Tips on system protection

This article will introduce some methods to prevent computer poisoning. The following measures can reduce the probability of computer poisoning. These measures are only for Windows operating system. The following are the tips for system protection compiled by Xiaobian. I hope it can help you!

1. Firewall and antivirus software must be installed

No matter what kind of expert you are, these two kinds of software still need to be installed. Although in the face of new viruses, anti-virus software will become at a loss, it's better to find anti-virus methods on the Internet. But there is an anti-virus software is an additional barrier. No matter how high or low the barrier is, the advantages outweigh the disadvantages.

Firewalls must also be installed. At the same time, it is best to install some programs to monitor the network process to constantly monitor whether malicious programs are carrying out illegal operations.

2. Reduce rights for administrator users

In the windows operating system, administrator is the most advanced user and cannot be seen in the normal login mode. Therefore, it is easy to ignore the security problems caused by administrator users.

The initial password of the administrator user is empty. If the firewall is not installed, hackers can easily enter your computer through the administrator account. It was too late to do anything.

In fact, this is not to reduce power, but to create a forged administrator user without actual rights.

The specific operations are as follows: first log in to windows with a non administrator administrator account, and then open: control panel - management tools - Computer Management - local users and groups - users, delete the administrator user, and then create a new administrator user. Right click to set the password. The password is as complex as it is. Make it belong to the lowest level user group, and check the account disabled in the attribute.

In this way, even if someone cancels your administrator account, you will find that it is just a useless account after entering.

3. Disable automatic operation of all disks

Nowadays, USB flash disk virus is popular, and a little carelessness will lead to "grid disk". The general operation mechanism of USB flash disk virus is to automatically run by double clicking the disk letter. Therefore, disabling the automatic operation of all disks is a very effective preventive means.

The specific operation process is: run and enter gpedit MSc -- > user configuration -- > management template -- > system, double-click [turn off autoplay] in the list on the right, select "all drives", and then select "started". OK to exit.

4. Do not double-click the USB flash drive

If you don't need to disable all disks from running automatically, or if you use a USB flash drive on someone else's computer, it's best not to double-click the USB flash drive. It's easy to trigger USB flash disk virus. The best way is to scan it with anti-virus software first.

The general way to remove the virus in the USB flash drive is to check whether there is a virus in the USB flash drive. Run Inf files are usually hidden. Delete autorun INF file and the program it points to, and then reseat the USB flash disk.

5. Check the startup items frequently

Often input msconfig to check the startup item in the operation. If there is any abnormality, immediately find information on the Internet to see if it is a virus. As shown in Figure 2.

6. Back up important data frequently

Some important data must be backed up frequently, such as important pictures, personal information, etc. I will burn important materials once a month, just in case.

7. Use ghost

Often use ghost to back up the operating system disk, and directly restore the whole system disk in case of serious problems. This is the practice of lazy people. They are too lazy to find the hiding place of the virus, but it is also an efficient and fast method. The problem is that you must often use ghost for backup, otherwise you will lose the system disk, at least the recently installed program (registration information).

8. Private files to be encrypted

Use some encryption programs to encrypt files that you don't think can be used by the public. There are many such free software on the Internet. Don't think it's OK to hide the file. Hiding is just a way to deceive yourself and others. It's encrypted.

9. Use Google

Google is recommended because of the website security information tips provided in Google search. When a web page in the search results contains a virus or Trojan horse, Google will give a prompt.

10. Using Firefox

Firefox is not omnipotent, but it is always better than ie. compared with ie, using Firefox can effectively reduce the risk of poisoning.

11. Use complex passwords

This is a commonplace talk of an old scholar, but many people use simple numbers, such as birthdays, ID number and so on. This is very easy to guess. "Don't worry, only my friends know my birthday." who said your friends won't peep into your privacy?

12. Don't tell anyone your password

There are four risks to telling someone your password in a chat tool:

A. Your computer may have been hung up and your password stolen.

B. Chat providers may also steal your password.

C. The other person may use your trust in him to do dishonest behavior.

D. The other party's computer was poisoned and your password was stolen.

13. Do not receive documents casually

Especially in QQ, when someone sends a document, don't accept it without saying a word. It's very dangerous. Be sure to ask what others send and whether they send it on their own initiative. Don't run it immediately after receiving it. Scan it with anti-virus software first.