銆??濡備綍閬垮厤鏈ㄩ┈鐨勫叆渚?br />
1, do not perform any software of unknown origin
For downloading the software from the installation, use more than the former must use some anti-virus software, the best killing Trojan software is designed to check the further implementation of the identified non-toxic, use.
2, do not believe that you will not receive junk e-mail messages and infected
Never believe that you will not receive junk e-mail messages and infected, even if the mailbox has never been seen or ISP mail, sometimes you'll never know how others know your mail address.
銆??3銆佷笉瑕佽交淇′粬浜?br />
Do not be your friend sent the software to run, because you can not ensure that his computer would not have the virus, of course, the possibility of deliberate deception is not a good friend, but maybe he (she) in the hack itself do not know! same time, the networks of today, you can not guarantee that this must be your friend sent you, because someone else can give you someone else's mail.
銆??4銆佷笉瑕侀殢渚跨暀涓嬩綘鐨勪釜浜鸿祫鏂?br />
Especially not in a chat room open your Email address.鍥犱负浣犳案杩滀笉浼氱煡閬撴槸鍚︽湁浜轰細澶勫績绉檻鏀堕泦璧蜂綘鐨勮祫鏂欙紝浠ュ灏嗘潵榛戜綘!鏇翠笉瑕佸皢閲嶈鍙d护鍜岃祫鏂欏瓨鏀惧湪涓婄綉鐨勭數鑴戦噷锛屼互闃查粦瀹镜鍏ヤ綘鐨勭數鑴戠洍璧颁綘涓?垏鈥滃?閽辩殑涓滀笢鈥濄?
5, not to offend people online
銆??鍦ㄨ亰澶╂椂锛屾案杩滀笉瑕佷互涓虹綉缁滀笂璋佷篃涓嶈璇嗚皝灏卞嚭瑷?笉閫婏紝杩欐牱浼氫笉灏忓績寰楃姜鏌愪簺楂樹汉锛屽埌鏃舵壘浣犲紑鍒??
6, Do not download software
Particularly unreliable small FTP site, the public information level, forum or BBS, because these places is a new virus released first choice.
7, it is best to use third-party mail program
If Foxmail etc., do not use Microsoft's Outlook program, because the Outlook program too many security vulnerabilities, hackers Moreover Outlook is also preferred that the target of attacks, many attacks have been selected entry;
8, Do not open attachments or click on advertising messages on the link
Because spam is an important attachment that hackers target program, especially in some of these links.
9 resource manager will be configured windows always show extension
Because some extensions: VBS, SHS, PIF files and more features for the Trojan files, even some of the documents for the further extension, it should focus view, once discovered to be immediately removed, do not open the file only always display The full name can be found in time.
10, minimize the use of shared folders
銆??濡傛灉鍥犲伐浣滅瓑鍏跺畠鍘熷洜蹇呴渶璁剧疆鎴愬叡浜紝鍒欐渶濂藉崟鐙紑涓?釜鍏变韩鏂囦欢澶癸紝鎶婃墍鏈夐渶鍏变韩鐨勬枃浠堕兘鏀惧湪杩欎釜鍏变韩鏂囦欢澶逛腑锛屾敞鎰忓崈涓囦笉瑕佺郴缁熺洰褰曡缃垚鍏变韩!
11, to the e-mail encryption
To ensure your messages are not other people see, but also to prevent hacker attacks, to recommend an encryption expert - PGP, I believe it will not let you down!
12, Hide IP Address
This is important!! You surf some of the best tools to use computer software to hide your IP address, such as the use of ICQ, the entry "ICQMenuSecuri-ty & Privacy", the "IP Publishing" following "Do not Publish IP ad -dress "option on.
銆??13銆佽繍琛屽弽鏈ㄩ┈瀹炴椂鐩戞帶绋嬪簭
Finally, the good is the most important thing is when you are online you need to run real-time monitoring anti-Trojan programs, such as, the cleaner, it's real-time monitoring program TCA, immediately display all current operating procedures and detailed descriptions, plus plus some outside professional such as the latest antivirus software, personal firewall, to monitor that is relieved, of course, to your love machine enough grade for the job you say?
相关链接:
Dell Accused Of The Largest Mergers And Acquisitions Worth The
E-Mail Clients introduction
3G2 to AVI
Hong Kong PCCW Privatization Commission will vote by sealed-depth inquiry
3G2 to WMV
News About Converters And Optimizers
Vb Program To Control The Flash
Good GRAPHIC
RMVB to MPEG
SCO UNIX Learning Collection
SSL WORKS
Organization process DEFINITION
E-cology in the Pan Micro Series 66
Jia PENG Lei: "diversity" denatured
Write-once HD-DVD discs will be in volume production to wait for final approval
Sina's Brilliant And Bleak: 5 CEO Change
No comments:
Post a Comment