Windows operating system skills to ensure non-toxic two – the operating system, office software – office supplies industry

As the network and the rapid development of various storage devices, making the chance of transmission of the virus greatly increased. Although you can install anti-virus software and firewall to protect your system, but because the virus technology development momentum is very rapid, and even many web pages contain a lot of malicious code, if the user's awareness of prevention is not strong, even if it installed the anti- virus software can easily "caught." Upon review of the use of Microsoft's information and personal experience, we summarize a method of preventing the virus, hoping to be helpful.

Placed traps planted ambush Win2000/XP/2003 If we are using the operating system, then you can try the following methods?? From the source so that your immune system against viruses.

First step: First, install a new operating system (or you can be sure your system is currently using non-toxic), immediately open: "Start Programs Administrative Tools Computer Management Local Users and Groups Users ", the super administrator password to change into more than ten digits, and try to use the combination of uppercase and lowercase letters numbers and passwords.

Computer Manager Second step: the establishment of a user, it also set a password for more than 10 and upgraded to a super administrator.

The goal is to double insurance: If you forget one password, there is another super-tube password to use to save room, so you have been refused in the system outside; addition is not hacker-line then by guessing the password of your system the way super control remote access to your system to conduct damage control.

Third step: add two users such as user names, respectively: nyh1, nyh2; and specify the user group they belong to, well, the preparatory work to be completed here, as you apart from the necessary maintenance of the computer outside do not use the super administrator and nyh2 logged. Use only nyh1 log on it.

Tip: Create new users, the default for the user group. To create an administrator user, the New End users, in the "group" inside, click Administrators group, click the "Add" to join the Administrators group to this account.

Camouflage to deceive the attacker puppet

With traps, how to use? We continue to log the time after the Internet to find IE, and as it creates a shortcut to the desktop, right-click the shortcut, select "run as other user" point to determine! Point to access the Internet when this shortcut, it will tell you when to use user name and password that you enter nyh2 user name and password!

Well, now you can use this to open the window to the Internet, and you can rest assured as you have to browse to any vicious, malicious, websites with web pages, without having to worry about the move it!

Tip: Do not use nyh2 to log on the system, because that case, what if nyh2 previous page in the virus, then user2 login same time, they will most likely be activated!

Following the establishment of IE shortcut steps:

Right click the desktop, select "New Shortcut" in the pop-up window, select Iexplore (location "C: \ ProgramFiles \ InternetExplorer \ Iexplore.exe"), click "Next" to complete. Then right-click the shortcut, select "Properties", then click the "Advanced button" in the "Run As Other User" before playing the bait.

I am a professional editor from China Manufacturers,
and my work is to promote a free online trade platform.
http://www.cheaponsale.com/ contain a great deal of information about
metal stamping manufacturer , electric rotary actuator
welcome to visit!

Processing your request, Please wait....

Leave a Reply