If you are Windows2k or xp user, then you a slightly closer look, here to teach you a move Jinchan off orifices - and only the death of all the viruses can move g!! If you are a newly installed system (or you can be sure your system is currently non-toxic), it could not be better, and now immediately to open: br> The first is the super administrator password to change into ten above the median, and then create a user, the password also set it to half a dozen or more digits, and promoted to super administrator. The aim is to double insurance: If you forget one password, and password to login with another super-pipe to restore the room, lest you be refused on the outside the system; addition of online hackers can not guess the password for your system the way super control remote access to your system to conduct damage control. Then add two users, such as user names are: user1, user2; and specify the user group they belong to, well, prepare to be completed here, as you apart from the necessary maintenance of computer Do not use a super addition to administrators and user2 landed. just landed on it with user1.
after landing, when the Internet to find IE, and as it creates a shortcut to the desktop, right click the shortcut, select ; by other users run Open the window to the Internet, you can rest assured that as you went to visit any vicious, malicious, websites with pages, without having to worry about in the move it! because your current system activity when the user user1. and user2 is not active users, we use the inactive users to a network, no matter how clever the site, the information obtained through ie it will be thought that the user2 is your current activity of the user, if it is to use when you visit a malicious code on your system, then engaged in sabotage when simply does not work, even if the can do it through, then be modified only when the use2 out of a configuration file fills, and many of malicious code and viruses trying to sabotage carried out by nothing but user2 will fail, because user2 did not even run, how can we achieve the right operation of the system do?? If not taken, it had no alternative but to you.
and they also can not cross the user to operate, because Microsoft had originally configured Calvary is an independent between users, as people can not take my family went to bed as I sleep with, they can not occupy the position user1! so you always As long as the agent of this user2 users to the Internet (but Do not use user2 to login, because that case, if the user2 ago in what page the virus, then user2 landing at the same time, they will most likely be activated!), then whether you in how many pages the virus, all will be unable to user1 running or your current user load, so you will always be non-toxic current system!
However, when the total negligence, a careless poisoning, how to do?
Do not worry, we can to enjoy the technical performance of the shelling.
start withdraw its role:
restart the computer, use the super administrator login - what is the procedure after entering the system are not running, you will be surprised to find that even in the performance of the system completely non-toxic, it could not be better, and now immediately open:
user2 two users to delete it right, you only need one so gently can delete, and then the previous two users exist with the virus just like with the disappearance of the two users go to sleep - and - (seems to be buried with the dead, huh, huh!). done this then I guarantee that your newly installed win2k as a kind, any system files and system processes which completely is not the virus!
good! start now repeat steps from the newly created two users user1 and user2 so that they revive it. They resurrection is the resurrection, but the virus had followed them the opportunity but it is not, because when win2k to re-establish the user will be re-assigned to their new configuration, and this configuration is also impossible to include a new virus!!! build off immediately after the completion of a super administrator, transfer, such as use of user1 login, you like to do it, you'll find all your system as new it! cycle of the above methods can be used, along with Microsoft's patch to play regular, almost always guarantee that your operating system is non-toxic state. as long as you follow a few rules:
First, any time not the super-administrator login - unless you want to update and maintain the system level, need to use the super administrator when or if you need to add and delete users when.
Second, you must use a super management Members log in and ensure that no use and operation of any addition to the operating system comes with tools and procedures for anything other than, and all maintenance only option through the Start menu to complete, and even use Explorer to browse the hard drive not! only do users and system management and maintenance to exit immediately, but do not stay! (which is also the request of Microsoft, and Microsoft know their stuff, his advice was correct. browse the hard drive thing , under the user identity in the other you have a lot of opportunity, under the super-administrator or not the!! This should be something completely done in).
above are done, and then ruled out the hardware, and misuse operational reasons, the virus with the system down and you will miss out.
in practice, I found that frequent use of user1 (ordinary users), many software can not be used, so I suggest to super user, so a lot of software can be used.
installed anti-virus software is generally better, because it is said that the method can only prevent the virus IE vulnerabilities.
my computer's settings: a super administrator (default user name has already changed), a super-user, a normal user (and set the password for them), they are set a password. Other support has been discontinued. As with the default that IE on the desktop shortcut created Run
No comments:
Post a Comment