How do I protect my computer from attacks?

Updated on technology 2024-02-09
15 answers
  1. Anonymous users2024-02-06

    As long as you turn on the automatic update, there is no system vulnerability, do not access the malicious**, do not mess up the mess, hackers also take you every way, hacking also has to have vulnerabilities in your computer, the computer is slow, it may be that there is too much garbage in your computer, clean it up with 360, it will work, and it is necessary to reinstall the system after a long time.

  2. Anonymous users2024-02-05

    I don't know if it was attacked, but it still has a certain effect on hackers by making the computer free of vulnerabilities and using a good firewall.

    But it may also be a problem with the computer itself. I can give you some advice.

    1 It may be that you usually do not completely clean up the garbage on your computer, resulting in more and more accumulation. (Cleaning up the disk and defragmenting it regularly can improve the running speed of your computer, and you can also use Windows Optimizer to optimize the system.) You can also use your computer's search program to find these junk files.

    Temporary files...tmp *.mp

    Temporary backup of files.

    bak *.old *.syd

    Temporary help files.

    gid installation temporary file.

    Disk check data files.

    chk other temporary files.

    dir *.dmp *.nch

    2It is also possible that you have too much software installed on your computer. (You can delete some software that you don't use often).

    If it doesn't work, you can reinstall the system.

    Hope these words help you.

  3. Anonymous users2024-02-04

    Installing a firewall can effectively prevent attacks.

  4. Anonymous users2024-02-03

    In this way, there is a firewall in the 360 security guard, which is specially designed to prevent attacks, which is quite effective, you can install the security guard and try it.

  5. Anonymous users2024-02-02

    The system can be installed from the ground up. If it's still a card. Then you should be able to upgrade your computer configuration. The main thing is that the computer configuration is a little old. If it can help you. Please adopt it. Thank you.

  6. Anonymous users2024-02-01

    Do you share the internet with them? If you don't have a reload, you shouldn't have this problem.

  7. Anonymous users2024-01-31

    1) Active defense function: actively identify malicious behaviors that attempt to attack personal computers, and inform you of possible risks, reducing the possibility of personal computer damage, especially suitable for novice users;

    2) Real-time monitoring function: it can monitor all the processes running the computer in real time, and nip the danger in the bud;

    3) Autonomous Scanning and Killing Function: Provide you with three options: Lightning Scanning (Quick Killing), Full Scanning and Killing, and Custom Killing Function, you can choose according to your needs and scan and detect your personal computer.

    1) PC Acceleration: Enable boot acceleration by disabling or delaying boot items, and provide a default high-speed mode and an optional high-speed mode to improve the running speed of your computer.

    2) System Cleanup: It can clean up the computer junk and traces in an all-round way, and provide an automatic cleaning function to keep your computer clean and tidy at all times.

    3) Provide three scanning modes: "Lightning Cloud Scanning", "Full Scanning" and "Custom Scanning" to meet your personalized needs.

    Acceleration Circle: Fresh and concise acceleration circle interface, you can understand it at a glance, it is fast at one point, easy to operate, and worry-free operation. Intelligently analyze the running status of your computer, and make your computer run like a fly with just one click.

    Shut down useless processes on your computer, further free up system memory, and improve your computer's running speed.

    4) Acceleration Circle: Fresh and concise acceleration circle interface, you can understand it at a glance, it is fast at one point, easy to operate, and worry-free operation. Intelligently analyze the running status of your computer, and make your computer run like a fly with just one click.

    Shut down useless processes on your computer, further free up system memory, and improve your computer's running speed.

  8. Anonymous users2024-01-30

    Yes. Method 1: One-click recovery.

    You can back up your newly installed system with one-click restore, and when the system is broken, you can just reboot and restore it.

    Method 2: Multi-user method.

    The premise is that you must be at least a Windows 2000 user or higher.

    You use administrato to install the required programs, and do a good job of patching all kinds of security and filial piety, create a common user, and give them restricted permissions, only use permissions, and can't change various settings or anything.

    When the above settings are completed, you can log in with your favorite users every time you view the web page.

    If there is a problem, use AmdiniStrator to remove the user in safe mode.

    It would be better if you could create a batch command to handle this for simplicity.

    In response to the second question:

    You can use a filtered browser such as TT to view the web page.

    There are no absolutes in security, you still have to learn while doing it There are good habits plus the necessary basic knowledge, know how to manually disinfect viruses, everything is not needed, and you can better protect your computer!

    It's better not to delete the amdinistrotor user.,It's good to set up a filial piety complex secret code to dismantle the manuscript.,It's better to create another fake account.,Change the name of the real one.,It's better.。

    Modify registry entries by yourself and block some bad scripts;

    Get the latest patch ...... as fast as possible

    Always pay attention to the slightest anomaly in the computer, even if the problem is ......

    In fact, it means to strengthen the basic learning of computers and pay more attention to the changes in your "children" (computers).

  9. Anonymous users2024-01-29

    1.Install a little better antivirus software2Don't browse Illegals**3

    Patch computer vulnerabilities in a timely manner (Master Lu 360 is good)4The most important thing is to set up another login user, don't use it as a computer manager, and the password should be more complicated5**Something to remember to kill the virus 6...

    Timely backups.

  10. Anonymous users2024-01-28

    Frequent antivirus, usually use a 360 safety safe, it should be possible.

  11. Anonymous users2024-01-27

    Hello 1, you need to install an antivirus software on your computer.

    3. PC Manager is a 2-in-1 antivirus software that has 2 functions of anti-virus and protection, and it occupies a particularly small CPU, with an intelligent DND mode, which will not slow down the running speed of the computer.

    4. PC Manager has 16 layers of real-time protection and QQ panoramic defense, which can protect the computer security and kill the Trojan virus that enters the computer in an all-round way, so that the computer is free from virus invasion.

    If you have any other questions and problems, please come to the computer manager business platform again to ask questions, and we will do our best to answer your questions.

  12. Anonymous users2024-01-26

    No more internet stupid super patrol

  13. Anonymous users2024-01-25

    I've got some software here, don't you want it?

  14. Anonymous users2024-01-24

    Use the 360 Security Assistant to install patches for your system.

    Install firewall software and install anti-virus software.

    Trojan killing software.

    If you know the process, you can also install HIPS software.

  15. Anonymous users2024-01-23

    The security level of antivirus software is high.

    The firewall level is also high.

Related questions
8 answers2024-02-09

You add my mailbox, and I'll send you a good firewall, which is free forever. >>>More

5 answers2024-02-09

For users who dial-up to the Internet and do not have firewalls and anti-virus software, what happens when the Internet is hacked? What are the consequences? Is it possible that hackers can no longer monitor the computer after it goes offline? >>>More

14 answers2024-02-09

To be his boyfriend is to protect her thoroughly.

7 answers2024-02-09

Not found, the app is not launched"A simple workaround.

For the first two days, the computer kept popping up"Not found, the app is not launchedReinstalling the app may fix this issue. "Warnings. The solution to the problem is the following two steps: >>>More

13 answers2024-02-09

There is no way. The best thing is not to go to the Internet café, don't plug in the clicker, etc. This generally does not allow for theft. I play games at home, and I've been playing games for 5 years, but I've never had my number stolen. >>>More