SoFunction
Updated on 2025-04-11

Anti-virus is not safe. What else should I prevent from network security?

Source: Beijing Entertainment News

Very few of the people who surf the Internet have never been attacked by the virus. But when most people focus on dealing with the virus, industry experts recently pointed out that in order to ensure Internet security, you must defend against the following three threats at the same time. The first is invasive viruses represented by traditional macro viruses, worms, etc.; the second is extension threats represented by spyware, adware, phishing software, and * programs; the third is targeted special attacks or targetless random attacks represented by hackers.

Three new threats

Spyware: It is mainly used as a malicious program to steal user personal information. If users use e-commerce applications such as online banking and online shopping, if there is no relevant defense measures and awareness, then the user's online banking account and password will be easily stolen.

Adware: It is a kind of software that generally manifests itself in that many superimposed web pages appear after a user clicks on a website, which is very difficult to close. It is usually tied to certain tool software, and when you install these software, you will follow it to your computer. It not only occupies system resources, but also often connects to some pornographic websites. In addition to forcibly advertising to users, it will also spy on users' personal privacy information, such as name, email, bank information, telephone number, address, etc., so there is a considerable harm hidden and needs to be cleared as soon as possible.

Phishing (phishing software, also known as electronic black bait): is the abbreviation of fishing and phone. It refers to the Internet-related deception behavior of stealing other people's personal information, bank and financial account information, and can be divided into two types: deception and technical. The deception is to use special emails to guide the recipient to connect to the specially made web pages. These web pages are usually disguised as real banking or financial management web pages, making the logger believe it, enter a credit card or bank card number, account name and password, etc.; the technical Phishing is to install the program on the victim's computer, steal personal information directly or use * programs, key record programs, etc.

Antivirus only is not safe

On May 12, the latest statistics released by the Ministry of Information Industry showed that the number of people online in China has reached 98.8 million. At present, many netizens no longer simply browse the web and send and receive emails. With the emergence of e-commerce applications such as online banking and online shopping, the threat from the Internet is not just a traditional virus.

It is reported that China has become the first choice target for hackers, with 30,000 PCs being out of control every day that may be attacked at any time. Industry insiders pointed out that the biggest threat to computers and computer users in the future is not what we commonly think of as computer viruses (Virus), but some Spyware (spyware), Adware (adware), Phishing (phishing software), * (*) and Worms (worms). The reason is that most users and commercial organizations have certain protection against general computer viruses, such as installing antivirus programs, etc. No matter how new the virus is, it can be solved in a short period of time. However, most netizens with Spyware, * and Worms have weak awareness of prevention. Although antivirus programs are also installed on ordinary computers, a single antivirus program cannot block attacks from the Internet. Digital Weekly here introduces to you how to build a meticulous "three-defense" computer defense system to ensure Internet security.

Four new trends of harming people

Robert, technical director of Symantec China, said in an interview with reporters that overall, the purpose of previous hacking and crimes was not very clear, and most of them were for the purpose of curiosity and show off. Nowadays, most of them are organized and purposeful economic crimes. According to our analysis, hacker attacks generally have the following four major trends:

1. Steal personal information

In recent years, crimes using Phishing attacks have grown very fast, mainly in e-commerce applications. The hacker sends an email to bank users under the name of a bank, prompting the banking system to upgrade and require the user to register again. Once the user trusts to register, the bank account will fall into the hands of the hacker, and this will be accompanied by your bank deposits disappear.

2. "Zombies" invasion

According to a security report released by Symantec in March this year, from July to December last year, from a global perspective, zombies, or robots (BOT) programs grew the fastest in China, and the entire Asia-Pacific region also ranked among the top ten in the world. BOT is similar to a * program. It executes a program that is not set up in advance and launches attacks on a target through all "zombie" computers controlled by the program. This kind of attack is the most dangerous because it is not like a virus that can be monitored in advance.

, Spyware sneak attack

Symantec's technology center once found in laptops sent to users for repairs that it has been implanted with up to 100 kinds of Adware or Spyware software. They are usually installed by small users when downloading Flash and mini-games. Since they are not as sensitive as viruses and worms, they are able to invade your computer without realizing it. Now some formal software manufacturers are also using these software to collect user information. Although these software may not be harmful at present, they collect your personal privacy information after all. This will also become the focus of future prevention.

4. Spam Mail Makeup

From the current perspective, although the total amount of spam is declining, its evasion technology is getting stronger and stronger. This type of email carries a large number of viruses, Phishings, worms, *s and additional risks.

Three defenses and six moves

It is often believed that just installing some simple network defense products is equivalent to building a complete computer defense system. Little do we know that these are not enough to build a complete network overall defense system. We also need to maintain the security of the network and information system as a whole through the overall network security management solution, combined with various different network defense technologies and products under the guidance of network security management standards.

1. Basic anti-virus software is indispensable

For ordinary users, the first thing they need to do is to install a set of antivirus software for their computers. As long as it is a genuine antivirus software from a regular manufacturer, you can choose any set. The installation steps are very simple. Just put the installation disk into the optical drive and follow the prompts of the system's automatic installation interface to select the installation ** antivirus software → select the installed language version → and then NEXT.

Recommended software: "NortonAntiVirus2005", supports Windows (All); "Rising Antivirus Software 2005 Version", supports Windows 95/98/Me or Windows NT4.0/2000/XP/2003; "Kingsoft Antivirus 2005", supports Windows 9X/2000/XP; "Jiangming Antivirus Software kv2005", supports WinXPSP2, WinXP, Win2000, Win9X.

2. Personal firewall setting is the key

The above antivirus software contains personal firewalls, so you can run the personal firewall installation on the same CD. The key is to remind you that the firewall must be configured in detail according to your needs after installation (see the figure).

There is a certain commonality between the various firewall settings, that is, when choosing to eliminate most of the connection protocols in the "service" of "regional connection" → "set value" in the Internet, only basic HTTP, HTTPS, SMTP, and POP3 projects can be retained through the firewall. After pressing OK, your computer can prevent most worms from invading.

3. Cut off the Phishing fish hook

The latest statistics from the anti-phishing organization APWG (Anti-PhishingWorking Group) point out that about 70.8% of online fraud are targeted at financial institutions. Judging from the situation in China in the past few years, most Phishing was only used to cheat QQ passwords, game point cards and equipment, but this year many domestic banks have been Phishing many times. You can download some tools to prevent Phishing activities.

Recommended software: "NetcraftToolbar". This software is Toolbar on IE. When the user opens the URL in IE, he will check whether it is a dangerous or suspected website that is blocked. If it falls within this range, it will stop connecting to the website and display a prompt. In addition to intercepting Phishing, it can also intercept Pop-up window ads.

4. Counter-espionage, adware kill

To prevent Spyware, in addition to installing anti-interference programs such as anti-virus programs on the computer, and monitoring and cleaning of Spyware on the computer are often monitored and cleared. You also need to identify and select the shared software you will install on your computer, especially those you are not familiar with. You can log in to its official website to learn more. In addition, when installing shared software, don't always absent-mindedly click the "OK" button all the way, but carefully read the terms of the agreement that appears in each step, and pay special attention to statements about Spyware's behavior.

Recommended software: Microsoft AntiSpyware is a program specifically for Spyware, supporting Windows 2000/XP/2003. It is software used to monitor and remove Spyware and other potentially untrusted programs present in the system. It can reduce illegal pop-ups caused by these software, slowing down computer operation, random changes to Internet option settings, and stealing private information. However, the software is still in the testing stage, so it should be used with caution.

Adware is similar to other malicious programs. They simply appear in the add or delete programs in the control panel, and users can remove them directly. However, in order to cover up, most Adware will not directly display the program body. To delete them, it needs to use some targeted software.

Recommended software: "SpybotSearch & Destory". As long as the default "Fullininstallation" is used during installation, S-S&D1.3 will directly include the Chinese interface and select "Chinese(simplified)" in the "Language" drop-down menu. When using it for the first time, S-S&D will prompt the user to back up the registry (tip: For the sake of insurance, it is strongly recommended to back up the registry first before making any modifications. Most of these software have built-in backup registry function). Then, click the "Find Update" button as usual to upgrade the main program and reference files. Click the "Check Problem" button again, and S-S&D will automatically start scanning the system and list the suspicious items found in the "Problem" box. After the inspection is completed, the user can select the items they want to clear and then click "Fix selected problems". Finally, after checking and killing existing spyware, users just click the "Immunity" button and wait for a few seconds. S-S&D will automatically give the system a "vaccine" to avoid the reinvasion of these spyware, and this "immunity" can also be cancelled at any time. In addition, there are Adware's "Ad-aware 6.0 Archives" and the all-round "Spyware/AdwareRemover" archives.

5. Self-built website blacklist

After clearing the advertising program, it does not mean that the existing problems in the browser will be automatically restored. The user also needs to manually change the title and homepage. Although "SpybotSearch & Destory" also has similar functions, it does not have a software called "SpywareBlaster" to use. Through this software users can first prevent the problematic website, restrict them from installing the computer, and remove harmful ActiveX controls that are currently installed. It is recommended to install it at the same time as the above software. In addition, if users want to beware of unknown software installed on computers on websites with problems, they can also use "SpywareBlaster" to solve the problem.

6. Training software to recognize garbage

I believe that users who own emails have been harassed by different degrees of spam (SPAM), which is annoying, especially after a long holiday, the email is blocked. To this end, all users need to do is install an email filtering program to filter out SPAM.

Recommended software: "Spamihilator" is a filter between the email program and the email server. Emails will be downloaded to the program first and filtered. Emails that are judged to be garbage will be stored in the program's recycling bin (this can avoid the loss of important emails that are accidentally deleted), while those that are judged to be normal will enter the incoming folder of the email. The software uses two ways to filter emails. One is the preset Word-Filter to check whether the email contains words commonly found in spam; the other is Learning-Filter, which can filter emails you receive every day. However, the program needs to be trained before using Learning-Filter. When filtering emails on a daily basis, click Normal Email in TrainingArea and press Nonspam to mark it as Normal Email. Press Pre-mark to allow the program to automatically click on all spam or normal emails. However, when using it, it is best for users to check it yourself to ensure it is correct. After that, according to the Learn program, you will learn to identify garbage based on the classification of emails.

Cultivate 9 good habits

Experts pointed out that from a technical perspective, the network is not absolutely safe, and it is not enough to have products on a protective system, and it is also indispensable to develop good usage habits in daily work and study. Users should develop the following 9 good habits.

First, the installed antivirus software should be upgraded regularly (if the network version is installed, it can be set to automatically upgrade when installing), and patch the operating system, upgrade the engine and virus definition code.

Second, do not open emails you don’t know, do not download software at will. If you want to download, you must go to a regular website to download. At the same time, programs or files downloaded online must be scanned for viruses before running or opening. If a virus is encountered, it will be cleared in time and a virus that cannot be removed, it will be submitted to the anti-virus manufacturer in time.

Third, don’t browse hacking websites (including formal hacking websites) or pornographic websites at will.

Fourth, try to backup. In fact, backup is the safest, especially important data and articles. In many cases, its importance is more important than installing defense products.

Fifth, users should conduct comprehensive anti-virus and scan the computer every week to discover and remove viruses hidden in the system.

Sixth, you should be careful not to use the same password in all places, so that once hackers guess, all personal information will be leaked.

7. When surfing the Internet, don’t easily believe messages sent by others through email or P2P software.

8. For users who often use P2P download software (such as BT), it is recommended to organize disk fragments every month. As long as you do not organize fragments frequently, it will not cause harm to the hard disk. In addition, be careful not to use low-level formatting frequently.

Nine: When a user accidentally gets infected with a virus, he should immediately upgrade the antivirus software to the latest version and then scan the entire hard disk. Clear out all viruses that can be detected. If the virus cannot be removed, or the antivirus software cannot clearly identify the virus, the virus should be submitted to the antivirus software company. The antivirus software company will generally give users a satisfactory reply in a short period of time. When facing a network attack, our first reaction should be to unplug the network connection port or press the disconnection button on the antivirus software.