we are pain Jiruo kill the virus, but sometimes no choice but to rely on a simple anti-virus software and firewall protection. To share today is to let the virus sword mandrel.
a new installation of the pure system
must be completely formatted, the installation of the system, and be pure, not a little weed, if it is Microsoft's own species, that no way.
operation above the median, and lowercase letters, uppercase letters, numbers, special symbols intermingled. Then create a user, it also set a password more than ten and upgrade super administrator. The aim is to double insurance: If you forget one password, and password to login with another super-pipe to restore the room, lest you be refused on the outside the system; addition of online hackers can not guess the super password of your system by means of remote control access to your system and do damage control. Then add two users, such as user names are: dayua1, dayua2; and specify the user group they belong to, well, prepare to be completed here, and after the addition to the necessary maintenance of your computer should not be used outside the super administrator and dayua2 landed. Only dayua1 landing on it.
after landing, when the Internet to find IE, and as it creates a shortcut to the desktop, right click the shortcut and select Point the shortcut, it will tell you to use the user name and password this time you will enter dayua2 user name and password!!! Well, now you can use this open window to the Internet, you can as you have to be assured of access to any vicious,
moncler down jacket, malicious, websites with web pages, without having to worry about in the move it! because your current system activity users dayua1. The dayua2 is inactive user,
for example, we use this non-active users to the Internet,
moncler jacket, no matter how clever the site,
moncler down jackets, the information obtained through the IE will have to think that this dayua2 it is your current activity of users, if it is to When you visit malicious code using the system for you, then engage in sabotage when simply does not work, even if the can do it through, then be modified only when the dayua2 out of a configuration file fills, and many of malicious code and viruses were trying dayua2 they are nothing but destruction activities will fail, because dayua2 did not even run, how can we get the operating system, right? ? If not taken, it had no alternative but to you. They also can not cross the user to operate, because Microsoft had originally Calvary user configuration are independent, just as people can not take my family went to bed as I slept, they can not occupy the position of dayua1! So you As long as the always do this dayua2 user agent to the Internet (but do not use dayua2 to landing system, because in that case, what if dayua2 previous page in the virus, then landed in dayua2 same time, they will most likely be activated !), then no matter how many pages you of the virus, all will be unable to run or load your current dayua1 users, so you will always be non-toxic current system!
II,
moncler jackets online, has won the bid for machine
restart the computer, log into the system using the super administrator what programs do not run after
you will be surprised to find that the performance of the system even completely non-toxic! !, better yet, it immediately to open:
/ p>
the inside dayua1 and dayua2 two users to delete it right,
directly select the a, you only need one so gently delete on it, then the previous two users exist with the virus just like with it the disappearance of two users go to sleep out (seems to be buried, huh, huh!). Done this then I guarantee that your newly installed win2k as a kind, any system files and system processes which completely is not the virus!
Now repeat the steps starting from the newly created two dayua1 and dayua2 users, allowing them to revive it. They resurrection is the resurrection, but the virus had followed them the opportunity but it is not, because when win2k to re-establish the user will be re-assigned to their new configuration, and this configuration is also impossible to include a new virus ,
moncler jackets sale,
File - Page Setup - Paper - A3 to be the anti-selection!!! build off immediately after the completion of a super administrator, transfer, such as land use dayua1 continue you want to do it, you will find that your system is like new it! cycle of the above methods can be used.