If you're using Windows 7, 8, and Windows 10 you should
enable Windows Update. Microsoft regularly releases new patches and updated
security features for the Windows operating system.
I -Install Microsoft Security Essentials (antivirus)
Microsoft Security Essentials is a free antivirus program
for Microsoft Windows users. Microsoft Security Essentials will perform scans
your Windows computer to remove viruses, unwanted software, trojans and other
malicious files.
Also Microsoft security Essentials are updated to the latest
version of Windows Update, so that your system is always in a safe state,
without fear of viruses or Trojans attack.
II -Always updated Windows
If you're using Windows 7, 8, and Windows 10 you should
enable Windows Update. Microsoft regularly releases new patches and updated
security features for the Windows operating system.
When updating the new patches and security packages will
protect your computer from attacks, viral entry and Exploits.
III - Launch new applications on virtual machines prior to installation on the system
you will not be able to anticipate the dangers when clicking
to download a software or a particular application on the Internet or on
websites unknown origin on machines and installations.
Sometimes the software that was "attached" in both
viral and Trojians that you can not know in advance. Therefore the software,
application weird, pre installed on your system you should try to install on
the virtual machine before (Virtual Machine).
The virtual machine will run your software in a virtual
environment, thus permanently malware attacks never directly on your computer.
III - Firewall (firewall)
Always activate the firewall (firewall) on your system. In
case if the use of anti-virus programs such as Kaspersky or Avast, these
programs are often more integrated firewall (firewall).
If you do not use antivirus software, you can enable a
firewall on the system.
When you install any new software on the system that the
system will check the firewall rules of that software.
IV - Do not be foolish as to open the email and the website of unknown origin
When browsing the Web, advice to you is do not be foolish,
but click to open the Web sites of unknown origin. Maybe in the Web page link
that is both viral and Trojians pile.
And it is better to use the Chrome browser to browse the Web
safely. If you accidentally click on malicious Web page that, Chrome will
display a warning window to let you know.
Furthermore never curious that click on the link hidden in
email, because it's the links that contain viruses that may harm your system.
V - Keep distance to fake Web pages
Many accessing a Web site that we can not know whether the
Web site is safe or not? However, if access is a Web page that you see on the
screen that appears multiple popup window ads, then think about risk very
likely that the Web site is fake Web site.
Therefore the best way to "keep your distance" to
this Web site is to look at the small lock icon in the address bar green
contains the prefix "http" to confirm whether the page is fake or not
?
Many accessing a Web site that we can not know whether the
Web site is safe or not? However, if access is a Web page that you see on the
screen appear more ad popup window, then think about a possible risk that the
Web site is fake Web site.
Therefore the best way to "keep your distance" to
this Web site is to look at the small lock icon in the address bar green
contains the prefix "http" to confirm whether the page is fake or
not?
VI - Use trusted browsers
Internet Explorer stick some vulnerabilities, so hackers can
take advantage of this weakness to attack your system every day. Therefore it
is best that you use the browser reliable and secure as Google Chrome or
Mozilla Firefox.
VII - Always scan for viruses and Trojans on your computer
when the USB plug
is always scanned for viruses and Trojans when plugged into
a computer
Whenever you plug in any memory card, or USB Pendrive into
the machine, so remember to use antivirus program to scan for viruses first.
Sometimes the virus hiding in Pendrive and other storage media.
VIII - Backup System
Backup System
This is the most important step.
No comments:
Write nhận xét