Knowledge of Safe and Effective Computer Protection

Knowledge of Safe and Effective Computer Protection

To protect your computer against the installation of antivirus and firewall software, you can take other measures. The following steps may help you to improve the reliability of your computer

1. File sharing restrictions: File sharing allows computers in network & nbsp; Bringing documents together quickly, but also make your computer vulnerable to network intrusion. Always remember to share files only if you want to give someone access, but you must remove this attribute shortly afterwards, so use a password to minimize access to the files.

Resolution: Remove the file sharing attribute by going to Control Panel-> Network-> Configuration- & gt; File and Print Sharing. Dismiss all the qualities here and then click OK.

2. Attention to web browsers: Computer viruses can take advantage of the ability to run browser scripts & nbsp; The web on your computer to infiltrate and sabotage.

Resolution: Enhance the security of Internet Explorer and Nescape Navigator. In Internet Explorer, go to Tools-> Internet Options, select the Security tab, select Internet Zone, and click the Default Level button. Then use the mouse to move the slider from Low to Medium or High. If you choose Low you will not accept computer protection with attacks from Internet sites. If you select Medium, the browser will remove many scripts but will allow cookies, while selecting High will remove all scripts and cookies. If you want to set your browser security settings yourself, click the Custom Level button and select the options that you think are safe. With Nescape you choose Edit-> Preferences and then select Advanced in the Category window, so now select the options here for a high level of security.

3. Configure Outlook and Outlook Express: Outlook lets you exclude macros in e-mail attachments from untrusted sources. It accepts the security attributes you have edited in Internet Explorer. You can change the level of e-mail security according to your needs.

Resolution: Set up Outlook for macros only, by going to Tools & gt; Macro & gt; Security, in the Security Level tab, click High. Then go to Tools & gt; Options & gt; Security to check if Oulook is using the security attributes of Internet Explorer. If not, select Restricted sites under Secure Content, then click the Zone Settings button and select the security level you want to use.

4. Show the file extension: Many viruses often carry two extensions at the same time to hide their real extensions such as 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-nghe?p=1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label:Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable.com www.microsoft.com .vsb (Visual Basic Script) ..., because this real extension sometimes also provokes suspicion. This is because the virus usually "hides the ball" under the benign extensions such as .gif, .jpg, .bmp, etc. However, Windows does not present a file name extension by default, which makes it impossible for you to see it. The danger from the files carry the virus.

Resolution: Fully represent the file extension by going to Windows Explorer, and then going to the Tools & gt; Folder Options menu. Select the View tab and uncheck Hide extensions for known file types (for Windows XP, same for other Windows versions). If you see a file that has two extensions, that may not be good for you. Be careful with files with .bat, .com, .ex. lnk, .pif.

5. "patch" the vulnerabilities: In operating systems, web browsers, virus scanners and other PC applications there may be some security holes.

Solve: Keep up-to-date and install the latest vulnerability fixes on the homepages of software vendors and companies.