The basic principles of computer anti-virus are:
1. Install genuine operating systems and application software.
Both institutional users and individual users should try to purchase and install genuine operating systems and application software. Under special circumstances, when downloading and installing a cloned operating system, you also need to find a trustworthy website with expert verification and user reviews. At the same time, do not download cracked software or Chinese version software at will to prevent unscrupulous manufacturers or hackers from taking advantage of it. Pirated operating systems or modified versions of software are implanted with viruses to seek improper benefits, causing damage to user system security and data security.
Not only that, Microsoft operating systems often update system patches. The system needs to turn on the automatic update function (or be managed by security software) and download and install security patches in a timely manner to patch system vulnerabilities and prevent virus intrusions. Application software also needs to be updated regularly and where appropriate.
2. Install and use comprehensive security software.
After installing the operating system and basic application software, the first thing that users should do before using the computer to access the Internet or while surfing the Internet is to install security software in time. There are many and complex security software on the market, including old anti-virus software such as Rising and Kingsoft, which have lost ground, as well as emerging free 360 ??Security Guard, Tencent Computer Manager, etc., as well as Baidu Guard and 2345 Guard, which are following the trend and building momentum. It is recommended to install and use the 360 ??Security Guard (focusing on network security) and 360 Antivirus (focusing on local file security) security software suites that include real-time scanning tools.
It should be noted that do not install multiple security software, otherwise it is easy to cause system performance degradation due to the security software competing for control. Moreover, the security software, especially the real-time scanning tool itself, requires a large amount of system resources to run. .
In addition, after the security software is installed, you must regularly use the security software to clean the computer, check and kill Trojan viruses, optimize and accelerate, etc. to check for hidden dangers. You must also perform security checks based on the actual conditions of the user and computer. The software should be properly set up to ensure security without affecting normal operation. Of course, the virus database or the security software's own program must also be updated in a timely manner.
3. Develop good computer operating habits.
(1) Do not open strange emails and strange links sent by friends at will. Even familiar people may infect computers with viruses due to lack of security awareness and spread virus Trojans through emails or links.
(2) Do not download functional plug-ins at will. Some genuine software installation programs may also be bundled with malicious programs, so be careful when installing them. Some security software such as 360 Security Guard’s software manager provides a plug-in installation mode.
(3) Create a personal website favorite through the browser. During daily web browsing, add trustworthy websites (if you use a browser such as 360, a safe website trust mark will be displayed, as shown in the figure below) into your favorites (some browsers provide online favorites) Function). In the future, try to only browse secure websites or websites that have passed security certification, and do not browse unfamiliar websites without security certification marks.
(4) After the system and commonly used software are installed, perform system backup in a timely manner. When the system is infected with a virus and cannot run normally, it can be restored to normal with one click in time to be prepared.