| Back to logs list
133958 2010 年 06 月 14 日 17:29 Reading (loading. ..) Comments (0) Category: Personal Diary
Oh, if you are using a windows 2000 or XP, then teach you a move Jinchan off orifices?? but this trick can only grams of death of all viruses,
赢在中国”80后30个忠告 - Qzone日志!!
First, the newly installed system
If you are a newly installed system (or you can be sure your system is currently non-toxic), better yet, it immediately to open:
first is the super administrator password to change into more than ten digits, then create a user,
new balance outlet, it also set a password more than ten, and promoted to super administrator. The aim is to double insurance: If you forget one password, and password to login with another super-pipe to restore the room, lest you be refused on the outside the system; addition of online hackers can not guess the super password of your system by means of remote control access to your system and do damage control. Then add two users, such as user names are: user1, user2; and specify the user group they belong to, well, prepare to be completed here, and after the addition to the necessary maintenance of your computer should not be used outside the super administrator and user2 landed. User1 can only log out.
after landing , when the Internet to find IE, and as it creates a shortcut to the desktop, right click the shortcut and select Points to the Internet when the shortcut, it will tell you when to use user name and password that you enter a user name and password user2!!! Well, now you can use this open window to the Internet,
new new balance shoes, you can rest assured that as you have to browse to any vicious, malicious, websites with web pages, without having to worry about in the move it! Because the activities of your current system user user1. And user2 is not active user, we use this non-active users to the Internet, no matter how clever the site, the information obtained through the IE will make it all the thought that the user2 is your current activity of the user, if it is to When you visit malicious code using the system for you, then engage in sabotage when simply does not work,
new balance mens, even if the can do it through, then be modified only when user2 out of a configuration file fills, and many of malicious code and viruses trying to user2 they are nothing but destruction activities will fail, because user2 did not even run, how can we get the operating system, right?? If not taken,
new balance shoes, it had no alternative but to you. They also can not cross the user to operate, because Microsoft had originally Calvary user configuration are independent, just as people can not take my family went to bed as I slept, they can not occupy the position user1! So you always As long as the agent of this user2 users to the Internet (but do not use user2 to login, because that case, what if the user2 previous page in the virus, then landed in the user2 same time, they most likely be activated!), then no matter how many pages you are the virus, all will be unable to run or load your current user1 users, so you will always be non-toxic current system!
Second, the machine has been poisoned, but there
negligence when a careless poisoning, how to do??
Do not worry, now we can enjoy the performance since the shelling of the technology!
start withdraw its role:
restart the computer, use the super administrator login?? what is the procedure after entering the system are not running
; you will be surprised to find that the performance of the system even completely non-toxic!!, Better yet, now immediately open:
the inside two users user1 and user2 right to delete it, you only need to delete such a lightly on it, then the previous two users exist with the virus also took service with the disappearance of the two users go to sleep by?? ( seems to be buried, huh,
new balance sneakers, huh,
发明... - Qzone日记!). Done this then I guarantee that your newly installed win2k as a kind, any system files and system processes which completely is not the virus,
20 kinds of kimchi practice (3 to 5 days you can e!
good! Now repeat the steps starting from the newly created two users user1 and user2 to enable them to revive it. They resurrection is the resurrection, but the virus had followed them the opportunity but it is not, because when win2k to re-establish the user will be re-assigned to their new configuration, and this configuration is also impossible to include a new virus!!! Written off immediately after the establishment of a super administrator to complete, transfer, such as use of user1 login and continue to do you like it, you will find out your system as new! Cycle of the above methods can be used.
Third, the practice of
icing on the cake after the above operation, coupled with Microsoft's patches play often, almost always ensure that your operations system is non- toxic state! As long as you follow the following rules and regulations rut:
1, any time not to super administrator login?? Unless you want to update and maintain the system level, you need a super management or membership of the time you need to add and delete user time.
2, you must use the super administrator login when not in use and operation to ensure that any addition to the operating system comes with tools and procedures for anything other than, but only by starting all maintenance menu options to complete, and even use Explorer to browse the hard drive is not! Only do users and system management and maintenance to exit immediately,
new balance running shoes, but do not stay! (This is also the request of Microsoft, and Microsoft know their stuff , his advice was correct. Browse the hard disk of matter, under the other user you have a lot of opportunities in the super-administrator or not the next!! This should be done in the matter completely.)
above are done , and then ruled out the hardware and misuse reasons, the virus with the system down and you will miss out.
Label IT super administrator password for the user virus