How can we prevent the computer virus Trojan from invading the computer again? !

Ten steps to defend against computer viruses Recently, computer viruses have been raging all over the world. How to effectively defend against computer viruses, worms and Trojan horses? Please read the following ten steps in detail: 1. Use common sense to judge, never open an unknown email attachment or an attachment you didn't expect to receive. You should consciously not open suspicious email attachments. Don't be fooled into thinking that you know the contents of the attachment, even if it looks like a. jpg file-because Windows allows users to use multiple suffixes when naming files, and many email programs only display the first suffix. For example, the name of the email attachment you see is wow.jpg, but its full name is actually wow.jpg.vbs Opening this attachment means running a malicious VBScript virus, not yours. Jpg browser 2. Install anti-virus products and make sure to update the latest virus definition code. It is recommended that you update the virus definition code at least once a week, because antivirus software is most effective only if it is up-to-date. Need to remind you that the Norton antivirus software you purchased not only updated the virus definition code, but also updated the engine of the product, which is different from other antivirus software. The advantage of this is that it can meet the requirements of new engine in detection and repair, thus effectively inhibiting viruses and worms. For example, all Symantec products have the "LiveUpdate" function. 3. When installing anti-virus software for the first time, the computer must be thoroughly scanned for viruses. When installing anti-virus software on your computer for the first time, you must take some time to thoroughly scan the computer for viruses to ensure that it is not infected by viruses. Advanced antivirus software vendors now regard virus scanning as an automatic program, which is automatically executed when users install their products for the first time. Before inserting floppy disks, CDs and other pluggable media, please make sure to scan them for viruses. Make sure that your computer automatically checks for viruses when inserting floppy disks, CDs and other pluggable media, as well as e-mails and Internet files. 5. Don't download any software from any unreliable channel, which is more difficult, because usually we can't judge what an unreliable channel is. It is easy to confirm that all the well-known network libraries are not infected by viruses, but there are so many websites that provide software downloads that we can't be sure whether they have taken anti-virus measures, so it is safer to scan the safely downloaded software for viruses before installation. 6. Beware of deceptive viruses If you receive an email from a friend claiming that there is a new virus that is the most lethal and asking you to forward this warning email to everyone you know, it is a deceptive virus in all likelihood. I suggest you visit the anti-virus software provider, such as Symantec's website www.symantec.com/avcenter,, to confirm this is true. These deceptive viruses not only waste the receiver's time, but also may be as deadly as the viruses they claim. 7. Use other forms of documents, such as. Rtf (rich text format) and. Pdf (portable document format) Common macro viruses are spread by Microsoft Office programs. Reducing the chances of using these file types will reduce the risk of virus infection. Trying to save a file with rich text doesn't mean using only. Instead of using the "Save As" command in Microsoft Word, choose the rich text form in the dialog box to save it. Although rtf format may still contain embedded objects, it does not support Visual Basic macros or Jscript. Pdf files are not only cross-platform, but also more secure. Of course, this is not a complete solution to completely avoid viruses. 8. Don't use the floppy disk shared by * * * to install software, and don't copy the floppy disk shared by * * *. This is the way to cause the virus to spread from one machine to another. At the same time, if the software is not registered, it will be regarded as non-genuine software. We can reasonably infer that people who copy illegal software generally don't care about copyright law and legal use of the software. Similarly, they don't care much about installing and maintaining adequate virus protection measures. Pirated software is the main channel of virus infection. 9. Disable Windows Script Host Windows Script Host (WSH) to run all kinds of texts, but they are basically VBScript or Jscript. In other words, Windows Scripting Host acts as a translator between text languages, which may support ActiveX scripting interfaces, including VBScript, Jscript or Perl, and all Windows functions, including accessing folders, file shortcuts, network access and Windows registration. Many viruses/worms, such as Bubbleboy and KAK.worm, use Windows Scripting Host to automatically open infected attachments without user clicking. 10, using a client-based firewall or filtering measures If you use the Internet, especially broadband, and are always online, it is very necessary to use a personal firewall to protect your privacy and prevent uninvited guests from accessing your system. If your system is not effectively protected, your home address, credit card number and other personal information may be stolen.