Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to ensure that windows computers are safe and not poisoned?

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/01 Report--

This article will give you a detailed explanation on how to ensure that the windows computer is safe and not poisoned. The content of the article is of high quality, so the editor will share it with you for reference. I hope you will have some understanding of the relevant knowledge after reading this article.

To be like me, it is not difficult, in a word, to develop good computer use and Internet habits. Habits become natural, from now on to get rid of some bad habits, the following experience, will not make you feel at ease, will not make you unable to do anything, just pay attention to ways and means.

Before the beginning of this article, I would like to say again, I have not been poisoned, but I do not guarantee that there are no unknown Trojans and information surveillance back doors on my computer. This reason is very simple. The pinyin input method and chat software we use, as well as browser software of some large companies, monitor our behavior all the time. Moreover, there are some anti-software and security software that do Trojans and control broilers themselves. We can not guarantee absolute non-toxic and no back door, but can maximize the "relative" non-toxic.

If anyone has opinions or better opinions on this article, you are welcome to put forward suggestions, criticisms and corrections, but please do not open your mouth to make people see through your "high quality" or junk articles. If you have time for nonsense, you might as well help others and contribute to your own blog or computer magazine for the benefit of everyone.

Well, at the beginning of the text, the prologue is a long personal writing style, and the following text is as rich and informative as possible, but strive to be concise and clear. The world is bustling for the sake of profit

But now all the mainstream Trojans are no longer purely to reflect the technology and destroy data for the purpose, but to make money.

If you want to prevent Trojans, you need to know where Trojans and viruses come from, and diseases enter through the mouth. You have to find their entrances and ensure the security of the Windows system from the root.

Next, let's analyze it from the root--

First, the first "root" to ensure security: Windows installation disk

When the first day of the emergence of legitimate software, it also happens to be the birthday of piracy.

Our generation, is growing up with piracy, but also witnessed the beginning of piracy, crazy to now the overall popularity and increasingly low-key. When it comes to piracy, we have to talk about its software, we have to talk about Windows, when we talk about Windows, we have to talk about installation disks.

And God said, Let there be light, and there was light.

The user said that he wanted to install the machine, so there was a pirate disk.

Although the Windows installation time is getting shorter and shorter with the upgrade of the Windows version, it is never expected that a rookie can go through the long process of reinstalling the system step by step, let alone that they can restore the assembly machine with one click when they encounter problems. If you are a master, the smart people are often lazy, and you don't have to deal with things one step at a time for hours. As a result, in a certain year, a certain month, a certain day, there is a machine disk this new thing appeared.

The early installation disk is more used for batch deployment, for example, the brand machine pre-installation system of various computer manufacturers can be said to be the earliest installation disk ancestor. This excellent product idea has been introduced into personal installation, which is no longer just a pure piracy of an original installation CD, but an one-time fool of installation, driver, and necessary software. there is also a built-in one-button restore mechanism so that Aiji can clear the sky at any time.

In this sense, including myself, like to install this kind of piracy. Save time, trouble and worry.

The product manager of Microsoft is also said to be very ashamed to look at other people's pirated installation. We have been busy with Windows in the past 24 years since the birth of What.

Everything is not for no reason, users have this demand, pirated installation disk can more easily help users to achieve fast and comfortable installation, this is the biggest reason for its existence.

If there is existence, it will multiply and exist. The existence of a large number of people is a huge market.

When the computer quickly entered the homes of ordinary people, the pirated disc also ushered in its brilliant era. Overnight, a hundred schools of thought contended, a hundred flowers blossomed, and the pirate installed disk began to fight among the heroes. In the end, the branded work wins. No matter where he comes from, a hero must have a name and a name. As a result, there is a well-known tomato garden, as well as some cabbages, radish gardens and XX editions.

Throughout the dozens of CD-ROM packing parties in China, we have not seen a single one that is sincerely dedicated to the public welfare. Of course, it is understandable that it takes a lot of brainpower and energy to make the machine more stupid. If you put some commercial software and hooligans, you will get something in return as well. In the era of market economy, there is no pie falling from the sky, even if there is, the pie falling from high altitude may make you dizzy or even shattered.

Slap-sized optical discs have been copied to users' computers through the Internet, computer city installers, enthusiasts and pirates. This number, in China alone, is hundreds of millions of computers. Along with them running hand in hand into the user's computer desktop is the default URL home page, default search, default input method, default browser, default audio and video player, default antivirus software, default... Default broiler back door. Various software developers and search engine companies also want to negotiate with these CD "developers", thus creating such low-key billionaires.

If you want to be clean and clean, you can either buy a brand machine pre-installed genuine version, or ask acquaintances and friends to help install a pure version, or learn to become a computer master by yourself. In fact, the online installation disk has long been branded and dare not be foolish, but they can not control the seemingly serious bundled software. God knows if your game equipment will evaporate overnight. Moreover, pirated CDs have long been repeatedly pirated. There are n versions of XX Garden and XX Woodwind and XX, and so on. You can't find these real versions, and they dare to provide official websites again at the risk of prison? It's really hard to find piracy, maybe it's piracy, yes, there are rogue revised versions and knockoffs.

Loss, always have to eat, novice download installation disk, which must not often reinstall n times and download n versions. It is not easy to help people install the machine everywhere with a so-called classic version of the CD-rom. It is praised by others as: "my husband is really an expert." at the same time, God knows if there is a nest of back doors in his computer.

...

I can't help talking about so many causes and consequences, and the first "root" to ensure the security of Windows is to install the disk and use only the original! Also, do not use any cracking and activation software!

Yes, the Windows installation disk must be pure original! Whether you are XP, Vista or Windows7, don't trust any modified version on the Internet. Even if some modified version is clean, you can't tell whether the modified version has been maliciously modified by others, pirated or pirated, in a word, don't use it! Let alone any form of Ghost version of the system.

The pure original refers to the official retail version of Microsoft and the original OEM of computer manufacturers with brands such as Lenovo hp.

As for the activation and cracking software of Windows, do not use it. Although we do not want to encourage piracy, we also put forward two suggestions here for technical reference only:

1. There is no need to crack and activate the large client version of the XP:XP system.

2. Install Vista: nonsense, if the brand machines you buy are pre-installed, they are all authentic. If you are your own assembly machine and have a more beautiful, better, faster and more resource-saving Win7, why install Vista?

3, install Win7: there is a suspected Microsoft official deliberately released the Windows7 activation of the god key ("do not need to crack, 9 god Key directly activate Windows7"), just activate it directly.

OK, if the above methods of these original systems can not be activated, go to the original OEM, brush bios, and install the pure original OEM system of the corresponding computer brand, without cracking. It is true that the assembly machine has no way to activate Win7, and there are Windows7 optimization masters, and there is a free trial of authentic Windows7 for one year in the system settings (the principle is to extend the probation period by modifying the registry), there are many ways.

Download area: pure original Microsoft system and brand manufacturer OEM original system download

Some netizens in the above forum area have specially sorted out the pure original Windows system Daquan post!

Second, the second "root" to ensure security: software download and usage habits

Develop a good habit of downloading on the Internet, no matter how pure the system is, there is something wrong with the software you install, and it's no use. List some good habits for downloading and using the software:

1. Only go to well-known download stations: brand download software only go to large download stations or official websites of brand software. for details, you can refer to those download sites listed on the home page of 6655 URL Daquan.

2. Don't trust search: the position in front of search engine search results is very valuable, so many small and medium-sized download sites, Trojans and virus sites are playing the so-called SEO (search engine Optimization), ranking in front of search results by various means. Therefore, look for software and search in the large download station in Article 1 above, instead of using any search engine. Most of the time, search for a software, click on the front page and click to download, it's not the software you want at all, it's all xx home plug-ins, xx players, xx browsers.

3, do not believe picture advertising: yes, now found that the large download site is also very poor experience, misleading users, so that it is difficult for users to find a real download link to the software. No matter the download sites, large and medium-sized, are full of picture advertisements, if you see a picture in the download station that says "Telecom download Netcom download", as long as it is a picture, do not click, 100% are advertisements. Most of the rogue plug-ins on the home page of stubborn browsers are promoted through this kind of picture advertisement and picture advertisement in the lower right corner.

4. Try not to use unknown software: most of your needs are provided by well-known software. of course, if you have to download plug-ins such as games and QQ Farm assistants, you will definitely encounter theft viruses and Trojans.

5, stand-alone game download: do not play games on the Internet is not realistic, now the vast majority of stand-alone game download sites have changed, see similar what stand-alone game download what please be careful, basically with stubborn IE home page hooligans, of course, with the latest Rubik's cube, has been able to thoroughly clean up these stubborn home pages, you can completely delete them on the desktop "can not delete" advertising icon. However, why solve the problem only after winning? What if they put an extra back door?

6, network disk: many of the software recommendations seen in the forum are downloaded from the network disk, click to enter, dazzling ads so that you do not know where is the real download address, and some network disk prompts you to install special software, click, so hit.

7, software installation: good software will also have bundling behavior, there is no way, it is all for profit, but depends on what is bundled, also depends on whether there is a hint. For example, QQ installation will prompt you whether to install the IE address bar plug-in and set the home page, and so on, it is understandable, but it is important to note that our soft media optimization master series software also prompts to set 6655 navigation home page and Google toolbar installation tips, we should see clearly the options and tips for each step when installing any software. However, many xx players and so on, bundled with more than 10 plug-ins, without even a hint, directly install a bunch for you, at this time, see the first four above. It's not scary to set up the browser home page, it's scary that you can't change it back, and you can't change it back.

Software upgrades: even software upgrades from many large companies are very crooked. If you look at the contents of the upgrades carefully, they will do something else to "upgrade" you with other software that you may not need at all.

Third, the third "root" to ensure security: the latest patch installation of the system.

Set your Windows Update option to install automatically, and the latest patches will prompt you to download and upgrade. Don't turn this off. This is the only way Microsoft can keep your system safe as soon as possible.

Fourth, the fourth "root" to ensure security: killing software and firewalls.

1, XP system: you do not run naked under XP (novice: streaking means not installing any software and firewalls), users who log on to Windows are born with administrator rights, and all kinds of software installation and operation can modify your system registry and files at will, good software killing and firewalls are necessary.

2. Vista system and Win7 system: keep the default UAC (user account control) of Vista and Win7. It doesn't matter if you don't install the software. Once you run the software or install the program, UAC will jump out of the prompt box to prompt the administrator permissions. Be careful when you are not familiar with the software. What do they want the administrator rights to do? it is not to optimize and set the system. Of course, it's really annoying not to turn off UAC under Vista, and it's easy to jump out of the prompt. Under Win7, it's much better, and it also provides a number of UAC prompt options. It is strongly recommended that Windows7 users do not turn off the UAC function, only give familiar software administrator rights, turn on UAC, and there are no tricks for all kinds of virus web pages, even if your browsers such as IE may have unpatched vulnerabilities.

I use the Win7 system, streaking, of course, it is not installed to kill soft, habitually open regularly under the scan memory, but usually is absolutely not open. After all, killing software takes up too many system resources, such as when Rubik's cube scans and cleans up system garbage files, the speed is the same without killing software. if you turn on killing software, it will significantly reduce the efficiency, and whether you run naked or not depends on whether you can do it or not. There is a pure system plus good software usage habits and the latest patches, streaking naturally has the truth of streaking.

On how to ensure the safety of windows computers and not poisoned to share here, I hope that the above content can be of some help to you, can learn more knowledge. If you think the article is good, you can share it for more people to see.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report