1. Firewall and anti-virus software must be installed
No matter what kind of expert you are, these two softwares still need to be installed. Although anti-virus software will be at a loss when faced with new viruses, it is better to go online and find anti-virus methods yourself. But having an anti-virus software is just an extra barrier. No matter how high or short the barrier is, the advantages always outweigh the disadvantages.
A firewall must also be installed, and it is best to install some programs that monitor network processes to always monitor whether there are malicious programs performing illegal operations.
2. Reduce the rights of Administrator users
In the Windows operating system, Administrator is the most advanced user and cannot be seen in normal login mode, so it is easy to ignore the security issues caused by Administrator users.
The initial password of the Administrator user is blank. If a firewall is not installed, hackers can easily enter your computer through the Administrator account. It was too late to do anything at this point.
In fact, this is not a reduction of rights, but the creation of a fake Administrator user without actual rights.
The specific operation is as follows. First log in to Windows with a non-Administrator administrator account, then open: Control Panel-Administrative Tools-Computer Management-Local Users and Groups-Users, delete the Administrator user, then create a new Administrator user, right-click Settings Password, as complex as it is, make it belong to the lowest level user group, and check Account deactivated in the properties.
In this way, even if someone cracks your Administrator account, they will find that it is just an account with no real rights after entering.
3. Disable automatic operation of all disks
Nowadays, U disk viruses are prevalent, and if you are not careful, it will cause "disk failure". The general operating mechanism of U disk viruses is to automatically run by double-clicking the drive letter. Therefore, disabling the automatic operation of all disks is a very effective prevention method.
The specific operation process is: run and enter gpedIT.msc-->User Configuration-->Administrative Templates-->System, double-click [Turn off automatic play] in the list on the right, select "All Drives", and then select "Started" . OK to exit.
4. Do not double-click the U disk
If you have not disabled the automatic operation of all disks, or if you are using the USB flash drive on someone else's computer, it is best not to double-click the USB flash drive. This can easily trigger U disk viruses. The best way is to scan it with anti-virus software first.
The general way to remove viruses in a USB flash drive is to go through the resource manager and see if there is an autorun.inf file in the USB flash drive. It is usually hidden. Delete the autorun.inf file and the program it points to, and then re-insert the USB flash drive.
5. Check startup items frequently
I often enter msconfig in the runtime to check the startup items. If I find anything abnormal, I immediately search for information on the Internet to see if it is a virus.
6. Back up important data frequently
Some important data must be backed up frequently, such as important pictures, personal information, etc. Important data will be burned about once a month, just in case.
7. Use Ghost
I often use Ghost to back up the operating system disk, and directly restore the entire system disk when encountering serious problems. This is a lazy approach because I am too lazy to find the hiding place of the virus, but it is also an efficient and fast method. The problem is that you must always use Ghost for backup, otherwise you will lose something when you restore the system disk, at least the recently installed programs (registration information) will be lost.
8. Private files should be encrypted
Use some encryption program to encrypt files that you think cannot be accessed by the public. There are many free programs available online. Don't think that hiding files is enough. Hiding is just a way of deceiving yourself and others. It's encrypted.
9. Use Firefox
Firefox is not a panacea, but it is better than IE. Compared with IE, using Firefox can effectively reduce the chance of poisoning.
10. Use complex passwords
This is a commonplace topic, but many people still use simple numerical passwords, such as birthdays, ID numbers, etc., which are extremely easy to guess. "Don't worry, only my friends know my birthday." Who says your friends won't peek into your privacy?
11. Don’t tell anyone your password
Telling others your password in a chat tool will expose you to 4 risks:
A. Your computer may have been hacked and your password may have been stolen.
B. Chat tool providers may also steal your password.
C. The person you are chatting with may take advantage of your trust in him or her to act dishonestly.
D. The computer of the person you are chatting with is infected and your password is stolen.
12. Don’t accept documents casually
Especially in QQ, if someone sends you a document, don’t accept it without saying anything. This is very dangerous. Be sure to ask what the other person is posting and whether he or she took the initiative to post it. Do not run it immediately after receiving it. Scan it with anti-virus software first.