Fortune Telling Collection - Zodiac Guide - Common sense of virus prevention
Common sense of virus prevention
Virus infection refers to infectious diseases caused by virus infection.
Virus infection spreads through respiratory tract, digestive tract, skin, placenta and reproductive tract, leading to human infection, fever, headache, general malaise and other poisoning symptoms, as well as local symptoms of corresponding parts. In order to prevent virus infection, the key is to isolate the source of infection and cut off the transmission route.
In addition, active immunization is also a key measure. If the patient is infected with respiratory virus, it is necessary to isolate this part of the patient to avoid infecting others.
At the same time, avoid gathering in crowded and densely populated places to avoid being infected. If the infection is caused by gastrointestinal virus, it is necessary to isolate the patients with enterovirus, and at the same time do a good job in cleaning and disinfecting tableware and feces.
If the patient is infected with liver virus, such as hepatitis A and hepatitis E, it is necessary to isolate the patient and do a good job of disinfection. If it is caused by diseases such as hepatitis B, hepatitis C and hepatitis D, it is mostly blood-borne or mother-to-child transmission or sexual transmission. The key to prevention is to avoid blood transfusion, drug abuse and sexual contact. If it is an infectious disease caused by skin mucosal virus, such as measles, rubella, chickenpox, herpes zoster and so on. We should also do a good job in prevention, such as measles vaccine, rubella vaccine, hepatitis B vaccine and measles vaccine.
2. What are the anti-virus tips?
Give priority to prevention and keep information flowing. Do you know that viruses and security warnings appear almost every day? Get the latest virus outbreaks by adding our security and repair home page to favorites.
2。 Protected If you don't have virus protection software installed on your machine, you'd better install one.
If you are a home or individual user, it is quite easy to download any top-ranked program, and you can follow the installation wizard. If you are on the network, please consult your network administrator first.
3。 Scan your system regularly. If you happen to start antivirus software for the first time, you'd better let it scan your whole system.
It is a good thing to start the computer cleanly without virus problems. Usually, you can set an antivirus program to scan the system every time the computer starts or runs regularly.
Some programs can also scan the system in the background when you are connected to the Internet. It's best to get into the habit of scanning the system for viruses regularly.
4。 Update Anti-virus Software Now that you have installed anti-virus software, you should ensure that it is up to date.
Some antivirus programs have the function of automatically connecting to the Internet and adding new virus detection codes whenever software vendors find new threats. You can also find the latest security update files in this scanning system.
5。 Do not easily execute executable programs such as EXE in the attachment. These attachments are likely to contain computer viruses or hacker programs. Running them easily may bring unpredictable results.
Attachments of executable programs in emails from friends and strangers you know must be checked before they can be used. 6。
Don't easily open the document file in the attachment. The email sent by the other party and the documents of related attachments should be saved to the local hard disk with the "Save As …" command, and can only be opened after being checked by computer antivirus software. If you click DOC, XLS and other attachment documents twice directly with the mouse, Word or Excel will be automatically enabled. If there is a computer virus in the attachment, it will be infected immediately. If there is a "whether to enable macros" prompt, don't open it easily, otherwise it is very likely to be infected with email computer viruses.
7。 Do not run the attachment directly. Attachments are strange for files with file extensions or scripts such as *.
Attachments such as VBS .SHS shall not be opened directly. Generally speaking, emails containing these attachments can be deleted to ensure that computer systems are not harmed by computer viruses.
8。 If you use Outlook as the software to send and receive e-mail, you should make some necessary settings.
Select the options command in the Tools menu and set the Attachment Security to High in Security; In Other, press the Advanced Options button, press the Add-in Manager button, and then uncheck Server Script Run. Finally, press the OK button to save the settings.
9。 Use the preview function carefully. If you use Outlook Express as the email sending and receiving software, you need to make some necessary settings.
Select Options from the Tools menu, and uncheck "Automatically display news mail in preview pane" and "Automatically display picture attachments in news mail" in Reading. This can prevent some e-mail computer viruses from automatically running and damaging the system using the default settings of Outlook Express.
3. Knowledge of infectious disease prevention and control
I. General principles for the prevention and control of infectious diseases
The key to effectively suppress the epidemic of infectious diseases lies in cutting off the transmission chain of infectious diseases: controlling the source of infection, cutting off the transmission route and protecting the susceptible population. To this end, we must do:
1, develop good hygiene habits and pay attention to personal hygiene, food hygiene and environmental hygiene.
2. Strengthen physical exercise and improve immunity.
3. Vaccinate according to regulations.
4. Early detection, early reporting, early treatment and early isolation of infectious patients to prevent cross-infection.
Second, infectious diseases are high every season.
spring
Epidemic infectious diseases mainly include: epidemic cerebrospinal meningitis, measles, chickenpox, mumps, scarlet fever, rubella, influenza and other respiratory infectious diseases; Viral hepatitis A; Hand-foot-mouth syndrome caused by contact transmission.
Prevention and treatment methods: Indoor ventilation, fumigation with vinegar and disinfectant, frequent bask in the quilt, timely vaccination, good spring outing, and don't go to hidden places.
summer
It is a high incidence period of intestinal infectious diseases, mainly including: bacterial food poisoning, bacterial dysentery, amebic dysentery, viral enteritis, typhoid fever, viral hepatitis and so on.
Prevention and control methods: strictly control food procurement, double insurance for tableware disinfection, pay attention to personal hygiene, eat raw and cold vegetables, peel melons and fruits before eating, reduce large family banquets, clean mosquitoes and flies indoors, and ensure adequate nutrition and sleep.
autumn
Located between summer and winter, seasonal infectious diseases in Xia Dong may occur in autumn. In addition, polio often occurs in autumn.
winter
Affected by climate and population movement (Spring Festival travel rush peak), it is prone to local outbreaks of respiratory infectious diseases. Common respiratory infectious diseases in winter are: common cold, flu, measles, chickenpox, rubella, mumps, meningitis and so on. It is mainly spread by droplets in the air.
Prevention and treatment methods: Vaccinate on time, pay attention to changing clothes and strengthen physical exercise.
4. Virus defense knowledge
Putting down the topic is the answer.
I hope your machine will return to normal as soon as possible. All anti-virus software is completely poisoned, so you still need to find a special method to kill virus. Why don't you want to be poisoned? Sweat and learn knowledge. Constantly defend against virus invasion and never be poisoned. If you don't believe it, you will still be poisoned! As long as you read the anti-virus classics, you can stay away from hacker intrusion, hacker attacks, system damage, advertisements flying all over the sky and Trojan horses. As long as you practice more, you will be able to run wild on the internet.
In front of a Trojan horse, smile and don't smoke. Anyone who has seen Antivirus Classic says yes! ! ! "Introduction" Do you feel that when the virus comes out and is killed, it can never be killed? Is the antivirus software turned off? Invaded? Do you worry about antivirus every day? People are haggard? Are you angry with hackers? Hate viruses? Do you feel that antivirus software ranks high, but the actual use is really average?
This is because the ability to prevent virus loading is weak, so repeated killing occurs! From now on, refuse Trojan virus, and internet security starts from yourself. However, the anti-virus ranking does not consider the ability to prevent viruses from loading, nor will it be used as a ranking standard, so the ranking is only scanning static virus tests.
"Anti-virus ranking is an attractive soup for users." The bubble of anti-virus market is to expand its own market by improving ranking, but enterprises do not buy this set. The top rankings are not anti-virus rankings that can bring great influence at the enterprise level. It will not consider the factors that prevent the virus from loading, and it will not be used as a ranking standard, so the ranking is only scanning static virus tests.
They are still taking the traditional road, but like McAfee Enterprise Edition, they already have universal buffer overflow protection, and there is no anti-virus test to test this. It is not easy to be completely free from poisoning unless you study it.
Everyone can completely avoid poisoning with a few words, so there can be no virus epidemic and there is no meaning of existence. Quickly become a security expert. Step 1: Learn the principle. Step 2: Find antivirus software. Step 3: McAfee rule. Learn the principles of Windows security and technology. Step 2: Find antivirus software. It is strongly recommended to use enterprise antivirus software, McAfee Enterprise Edition or Symantec Enterprise Edition. Enterprise technology makes you safer.
"The most complete variety (16 brand)" or an auxiliary super patrolman, if McAfee enterprise antivirus software is installed, you can easily get rid of the virus that cannot be deleted/killed and then come out./Virus-free Terminator "Registry Access Protection Rules" (using McAfee custom rules to protect the security mode from being tampered with by viruses) Rule name: Write your own process to be included: * Process to be excluded: Leave space to fill in according to your actual situation.
Registry keys or registry values that can be protected by path: Select HKLM to populate/system/controlset */control/safeboot/* * Rule type: Actions to be blocked by keys: Select to write keys or values, create keys or values, and delete keys or values.
5. Infectious disease prevention knowledge
Measures to Prevent Infectious Diseases The purpose of preventing infectious diseases is to control and eliminate infectious diseases, protect people's health, ensure social stability and promote national modernization.
In view of the three basic links in the epidemic of infectious diseases, we should conscientiously implement the prevention policy based on comprehensive epidemic prevention measures. The main preventive measures are as follows: (1) source management 1. The management of patients and pathogen carriers requires early detection, early diagnosis, early isolation and active treatment of patients.
1978, the State Council promulgated the Regulations on the Management of Acute Infectious Diseases, and on February 26th, 65438, the National People's Congress Standing Committee (NPCSC) officially passed the Law on the Prevention and Control of Infectious Diseases in People's Republic of China (PRC), which came into effect on September 1 of the same year. Infectious diseases stipulated in the Prevention and Control Law are divided into three categories: A, B and C.
Infectious diseases reported to health and epidemic prevention institutions are called legal infectious diseases. Class A: Plague and cholera.
Class B: viral hepatitis, bacterial and amoebic dysentery, typhoid and paratyphoid fever, AIDS, gonorrhea, syphilis, polio, measles, whooping cough, diphtheria, epidemic cerebrospinal meningitis, scarlet fever, epidemic hemorrhagic fever, rabies, leptospirosis, brucellosis, anthrax, epidemic and endemic typhoid fever, epidemic encephalitis, leishmaniasis, malaria and dengue fever. Class C: tuberculosis, schistosomiasis, filariasis, echinococcosis, leprosy, influenza, mumps, rubella, neonatal tetanus, acute hemorrhagic conjunctivitis, infectious diarrhea except cholera, dysentery, typhoid fever and paratyphoid fever.
Our army also stipulated in 1979 that bacterial food poisoning and acute enteritis should be reported in the monthly epidemic report. The epidemic situation of infectious diseases should be reported quickly.
Class A infectious diseases require cities to report to health and epidemic prevention institutions within 6 hours, and rural areas should not exceed 12 hours; Class B infectious diseases require the city to be within 12 hours; Rural areas shall not exceed 24 hours. Health and epidemic prevention personnel and medical and health care personnel shall not conceal or lie about the epidemic situation, or instruct others to conceal or lie about the epidemic situation.
Management and necessary treatment of pathogen carriers. In particular, food producers, suppliers, chefs and nurses are regularly inspected for bacteria, so that they can be found, treated and replaced in time.
Medical observation, observation and collective quarantine shall be carried out on the contacts of infectious diseases, and immunization or drug prevention shall be carried out when necessary. 2. Management and treatment of infected animals The source of animal infection, wild animals and livestock with economic value should be isolated, slaughtered and disinfected when necessary, and wild animals with no economic value should be killed by the masses.
(2) Cut off the route of transmission According to the different routes of transmission of infectious diseases, different epidemic prevention measures should be taken. Bedside isolation of intestinal infectious diseases, disinfection of vomit and diarrhea, strengthening food hygiene and personal hygiene, and managing water sources and feces.
For respiratory infectious diseases, indoor ventilation, air circulation and air disinfection should be done well, and individuals should wear masks. Insect-borne infectious diseases should be equipped with pest control equipment, and drugs should be used to kill insects, insects and insects.
(3) Protect susceptible population, improve population resistance, focus on planned immunization, and improve population-specific immunity. Artificial active immunization vaccinates susceptible people with vaccines, vaccines and toxoids in a planned way. After vaccination, the epidemic appeared within 1-4 weeks, lasting for several months to several years.
Artificial passive immunization is to inject antiviral serum, gamma globulin, placental globulin and high-efficiency immunoglobulin in urgent need. Immunity appeared rapidly after injection, and it failed after maintaining 1~2 months.
6. Knowledge of how to prevent infectious diseases
The state implements the policy of giving priority to prevention, combining prevention with control, classified management, relying on science and relying on the masses for infectious diseases. * * * All levels should organize mass health activities, carry out health education to prevent infectious diseases, advocate civilized and healthy lifestyles, improve public awareness and ability to deal with infectious diseases, strengthen environmental sanitation construction, and eliminate the harm of rodents and vectors such as mosquitoes and flies; Build and construct public health facilities in a planned way, improve the sanitary conditions of drinking water, and carry out harmless treatment of sewage, dirt and feces; The state implements a planned vaccination system; Isolate and manage infectious disease patients, pathogen carriers and suspected infectious disease patients. Specific measures are:
(1) control
The source of infection refers to a person or animal that is parasitized by pathogens and can secrete pathogens. The work of eliminating or making it harmless is called managing the source of infection.
Patients with infectious diseases should be found, reported, isolated and treated early.
Many infectious diseases, such as dysentery, influenza, whooping cough, etc. It is the most contagious at the beginning of the disease. Early detection of patients with infectious diseases can prevent the spread of infectious diseases in time. Early reporting is an important means to prevent and control the epidemic of infectious diseases. After discovering suspected infectious disease patients or confirmed infectious disease patients, they should report to local health centers or epidemic prevention stations quickly. Early isolation can prevent the spread of pathogens, so that patients do not go out and others do not visit. Early and reasonable treatment is beneficial to early cure and reduce mortality.
The management of carriers and contacts with patients with infectious diseases should also be strengthened, and observation and regular inspection should be carried out under the guidance of epidemic prevention personnel.
Many animal infectious diseases can also be transmitted to people. Therefore, isolated treatment can be given to economically valuable sick animals, such as livestock suffering from brucellosis. Sick animals with no economic value or great harm, such as dogs suffering from rabies and animals suffering from anthrax, should be slaughtered and burned. Separation of human and livestock is also an important measure to prevent * * * comorbidity.
(2) cut off the route of transmission
Infectious diseases need specific routes of transmission, from patients or pathogen carriers to healthy people. The common transmission routes are respiratory transmission, intestinal transmission, contact transmission and insect-borne transmission. Some infectious diseases, such as hepatitis B, can also be transmitted through blood transfusion and childbirth. It can also be passed from mother to fetus through placenta. Corresponding measures should be taken to cut off the transmission route.
(3) Protect the susceptible population
Vaccination: refers to injecting or taking vaccines and vaccines that can prevent diseases, so that people can gain resistance to corresponding diseases and prevent the occurrence and prevalence of infectious diseases. If the human body is injected with measles vaccine, it can be immune to measles and avoid measles.
Drug prevention: At present, there is no effective vaccine to prevent some infectious diseases, but some drugs can play a certain preventive role. For example, malaria can be prevented by taking pyrimethamine orally. Oral compound sulfamethoxazole or sulfadiazine can prevent people who have been exposed to patients with epidemic cerebrospinal meningitis.
7. Anti-virus knowledge
Introduction of common viruses: Bootable-Bootable virus is a virus that infects the boot area or the main boot area of a disk, and its infection rate is second only to macro virus.
Because this virus will infect the boot area, when the disk or hard disk is running, it will infect other computers such as *. Exe, *, .386 run the necessary command programs, causing all kinds of damage. The common variety is TPVO/3783. After the Windows system is infected, it will seriously affect the running speed and some functions cannot be performed. After antivirus, you must reinstall the Windows operating system to run normally.
File-file virus is a kind of virus that infects files, and it is the most kinds of virus at present. Hacking virus Trojan. Bo belongs to this type.
Blog hackers use communication software to illegally enter other people's computer systems through the network, and obtain or tamper with data or control computers in the background. Thereby causing all kinds of leaks and theft accidents.
Mixed-This type of virus infects command files, disk boot areas, and primary boot areas. CIH saboteur virus that can destroy the computer motherboard chip (BIOS) belongs to this kind of virus.
CIH is a virus written by a college student in Taiwan Province. At that time, he put it on the BBS station of the university, 1998 was introduced to the mainland, and the attack date was the 26th of each month. This virus is the first virus that directly attacks computer hardware, and it is extremely destructive. When it attacks, it destroys the system program in the Flash BIOS chip of the computer, resulting in the data damage of the motherboard and hard disk.
1On April 26th, 999, CIH virus broke out on a large scale in China, Russian, Korean and other places, causing hundreds of thousands of computers to be paralyzed in Chinese mainland alone, and a large number of hard disk data were destroyed. Macro virus is a virus that mainly infects data files such as WORD documents and document templates.
Macro virus is a virus written in the macro programming language of an application. At present, three types of macro viruses have been found in the world: WORD macro virus infected with WORD system, EXCEL macro virus infected with EXCEL system and Lotus Ami Pro macro virus. At present, macro viruses mainly refer to Word and Excel macro viruses.
It has been widely popular in China since the second half of 1996. Such as TW Nuo-A, Melissa, Dad, etc.
Different from previous viruses, macro viruses have the following characteristics: ① Infecting data files: Macro viruses specially infect data files, which completely changes people's misconception that "data files will not spread viruses". ② Multi-platform cross-infection: Macro virus broke through the limitation of virus spreading on a single platform. When WORD, EXCEL and other softwares run on different platforms (such as WINDOWS, WINDOWS NT, OS/2, MACINTOSH, etc.), they will be cross-infected by macro viruses.
Easy to write: In the past, viruses appeared in the form of binary computer machine code, while macro viruses appeared in the form of easy-to-read source code, so it was easier to write and modify macro viruses than previous viruses. In the short period of half a year since the end of 1996, the number of macro viruses has increased sharply from more than 30 to more than 1000.
Easy to spread: If someone sends you an article or an E-mail, if they are infected with a virus, as long as you open these files, your computer will be infected with a macro virus. Later, when you open or create a new file, you may bring a macro virus, which leads to a very high infection rate of macro virus.
The general prevention method is to use computers at work and resolutely oppose the installation of pirated games, which are the main carriers of computer viruses. Some game discs used for teaching must also be inspected and disinfected by professionals in this department before they can be installed and used.
Before copying files to the hard disk, the floppy disk must be checked for viruses and disinfected. Do not run *. Exe file, and delete the letter directly.
Add genuine antivirus software and use its DOS command to kill the virus in the hard disk boot area. Be sure to download the upgrade files of genuine antivirus software from the Internet and update your antivirus software in time, usually at least once or twice a month.
Install real-time monitoring antivirus software to dynamically monitor viruses that may appear on floppy disks, hard disks, networks and emails. This prevention method requires higher hardware, such as larger memory and hard disk, and virus vaccine, such as CIH virus vaccine, is installed.
Buy computer motherboards that can prevent some virus hazards, such as dual BIOS motherboards, motherboards that prevent virus infection in the main boot area and so on. The hard disk should be partitioned as much as possible, and the main area (drive C) should be 2G. The usual working data must be stored in the extended partition of the hard disk (such as D disk).
Even if the CIH virus breaks out, the existing technology can still recover the hard disk data. Of course, the degree of recovery depends on the specific situation.
Introduction of Common Antivirus Software Norton Antivirus: A virus killing and antivirus software developed by Symantec Company, one of its features is to provide real-time monitoring of computer operation-as long as the computer is turned on, Norton Antivirus runs in the background, no matter whether the virus is downloaded from the Internet, running CDs, email attachments or LAN intrusion, it can be found and removed in time. Its other feature is that Symantec updates the virus signature database every week, and users can set up an automatic dial-up connection of Norton Antivirus's LiveUpdate to automatically update the virus signature database. The virus signature database code is particularly complete.
In addition, it occupies less computer system resources than similar software at runtime. Common antivirus software on the market:.
- Related articles
- These constellations are addicted to cultivating immortals _ Don't stay up late and don't die for me.
- What kind of personality is a Libra girl?
- A constellation girl who likes to stick to her boyfriend.
- The constellation woman of the sun and the moon.
- Although I know that people are hypocritical, which constellations are still willing to believe in beautiful things?
- How to write the title of the paper? . .
- Twelve constellations doll origami boat _ How to draw twelve constellations paper dolls?
- How much history and culture can a steelyard "weigh"?
- What is the overbearing president index of the boys in the twelve constellations?
- Brief introduction of Xu Weien