Computer safety knowledge: Ten must-know steps to defense computer virus

zhaozj2021-02-16  73

Recently, how can I protect computer viruses, worms and Trojan horses? Please read the following paragraphs in detail:

1. Judgment with common sense

Never open accessories that are unknown mail or attachments you have not received. It should be consciously not open to the seemingly suspicious email attachment. Don't be deceived, think you know the content of the attachment, even if the attachment seems to be .jpg file - because Windows allows users to use multiple suffixes when file name, and many email programs only display the first suffix, for example The email attachment name you see is wow.jpg, and its full name is actually wow.jpg.vbs, open this attachment means running a malicious VBScript virus, not your .jpg viewer.

2, install anti-virus products and ensure the latest virus definition code

It is recommended that you update a virus defining code at least weekly, because the anti-virus software is only most effective. Need to remind you, you are buying Norton Anti-Virus software, not only to update the virus definition code, but also update the engine's engine, which is different from other antivirus software. Such benefits are to meet the needs of new engines in detection and repair, thereby effectively inhibiting viruses and worms.

3. When installing anti-virus software for the first time, be sure to make a thorough virus scan for your computer.

When you first install anti-virus software on your computer, you must take some time to make a thorough virus scan for the machine to ensure that it has not been virus infection. Functional advanced antivirus software vendors now have made viral scans as automatic programs, automatically executed when the user is initially installed.

4. Insert the floppy disk, the disc, and other pluggable media, must be scanned by viral scanning.

Make sure your computer is inserted with floppy disk, disc, and other pluggable media, and automatic virus checks for emails and Internet files.

5, don't download any software from any unreliable channel

This is more difficult to do, because usually we can't judge what is unreliable channel. A relatively easy practice is to identify all the more famous online libraries that have not been virus infections, but the website to provide software download is too much. We can't affirm that they must have adopted anti-virus measures, so compare insurance methods are Safe download software is a virus scan before installation.

6, alert to deceptive virus

If you receive an email from a friend, claim to have a most killed new virus, let you forward the email of the warning nature to all the people you know, this ten eight nine is a deceptive virus . It is recommended that you visit anti-virus software vendors to confirm that there is something. These spoofing viruses not only waste the recipient's time, but may be killed like a virus claimed.

7, use other forms of documents, such as .rtf (Rich Text Format) and .pdf (Portable Document Format)

Common macro viruses use Microsoft Office program to disseminate opportunities to use these file types will reduce the risk of viral infections. Try to store files with Rich Text, which does not indicate that only in the file name, but to use the "Save As" instruction in Microsoft Word, select Rich TEXT in the dialog box. Although Rich Text Format may still contain embedded objects, it does not support Visual Basic Macros or JScript itself. The PDF file is not only a cross-platform, but also safer. Of course, this is not a comprehensive approval of the virus.

8. Don't install the software with a shared floppy disk, or something worse is copy shared floppy disk.

This is a way that caused viruses to spread from one machine to another machine. At the same time, the software is not registered, it will be considered non-genuine software, and we must basically infer, and people who copy illegal software generally do not care about copyright law and legal use software. Similarly, they have enough virus protection for installation and maintenance. Measures will not be too much. Pirated software is the most important channel of viral infection. 9, disable Windows Scripting Host

Windows Scripting Host (WSH) runs various types of text, but it is basically VBScript or JScript. In other words, Windows Scripting Host acts as a translated role between text languages, which may support ActiveX Scripting interfaces, including VBScript, JScript, or Perl, and all Windows features, including access folders, file shortcuts, network access And Windows registration, etc. Many viruses / worms, such as BubbleBoy and Kak.Worm use Windows Scripting Host, you can automatically open an infected attachment without user clicking attachments.

10. Use client-based firewalls or filtration measures

If you use the internet, especially use broadband, and always online, it is necessary to protect your privacy with your personal firewall and prevent your system from accessing your system. If your system does not add effective protection, your home address, credit card number, and other personal information may be stolen.

转载请注明原文地址:https://www.9cbs.com/read-12793.html

New Post(0)