Position: Home page » Bitcoin » Bitcoin virus prevention measures

Bitcoin virus prevention measures

Publish: 2021-05-06 10:11:47
1. In the case of blackmail software infection, disk files will be encrypted by virus, which is difficult to crack by using high-strength encryption algorithm. Besides paying high ransom, the attackers often have no other way to decrypt the files. Only paying high ransom can they decrypt and recover the files, causing serious losses to learning materials and personal data
1. Install the latest security patch for your computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immune tool" to detect whether there are loopholes in the system, and close the ports affected by the loopholes, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP or windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
2. Try Tencent computer housekeeper, housekeeper 2 in 1, small occupation, full function
based on Tencent computer housekeeper's continuous investment in independent anti-virus engine research and development and proct performance optimization in recent years, combined with the multi engine architecture system, Tencent computer housekeeper's ability in security protection and virus detection and killing has reached the same level as the world-class anti-virus software; Especially in the processing of domestic popular samples, resource consumption and response speed,
3. It's best to use Tencent mobile phone housekeeper to check and kill. It can scan all garbage viruses and clean and kill viruses; Use Tencent mobile phone housekeeper to set up security protection and virus detection and killing
scan first, wait for the end of scanning, and then kill the virus according to the prompt. It adopts cloud detection and killing technology, which can thoroughly kill the virus through Intelligent Cloud Identification, so as to protect your mobile phone from now on; thank you
4. You can use Tencent computer housekeeper to check and kill
it can thoroughly check and kill the virus, which is strongly escorted by cloud host defense, TVA anti-virus engine and system repair engine
housekeeper introces the international leading local checking and killing engine, which greatly improves the ability of Trojan horse checking and killing
the ability of virus anti-virus protection is international leading, which can comprehensively protect the computer security
5. Give some suggestions]

1. It is necessary to install anti-virus software, update the virus library in time, install firewall (anti Trojan horse, hacker attack, etc.), kill virus regularly, and maintain the security of computer operation
it is recommended that the owner of the building can install Tencent computer manager, which is a free professional security software with two in one anti-virus Management (only need to download one ), small memory, good anti-virus, good protection, and no false alarm and killing. It has a world-class anti-virus software embedded anti-virus engine, such as cloud killing engine, anti-virus engine, Jinshan cloud killing engine, Avira killing engine, xiaohongsan and killing repair engine
software upgrade, vulnerability repair and garbage cleaning are automatically and regularly set, which is necessary for lazy people
2; Open Tencent computer manager toolbox vulnerability repair
3. Don't go to some unknown websites or download things casually
4. You should also be on guard against portable storage devices (such as USB flash disk, where viruses are rampant recently)
5. Don't go to unknown websites or receive strange e-mails. After downloading the compressed package file, scan the virus first
6. Close unnecessary ports
7. If you have time and energy, learn some common computer skills and knowledge

finally, I would like to say that if you are very careful but still poisoned, you can't help it It's a good choice to backup the system with ghost.)
6. This is also unable to guard against, as long as you do not open some unknown mobile phone links or open some illegal websites, this situation generally will not happen.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750