System optimizing and maintenance plays a vital role if your work is based on PC. Many PC owners would like to choose a type of system-care software. It is a good idea but just a kind of software is not enough for protecting your PC to the best. If your PC operating system is XP, then, this article is written for you. A method based on several steps can kill all of viruses. If you adopt this method, you will be browse any websites and web pages you want whether they contain viruses or not. What you need to do now is reading my following tips carefully.
First of all, set the password of super administrator to be more than ten digits and build a user whose password needs to be set more than ten digits. The purpose for this is double insurance. If you forget one of those passwords, you can use the other one to log in so as to avoid being refused by system. Besides the hackers also can not gain your system control right and destroy your PC through guessing your password. Then, set up another two users of user1 and user2, and appoint them belonging to user group.
After you log in, you should find IE and establish its shortcut on your desktop. Then, right click IE shortcut and choose the button of “use other users modes to operate”. If you want to surf the Internet, you just need to click this shortcut and input the user2 name and password. If you adopt this channel, you can browse any web pages and websites without any worry, because your current operating system user is user1. At this moment, the user2 is inactive user. When we use user1 to surf the Internet, however cleaver the website is, it always thinks the user2 is your current operating user.
However, if by any chance, your PC is attacked, don't worry. Here is a unique skill for you. Restart your PC and use the super administrator to log in. You don't need to operate any procedure after entering the system. What you need to do is just delete the user1 and user2. Then, all of the viruses carried by these two users will disappear along with the remove of those two users. You will find any system documents and courses are in perfect condition. The last but not the least, you can copy the step of establishing user1 and user2.
Click here to learn more about system optimization.
No comments:
Post a Comment