How to prevent hackers from attacking personal computers?

Personal technology to prevent hacker attacks can be divided into passive technology and active technology.

Passive prevention technology mainly includes: firewall technology, network hidden danger scanning technology, virus killing technology, hierarchical permission restriction technology, important data encryption technology, data backup and data backup recovery technology. Active prevention technology mainly includes: digital signature technology, intrusion detection technology, hacker attack event response technology (automatic alarm, interception and counterattack), server key file destruction prevention technology, trap network technology, hacker intrusion forensics technology and so on.

Extended data:

Use Windows tools to kill viruses:

1. When you feel that your computer is poisoned, the anti-virus software is powerless and you don't know the name of the poisoning, your first thought should be to check the progress. Press and hold "Ctrl+Alt+Del" to open the windows Task Manager and check whether there are suspicious processes in it.

2. When the system is running slowly and in the process, you can find that the CPU utilization rate of a process is high, but there is nothing corresponding to it in the corresponding program you open, then it is probably a Trojan horse. After finding the suspicious process, we need to find its location and stop the process. In fact, the above methods are generally ineffective for new virus Trojans, because the processes and threads of current Trojans or viruses are linked to each other. So we need more powerful tools and recommend two: tasklist and taskill.

Using third-party tools to kill people:

1, Hijackthis+Killbox .Hijackthis and Icesword can view the overall situation of the system, and killbox can modify or delete processes, threads and various files.

I swear. I cesword can also monitor the process, which can effectively prevent the Trojan process from being generated repeatedly. I cesword can modify or delete processes, threads and various files.

Aut or uns .Aut or uns is very helpful for viewing and modifying the registry.

Baidu encyclopedia-hacker