How to make the computer not heavy virus pinch,

Updated on healthy 2024-02-09
16 answers
  1. Anonymous users2024-02-05

    Due to the various ways of transmission of computer viruses and the fact that they usually have a certain degree of concealment, it is necessary to first raise the awareness of the whole people to prevent computer viruses, and pay attention to the following points in the process of using computers: (1) Try not to use pirated or unknown software. 2) Back up the hard disk pilot and master boot sector data, and back up important data frequently.

    3) Develop a good habit of checking the hard disk and every foreign disk with antivirus software. (4) Antivirus software should be upgraded regularly, and the general interval should not exceed one month. (5) Install real-time monitoring antivirus software, of course, this is not a one-and-done method, antivirus software may not be effective against all viruses, and viruses are updated quickly.

    6) Pay attention to all kinds of abnormal phenomena of the computer at any time, and once found, you should immediately check it carefully with antivirus software. Antivirus software is an effective tool to prevent virus infection, and you should try to have as many sets of antivirus software as possible, because each antivirus software has its own characteristics. (7) Some viruses are mainly transmitted by e-mail, which is called "mail virus".

    They are usually spread through the entrainment of an "attachment" in an email, and if you run a virus program in that attachment, you can poison your computer. So, don't easily open the attached file in a letter from a stranger.

  2. Anonymous users2024-02-04

    360 Security Guard on +.

    Fix system vulnerabilities.

    It works great. Try not to enter the Yellow Station.

    Because there are a lot of viruses hanging Trojans.

  3. Anonymous users2024-02-03

    Patching, updating system patches at any time, patches are filled, there are fewer vulnerabilities, and it is not easy to be invaded by viruses.

    Install anti-virus software. Firewall.

  4. Anonymous users2024-02-02

    Less bad **, with 360 browser, 360 security guard.

  5. Anonymous users2024-02-01

    Installed 360 security guard,It's not that big.,So browsing the toxic ** will prompt.,If you're still worried, you'll get an anti-virus software.。

  6. Anonymous users2024-01-31

    Go get a 360.

    Now the 2009 free version is good.

    It can effectively kill the virus!!

    and anti-virus !!

    Good words with it.

    Give me the points!!

    Hey.

  7. Anonymous users2024-01-30

    1. To play system-wide vulnerability patches and third-party software vulnerability patches, it is best to use 360 and Kingsoft cleanup experts to patch, 360 security guards + Kingsoft cleanup experts to patch, which is more humane, and it never detects some patches that should not be played. It doesn't let go of any patches that should be hit.

    2. To install anti-virus software and firewalls, update the anti-virus software database every day. Manually define firewall rules for your situation.

    3. Use third-party browsers to surf the Internet, such as Window of the World, Myie, Firefox, and IE have too many vulnerabilities.

    4, QQ chat does not hit the ** sent by strangers in the late group, do not mess into the QQ space, because there may be Trojan horses to swim Dan pickup. Don't go to unfamiliar sites or small sites** software, listen to songs, watch movies.

    disk, ***, the use of mobile phone memory card, i.e., the spread of U disk virus. Use Kingsoft Cleanup Expert and other software to do immunity.

    7.Web Trojans, malware, advertising plug-ins, etc.

    Defense method: Use at least 360+ Kingsoft Cleanup Expert + Malware Cleanup Assistant + Windows every day

    Security tools such as Cleanup Assistant + Card Assistant clean up system junk. Many of them are green software, with no conflicts, small memory occupation, and good detection and killing effects. Upgrade to the latest version, the latest detection engine, and the latest virus database, and then switch to safe mode.

    Adding important software such as Shenchang online banking, online games, and QQ to the "Rising Account Safe" or "360 Safe" can effectively protect the password security.

    Plagiarism is prohibited, otherwise it will be reported -

  8. Anonymous users2024-01-29

    Patch the system often, many viruses are invaded from the system vulnerability shouting, but also often scan for Trojan viruses, the main antivirus software with a slow brother card or Rising, auxiliary with 360 security guard, windows cleaning assistant, don't go on the small **, but also pay attention to mobile devices, install firewalls, configure good rules, so as to greatly reduce the chance of viruses, but also reduce the risk of theft, this is the right way to prevent it.

    To prevent the harm of Trojans, the following measures should be taken:

    First, install anti-virus software and Zheng Naye's personal firewall, and upgrade it in time.

    Second, set the security level of your personal firewall to prevent unknown programs from transmitting data to the outside world.

    Third, consider using a browser and email client tool with good security.

    Fourth, if you use IE browser, you should install the card security assistant to prevent malicious ** from installing unknown software and browser plug-ins on your computer, so as not to be invaded by Trojans.

  9. Anonymous users2024-01-28

    1: Don't go into the stuffy **.

    2: Li Xiang turns on the firewall.

    3: Install the anti-virus software.

    4: Pay attention to the infection of mobile hard disks such as USB flash drives.

    5: Fix system vulnerabilities.

  10. Anonymous users2024-01-27

    Hello: Be sure to develop good habits and maintain computer security.

  11. Anonymous users2024-01-26

    Buy a good antivirus.

    Improve your own anti-virus awareness.

    Develop a good habit of checking your hard drive and every foreign disk with antivirus software, regularly clean up your system's junk files, and defragment your disk once a month.

    All software is genuine.

  12. Anonymous users2024-01-25

    Awareness of computer viruses should be raised.

    Do not use pirated or unknown software.

    Good Internet habits, don't go to small ** browsing.

    Pretend to be a Rising to kill soft.

  13. Anonymous users2024-01-24

    Buy an antivirus, or open a firewall!

  14. Anonymous users2024-01-23

    Computer viruses "often walk by the river, how can they not get their feet wet", exchanging files, surfing the Internet, sending and receiving e-mails may be infected with viruses. Follow these principles to prevent problems before they occur.

    The first is to establish a correct concept of anti-virus and learn about viruses and anti-viruses.

    Third, do not use pirated software.

    Fourth, don't use other people's floppy disks or CDs casually. Try to make the special plane and special plate dedicated.

    Fifth, check before using new equipment and new software.

    Sixth, use anti-virus software. Upgrade the virus database of the anti-virus softbridge state upgrade in a timely manner, and enable real-time virus monitoring.

    Seventh, make backups regularly. Make it a habit to back up your important files.

    Panda burns incense "virus transmission route) eight is to make a non-toxic system floppy disk. Make a non-toxic system disk, write it for protection, and keep it properly for emergency use.

    The ninth is to make emergency disks, first aid sensitive old disks, and recovery disks. According to the requirements of anti-virus software, make emergency disks, emergency dismantling and rescue disks, and recovery disks in order to restore the system for emergency use. On the emergency disk, rescue disk, and recovery disk, important information data about the system is stored, such as the main boot area information of the hard disk, the boot area information, the CMOS device information, etc., as well as the two hidden files of the DOS system.

    Ten is generally not to use a floppy disk to boot. If your computer can boot from the hard drive, don't boot it with a floppy disk, as this is the main cause of viruses in the boot area of the hard drive.

    Eleventh is to pay attention to whether the computer has abnormal symptoms.

    The twelfth is to report suspicious situations in time to obtain help.

    The thirteenth is to rebuild the hard drive partition and reduce the loss. If the hard disk data has been damaged, there is no need to format it in a hurry, because it is impossible for the virus to destroy all the hard disk data in a short time, so you can use the "post-disaster reconstruction" program to analyze and rebuild.

  15. Anonymous users2024-01-22

    Disease treatment, disease-free prevention This is the most basic and crucial requirement for people's healthy life, and prevention is more important than **. The same is true for computers, it is particularly important to understand viruses and develop a good computer application management habit for viruses to protect your computer from computer viruses. In order to reduce the infestation of the virus, it is recommended that everyone can do "three strikes and three preventions" at ordinary times.

    "Three dozen" is to install a new computer system, pay attention to the system patch, **wave and other vicious worms are generally spread through system vulnerabilities, patching can prevent such virus infection; When users surf the Internet, they should turn on the antivirus software to monitor in real time, so as to prevent viruses from entering their computers through the network; When playing online games, you should turn on your personal firewall, which can isolate viruses from the outside world and prevent Trojan viruses from stealing data.

    "Three proof" is to prevent email viruses, users should first scan for viruses when receiving emails, do not open attachments carried in emails at will; Anti-Trojan virus, Trojan virus is generally spread through malicious **, users from the Internet ** after any file, must first scan the virus before running; Anti-malicious "friends", now many Trojan viruses can be spread through instant messaging software such as MSN and QQ or email, once your ** friends are infected with viruses, then all friends will be invaded by viruses.

  16. Anonymous users2024-01-21

    China's first, the first product that responds to the international mainstream of Tanpi and integrates anti-virus + management functions.

Related questions
12 answers2024-02-09

Find the registry key of the corresponding game and export it, save it, and then import the registry after redoing the system.

12 answers2024-02-09

Use a wireless land gamer, and then buy a junction box.

You can provide wireless network to the laptop at the same time. >>>More

10 answers2024-02-09

Don't be too forced, it's not good for the child, you must put some thought into it, so that the child understands the painstaking efforts of the parents. For example, let him or her, participate in summer camps or tours, go to his hometown and villages, etc., and feel that the real world outside the network is also so beautiful. >>>More

7 answers2024-02-09

You can smash it with something harder than the computer's material, and if you don't have an object of this hardness, you can throw other software at a high speed, but you need to make sure that you throw it quickly. It is recommended to smash the host directly, the effect will be stronger and the impact will be greater. I know it's all nonsense, but you just need to take down one of the CPUs, memory and hard drives while he's not on his console, or use pliers to twist out any of the electronic components on the motherboard!

7 answers2024-02-09

Entertain and teach, increase interest!