Current location - Health Preservation Learning Network - Health preserving class - How to treat computers correctly
How to treat computers correctly
It is often heard that a boy or girl's laptop is slow, poisoned and reinstalled. What's more, I heard that it will be reloaded every two days. I summed up some methods of being kind to computers for your reference!

How to treat computers correctly

Most GG and MM are vulnerable to virus attacks due to their lack of computer knowledge. In fact, in most cases, computers don't need to be reinstalled unless they are paralyzed. The behavior of many MM reloading systems is incorrect. Here are some disadvantages of reloading:

1. Reloading will cause data loss. After reloading, the original data will disappear. You can choose to format only disk C to save the data of other disks, but what if the virus is also on other disks? Most mm will choose to back up the data first, but accidentally back up the virus.

2. Reinstalling the system will mobilize computer hardware on a large scale, and even write several G data on the hard disk at a time. Such a large-scale hard disk erasure will reduce the life of the hard disk.

3. The reinstalled system is often out of date for a long time, and it will take a long time to patch even if it is installed.

In view of these shortcomings, I suggest you try to repair the system in other ways.

Now let me talk about the general steps of system maintenance:

The first step is to install antivirus software.

Do you insist on computer maintenance? Prevention first, combining prevention with treatment? Policy.

In order to prevent it, it is necessary to use antivirus software. At present, popular antivirus software includes Kaspersky, Norton and Rising. Actually, it doesn't matter which one to use. As long as they are upgraded in time, the anti-virus effect of these softwares is the same. On the contrary, even the best anti-virus software will not have anti-virus effect if it is not upgraded in time. (Tip: Antivirus software has a virus sample library. Upgrading is actually updating this sample library. The process of antivirus is to search the computer for files similar to the virus in the virus library, and delete them if there are any. )

Step 2, install the auxiliary software.

Auxiliary software is mainly anti-virus software, which has specific functions, such as removing plug-ins, removing junk files, killing Trojans and so on.

Commonly used auxiliary software are? 360 security guards? Jinshan cleaning expert? Windows cleanup assistant (note? Assistant? Make no mistake)?

360 security guards have many functions, and also have system protection functions (similar to antivirus software). It is suggested that if antivirus software has been installed, don't turn on this function, otherwise the system will slow down. If you have confidence in the speed of your machine, it doesn't matter.

The functions on 360 are very practical, so you can study them carefully. The software prompts you to modify and delete files, and you can rest assured that you can patch them, and the software it recommends is very good and can be downloaded on demand.

This software can be said to be one of the necessary software, which is highly recommended.

The functions of Jinshan cleaning experts are less than 360, and most of them have been included in 360, but the operation is simpler than 360, and it has a unique system scoring function, which reflects the health status of the system more intuitively.

Windows cleaning assistant is not as well-known as the latter two softwares. I learned it from a computer expert at first, and then I tried to use it, and it felt very good.

The software size is only 5MB, the operation is simple, and the green interface is very concise. I downloaded the green version and suddenly found several Trojans that 360 could not find.

This software can be used to clean the tail and kill viruses. (hint: so-called? Portable application? Doesn't mean that the software color is green >

Tips: The above software needs to be updated and upgraded in time to play its role, and the system should be patched in time to prevent vulnerabilities from being attacked.

Some GG and MM have software such as optimizer and super rabbit. This kind of software is professional, and almost everyone will give you the same advice, that is, use it with caution. For those GG and MM who lack computer knowledge seriously, my advice is not to use them, because such software is sometimes more terrible than viruses.

The third step is to establish a system restore.

Many GG and MM know that ghost can restore the system to its previous normal state with one click. If you don't install ghost, don't worry. Windows comes with system restore function, which is simpler than ghost. Let's take windows xp as an example to illustrate the specific steps:

1, establish the system restore point.

After the system restore point is established, a restore moment is established, and the system can be restored to the state at this moment when the system restore is started next time.

Why not start in turn? What is the program used? Attachment? System tools? System restore, select Create restore point? What's next? Name the restore point (whatever the name)? Click Create again. In this way, you successfully created a restore point. Next time the system breaks down, just turn on the system restore function in the same way and select? Restore my computer to an earlier time? Option, you can restore the system, and all changes in the system will no longer exist, such as going back in time.

If the computer can't enter the system at this time, you can press the F8 key several times at startup, select Enter Safe Mode in the pop-up interface, and then restore the system.

The fourth step is to understand the source of the virus.

Viruses are actually some special computer programs, which often accomplish the following tasks: record the account password you entered and send it to the designated mailbox; Modify or delete your system files; Occupy a lot of hard disk storage space. Once the system runs these programs, it will be like getting sick, so we call these programs viruses. Experience xiansheng pocket bag

Then how did these viruses get into our system? The main sources are: websites with viruses; Removable storage media such as USB flash drive and removable hard disk; Downloaded files with viruses, etc.

How to eliminate these viruses at the source, what we need to do is:

1, good online habits

Some GG and MM like the results of Baidu's point-by-point search once, which is wrong. There may be a web page with a virus in the middle. If you click on it, the virus will be downloaded to your machine through the browser.

In order to avoid this situation, we should fix some trustworthy websites. If you want to download software, go online? Huajun, Sky, Dortmund? If you want to watch the video, go ahead? 56. potatoes? Actually, there's a shortcut, right? Ok,123 (www.hao123.com)? The first three websites recommended above are non-toxic and harmless health websites. If you want to watch TV, watch Youku (www.kanyouku.com) and learn some health knowledge, then go to Tiantian Health Network (www.ys365.org). These are all healthy websites.

But under some special circumstances, some GG and MM have to venture into some dangerous websites, even though China Telecom made a friendly reminder before entering the website? This website may contain malicious programs? , still can't stop your progress, so how to avoid the consequences of poisoning afterwards, there are two ways: 1, install the linux operating system, because the viruses on the Internet are all aimed at windows, so any virus is invalid for linux, which can be said to be completely poisonous. 2. Use the firefox browser. Because Firefox uses the core of mozilla, it is immune to any virus spread through IE browser (roaming also belongs to IE series).

2. Please pay attention to downloading resources.

Did you notice that Thunder has such a reminder when downloading with Thunder search resources? This website is not responsible for resource security? Yes, Thunder is only responsible for searching resources, and doesn't care about safety. So my suggestion is to try to download resources from special security websites. It is really necessary to download resources with Thunder Search (in fact, dog search). Please read the comments of your ancestors before downloading to ensure that it is non-toxic.

3. Use the USB flash drive carefully and move the hard disk.

Some people like to use USB flash drives best. No matter where it comes from, always plug it in decisively and double-click it to open it. This machine is absolutely unhealthy.

U disk is recognized as the most important way of virus transmission, and most viruses can spread through mobile storage media such as U disk, so it is particularly important to use U disk reasonably.

Here are just a few tips for reference:

1), set a folder named autorun.inf (this is the name commonly used by virus files) under the U disk directory, and change the attribute to read-only. Because windows system does not allow files with the same name, when a virus tries to write to a USB flash drive, it will be unable to write because the file has the same name, but there are exceptions. For example, I once encountered a fierce virus and directly deleted the autorun.inf folder I created.

2) Never double-click to open the USB flash drive, which will start some viruses in the USB flash drive. The correct way is to select Open from the right-click menu.

The fifth step is to learn to check the process.

Almost everyone will use ctrl+alt+delete to open the task manager, especially when it crashes, which really ends the task effectively. In fact, it is more effective to use task management to check the progress and then kill the virus.

Click the process tab of the task manager, and we can see a line of running processes.

About the process:

Process is all the programs that your computer actually runs, including programs that belong to the operating system, programs that belong to anti-virus software, and of course, running virus programs.

Ending any process means ending this program. If you end the =taskmgr.exe process, your task manager will be closed because the task manager = taskmgr.exe.

If you end a system program in the same way, some functions of your system will disappear, such as the screen display can be turned off, but don't worry, ending the process doesn't mean deleting it. As long as you restart the program, everything will return to normal.

When you find some worms, win32, Trojans and other processes, you can be sure that you have been poisoned. You can decisively end these processes and then use software to kill viruses.

So you will find it easy to kill the virus. In fact, it is far from this, because only a few stupid viruses will appear blatantly in the process of task manager, and most smart viruses will not appear.

So how to kill these advanced viruses depends on the sword of ice sword. It is a software, or rather a powerful process viewer, which can view almost all processes, including hidden virus processes, so that viruses can hide.