How to prevent malicious data modification on the computer when surfing the Internet?

Updated on technology 2024-05-28
23 answers
  1. Anonymous users2024-02-11

    The IP address you use to surf the Internet is set by the telecom service provider, and no matter how high the master is, you can't change it.

    Other tips for anti-hacking on the Internet——

    Develop good habits.

    Don't spread your email address (especially the email address sent by your ISP when you apply for the Internet) everywhere, but only tell the forwarding address.

    Set up commonly used passwords separately, use alphanumeric mixed arrangement and irregularity when setting, and change them frequently to prevent being found out one and a string. Don't store important passwords on your computer.

    Use a public machine to surf the Internet, and clear your history when you leave.

    Don't easily open attachments in letters from strangers.

    In particular, the attachment is an executable file), and the email from unknown sources is cleared in a timely manner.

    Apply to use a mailbox, it is not afraid of bombing.

    Come back often.

    Always use antivirus software to check for and remove viruses.

    If you find that a large number of emails are on the server, you can log in to the mail server (Foxmail has this function) and delete them directly.

    Use some anti-hacking programs to kill the poison in time, and finally Beimen Beifeng suggests that you - install a good antivirus software and add a good firewall.

  2. Anonymous users2024-02-10

    You first go to the deletion program to see,Have you installed other unfamiliar search bars,Uninstall it,And then use 360 security guard,Advanced inside,Fix IE,If it can't be solved,Reinstall the IE browser to try,There is also a malicious plug-in in 360。 Scan for viruses.

  3. Anonymous users2024-02-09

    If it doesn't work with 360 Advanced Patching IE, it is recommended to make the next Super Bunny and then sweep it down to repair it.

  4. Anonymous users2024-02-08

    Tools - Internet Options - General to modify the home page.

  5. Anonymous users2024-02-07

    With 360 to remove malicious plugins, physical examination is useless.

  6. Anonymous users2024-02-06

    Use 360 Security Guard to kill Trojans, clean plugins, and fix IE. At this point, there are two (or more) IEs on the desktop, one is fixed, and the other is malicious, remember those malicious ones (you can rename them, and if you can't, you can remember them as well), and then the following 1Right-click on an empty space on the desktop, "Arrange the icons" -- Run Desktop Cleanup Wizard".

    If you can't find the "Desktop Cleanup Wizard" here, return to the desktop, right-click to enter "Properties" -- Desktop "-- Customize Desktop" -- find "Clean Desktop Now" -- Next) below the new pop-up window - click "Next" after the pop-up window, you only need to find the icon of the corresponding malicious IE, tick in front (none of the others are checked), then click "Next", and finally press "Finish"2Put the "Unused Desktop Shortcuts" folder generated on the desktop into the ** station and empty the ** station. Refresh it and you're good to go.

  7. Anonymous users2024-02-05

    It's simple. First of all, you delete all the IE shortcuts on the desktop, because they open the home page that has been tampered with, and then you find the Internet Explorer browser in the start menu, open it, and change the home page of IE to the home page you want. Method:

    Open IE - Tools - Internet Options. If you want to put Internet Explorer on your desktop, copy it directly from the start menu to your desktop. Personally, I think you can never go wrong with opening it from the start menu.

  8. Anonymous users2024-02-04

    I'll tell you, it's best to reinstall the system, those antiviruses can be defended, but after the antivirus, there will be a lot of sequelae, resulting in the computer is not easy to use, and it is best to spend a few minutes doing the system installation antivirus.

  9. Anonymous users2024-02-03

    IE was hijacked, and the IE !! was repaired with 360 Stubborn Trojan and 360 Security Guard

  10. Anonymous users2024-02-02

    1. In all, you should change the Internet fee paid to the telecommunications bureau to make the computer Internet faster.

  11. Anonymous users2024-02-01

    This is not practical.

    You should empty the IE cache and cookies regularly.

  12. Anonymous users2024-01-31

    It's hard to say.,It mainly depends on the owner's operating habits.,If you look at ** through the client, it produces a lot of files, sometimes up to several G.,In addition, there are a lot of cookis generated by browsing the web.。

  13. Anonymous users2024-01-30

    Depending on the degree of use, there are about 300 to tens of thousands of junk files, mainly some file usage records and cache files.

  14. Anonymous users2024-01-29

    If you don't transmit your own data, it may become someone else's broiler, and it is DDOS

    Enter safe mode to check for drugs.

  15. Anonymous users2024-01-28

    Can it be distinguished from normal uploads, such as exclusion, 100% hit.

  16. Anonymous users2024-01-27

    Just find some management software on the Internet and block QQ and web pages.

  17. Anonymous users2024-01-26

    The easiest way is to set up an administrator account, turn on screen protection, open the need to enter a password, and when you transfer data, you will enter the screen protection, and no one else can get in.

    If the trouble is Group Policy settings.

  18. Anonymous users2024-01-25

    This is easy to do, you can limit the group policy and not allow the execution of programs other than the ones you specify, which is a whitelist.

    Or, Limit Group Policy does not allow you to run programs that you specify, such as Internet Explorer and QQ. This is the blacklist.

    It's the easiest and safest way to do it. No need to install third-party software.

  19. Anonymous users2024-01-24

    The simplest,Just ban some commonly used ports.。。。 Or establish a group policy that restricts program usage.

  20. Anonymous users2024-01-23

    Y1 Reign in the World] Original! Don't copy-paste!

    For mobile phones (with data connection on): Open Mobile - Settings - Wireless & Network - Network Sharing & Portable Hotspot - Mobile AP Settings - Mobile Access Point Tick - Configure Mobile AP, and then configure Mobile AP by yourself! (The interface may be different depending on the operating system of the mobile phone!)

    It's that simple!

  21. Anonymous users2024-01-22

    Yes, but the mobile phone traffic is too fast to hurt.

  22. Anonymous users2024-01-21

    iPhones support data sharing, in personal hotspots.

  23. Anonymous users2024-01-20

    Yes, the traffic is used quickly, unless the traffic can be reversed.

Related questions
4 answers2024-05-28

I'll give you 12 ways to debug, try it :

1.If there is a Trojan horse or virus interference in the computer, **"360 Security Guard" and "360 Antivirus Dual Engine Edition", it is recommended to "scan" the virus and Trojan horse to patch the vulnerabilities on the computer! >>>More

8 answers2024-05-28

One, oneLaptopsand an iPhone. Background of use: In the case that you can't use wifi, we need a laptop to go online to deal with some affairs temporarily, so you can use a mobile phone hotspot to access the Internet at this time. >>>More

9 answers2024-05-28

With CPU S7 315F, ET 200S and fail-safe DI DO module, you will invoke the fail-safe program of the OB35. Moreover, you have accepted the default values for all monitoring times and are willing to receive a "communication failure" message. OB 35 is set to 100 ms by default. >>>More

8 answers2024-05-28

I actually have my own ideas every time, but every time I find that others are a little unhappy, I am very worried, afraid that they will ignore me. My friend said that I always had to gain and lose, and it was not good. Later, I heard what others said, you need to have your own opinions, first raise your own character, in order to make people have a good impression of you, don't be too sensitive, maybe some people look at everyone annoying, not necessarily your fault, when you find something wrong, you might as well reflect on what you have done in the past few days. >>>More

19 answers2024-05-28

I think there is a trick to "multilingualism", and my own trick is to set up different "personality barriers" - what? So exaggerated? Let's give a brief example: >>>More