter what kind of expert you are, these two kinds of software still need to be installed. Although in the face of new viruses, anti-virus software will become at a loss, it's better to find anti-virus methods on the Internet. But there is an anti-virus software is an additional barrier. No matter how high or low the barrier is, the advantages outweigh the disadvantages. I use Kingsoft antivirus software. I think it's good. I suggest installing Kingsoft antivirus!
Firewalls must also be installed. At the same time, it is best to install some programs to monitor the network process to constantly monitor whether malicious programs are carrying out illegal operations.
In addition, some special killings are also very useful, such as 360 security guards, Jinshan cleaning experts and so on.
2. Reduce rights for administrator users
In the windows operating system, administrator is the most advanced user and cannot be seen in the normal login mode. Therefore, it is easy to ignore the security problems caused by administrator users.
The initial password of the administrator user is empty. If the firewall is not installed, hackers can easily enter your computer through the administrator account. It was too late to do anything.
In fact, this is not to reduce power, but to create a forged administrator user without actual rights.
The specific operations are as follows: first log in to windows with a non administrator administrator account, and then open: control panel - management tools - Computer Management - local users and groups - users, delete the administrator user, and then create a new administrator user. Right click to set the password. The password is as complex as it is. Make it belong to the lowest level user group, and check the account disabled in the attribute. As shown in Figure 1.
In this way, even if someone cancels your administrator account, you will find that it is just a useless account after entering.
3. Disable automatic operation of all disks
Nowadays, USB flash disk virus is popular, and a little carelessness will lead to "grid disk". The general operation mechanism of USB flash disk virus is to automatically run by double clicking the disk letter. Therefore, disabling the automatic operation of all disks is a very effective preventive means.
The specific operation process is: run and enter gpedit MSc -- > user configuration -- > management template -- > system, double-click turn off autoplay in the list on the right, select "all drives", and then select "started". OK to exit.
4. Do not double-click the USB flash drive
If you don't need to disable all disks from running automatically, or if you use a USB flash drive on someone else's computer, it's best not to double-click the USB flash drive. It's easy to trigger USB flash disk virus. The best way is to scan it with anti-virus software first.
The general way to remove the virus in the USB flash drive is to check whether there is a virus in the USB flash drive. Run Inf files are usually hidden. Delete autorun INF file and the program it points to, and then reseat the USB flash disk.
5. Check the startup items frequently
Often input msconfig to check the startup item in the operation. If there is any abnormality, immediately find information on the Internet to see if it is a virus. Of course, you don't have to use msconfig. Super rabbit and other software are also very good.
6. Back up important data frequently
Some important data must be backed up frequently, such as important pictures, personal information, etc. I'll burn the information once a month, just in case.
7. Using ghost
Often use ghost to back up the operating system disk, and directly restore the whole system disk in case of serious problems. This is the practice of lazy people. They are too lazy to find the hiding place of the virus, but it is also an efficient and fast method. The problem is that you must often use ghost for backup, otherwise you will lose the system disk, at least the recently installed program (registration information).
8. Private files to be encrypted
Use some encryption programs to encrypt files that you think cannot be exposed to the public. There are many such free software on the Internet. Don't think it's OK to hide the file. Hiding is just a way to deceive yourself and others. It's encrypted. Even if you have photos similar to "Edison Chen", it won't be too dangerous.
9. Use Google
The reason why I recommend using Google is not my preference for Google, but the website security information tips provided in Google search. When a web page in the search results contains a virus or Trojan horse, Google will give a prompt.
10. Using Firefox
Firefox is not omnipotent, but it is always better than ie. compared with ie, using Firefox can effectively reduce the risk of poisoning.
11. Use complex passwords
This is a commonplace talk of an old scholar, but many people use simple numbers, such as birthdays, ID number and so on. This is very easy to guess. "Don't worry, only my friends know my birthday." who said your friends won't peep into your privacy?
12. Don't tell anyone your password
There are four risks to telling someone your password in a chat tool:
A. Your computer may have been hung up and your password stolen.
B. Chat providers may also steal your password.
C. The other person may use your trust in him to do dishonest behavior.
D. The other party's computer was poisoned and your password was stolen.
13. Don't receive files casually
Especially in QQ, when someone sends a document, don't accept it without saying a word. It's very dangerous. Be sure to ask what others send and whether they send it on their own initiative. Don't run it immediately after receiving it. Scan it with anti-virus software first.