Saturday, September 25, 2010

How to avoid the invasion of Trojan



銆??濡備綍閬垮厤鏈ㄩ┈鐨勫叆渚?br />
1, do not perform any software of unknown origin

For downloading the software from the installation, use more than the former must use some anti-virus software, the best killing Trojan software is designed to check the further implementation of the identified non-toxic, use.

2, do not believe that you will not receive junk e-mail messages and infected

Never believe that you will not receive junk e-mail messages and infected, even if the mailbox has never been seen or ISP mail, sometimes you'll never know how others know your mail address.

銆??3銆佷笉瑕佽交淇′粬浜?br />
Do not be your friend sent the software to run, because you can not ensure that his computer would not have the virus, of course, the possibility of deliberate deception is not a good friend, but maybe he (she) in the hack itself do not know! same time, the networks of today, you can not guarantee that this must be your friend sent you, because someone else can give you someone else's mail.

銆??4銆佷笉瑕侀殢渚跨暀涓嬩綘鐨勪釜浜鸿祫鏂?br />
Especially not in a chat room open your Email address.鍥犱负浣犳案杩滀笉浼氱煡閬撴槸鍚︽湁浜轰細澶勫績绉檻鏀堕泦璧蜂綘鐨勮祫鏂欙紝浠ュ灏嗘潵榛戜綘!鏇翠笉瑕佸皢閲嶈鍙d护鍜岃祫鏂欏瓨鏀惧湪涓婄綉鐨勭數鑴戦噷锛屼互闃查粦瀹镜鍏ヤ綘鐨勭數鑴戠洍璧颁綘涓?垏鈥滃?閽辩殑涓滀笢鈥濄?

5, not to offend people online

銆??鍦ㄨ亰澶╂椂锛屾案杩滀笉瑕佷互涓虹綉缁滀笂璋佷篃涓嶈璇嗚皝灏卞嚭瑷?笉閫婏紝杩欐牱浼氫笉灏忓績寰楃姜鏌愪簺楂樹汉锛屽埌鏃舵壘浣犲紑鍒??

6, Do not download software

Particularly unreliable small FTP site, the public information level, forum or BBS, because these places is a new virus released first choice.

7, it is best to use third-party mail program

If Foxmail etc., do not use Microsoft's Outlook program, because the Outlook program too many security vulnerabilities, hackers Moreover Outlook is also preferred that the target of attacks, many attacks have been selected entry;

8, Do not open attachments or click on advertising messages on the link

Because spam is an important attachment that hackers target program, especially in some of these links.

9 resource manager will be configured windows always show extension

Because some extensions: VBS, SHS, PIF files and more features for the Trojan files, even some of the documents for the further extension, it should focus view, once discovered to be immediately removed, do not open the file only always display The full name can be found in time.

10, minimize the use of shared folders

銆??濡傛灉鍥犲伐浣滅瓑鍏跺畠鍘熷洜蹇呴渶璁剧疆鎴愬叡浜紝鍒欐渶濂藉崟鐙紑涓?釜鍏变韩鏂囦欢澶癸紝鎶婃墍鏈夐渶鍏变韩鐨勬枃浠堕兘鏀惧湪杩欎釜鍏变韩鏂囦欢澶逛腑锛屾敞鎰忓崈涓囦笉瑕佺郴缁熺洰褰曡缃垚鍏变韩!

11, to the e-mail encryption

To ensure your messages are not other people see, but also to prevent hacker attacks, to recommend an encryption expert - PGP, I believe it will not let you down!

12, Hide IP Address

This is important!! You surf some of the best tools to use computer software to hide your IP address, such as the use of ICQ, the entry "ICQMenuSecuri-ty & Privacy", the "IP Publishing" following "Do not Publish IP ad -dress "option on.

銆??13銆佽繍琛屽弽鏈ㄩ┈瀹炴椂鐩戞帶绋嬪簭

Finally, the good is the most important thing is when you are online you need to run real-time monitoring anti-Trojan programs, such as, the cleaner, it's real-time monitoring program TCA, immediately display all current operating procedures and detailed descriptions, plus plus some outside professional such as the latest antivirus software, personal firewall, to monitor that is relieved, of course, to your love machine enough grade for the job you say?







相关链接:



Dell Accused Of The Largest Mergers And Acquisitions Worth The



E-Mail Clients introduction



3G2 to AVI



Hong Kong PCCW Privatization Commission will vote by sealed-depth inquiry



3G2 to WMV



News About Converters And Optimizers



Vb Program To Control The Flash



Good GRAPHIC



RMVB to MPEG



SCO UNIX Learning Collection



SSL WORKS



Organization process DEFINITION



E-cology in the Pan Micro Series 66



Jia PENG Lei: "diversity" denatured



Write-once HD-DVD discs will be in volume production to wait for final approval



Sina's Brilliant And Bleak: 5 CEO Change