Note 1, Degrade Administrator user’s right

In the Windows operating system, Administrator is the most advanced users, in the normal landing mode is not visible, it is easy to ignore the security caused by the Administrator user.

Administrator user’s initial password is empty, if not installed firewall, hackers can easily through the Administrator account to enter your computer. It was too late to do anything at this time.

In fact, this is not down the right, is to create a forged, no real rights to the Administrator user.

To do this, first log in to a non-Administrator administrator account, and then open: Control Panel – Administrative Tools – Computer Management – Local Users and Groups – Users, delete the Administrator user, create a new Administrator user, right click on the settings Password, how complex the complexity of the password, let it belong to the lowest level of user groups, and in the property check the account has been disabled.

In this way, even if someone else cracked your Administrator account, after entering also found only a useless account.

Note 2, often check the boot entry

Often in the operation of the input msconfig view startup items, found that there are abnormal online immediately find information to see if it is a virus.

Note 3,  use of complex passwords

This is a commonplace topic, but there are a lot of people using a simple digital password, such as birthday, ID number, etc., which is very easy to guess. “Rest assured that my birthday only my friends know”, who said your friends will not peep your privacy?

Note 4,  install the firewall and anti-virus software

No matter what kind of master you are, these two kinds of software still need to install. Although in the face of new viruses, anti-virus software will become helpless, it is better to find their own anti-virus approach to the Internet. But there is an anti-virus software is more of a barrier, no matter how high or more barrier, is always more harm than good.

Windows7 system firewall is also must be installed, and it is best to install some monitoring network process procedures, always monitor whether the malicious procedures in the illegal operation.

Note 5, prohibit all the disk automatically run

U disk virus is now prevalent, a little careless will lead to “grid”. U disk virus in general operating mechanism is double-click the drive automatically run, therefore, disable all disk automatic operation is a very effective means of prevention.

The specific operation is: run the input gpedIT.msc -> user configuration -> management template -> system, double-click the right side of the list of 【Close AutoPlay】, select “all drives”, then select ” The OK to exit.

Note 6, do not double-click the U disk

If you are useless to prohibit all the disk automatically run, or you use someone else’s computer U disk, it is best not to double-click the U disk. It is easy to trigger U disk virus, the best way is to first use anti-virus software scan.

U disk virus in the general removal method is through the Explorer to see whether the U disk autorun.inf file, usually hidden. Delete the autorun.inf file and the program it points to, and then re-plug the U disk.

Note 7, often back up important data

Some important data must be frequently backed up, such as important pictures, personal information, and so on. About a month will burn an important information, just in case.

Note 8, use of Ghost

Often use Ghost backup operating system disk, encountered serious problems directly restore the entire system disk, which is lazy approach, too lazy to find the virus hidden, but also efficient and efficient way. The problem is that you must always use Ghost for backup, or you restore the system disk will be lost, at least lost the most recently installed program (registration information).

Note 9, the privacy of documents to be encrypted

Use some encryption program to encrypt those files that you think can not be in the public, there are many such free software on the web. Do not think that hidden files on the line, hidden only a way of self-deception, encryption.