展开区段导航移动菜单

OU帮助台

克雷斯格图书馆,202室
图书馆道100号
罗彻斯特 MI 48309-4479
(位置地图)
(248) 370-4357(帮助)
传真:(248)370-4863
(电子邮件保护)
办公时间:上午8时至下午5时

OU帮助台

克雷斯格图书馆,202室
图书馆道100号
罗彻斯特 MI 48309-4479
(位置地图)
(248) 370-4357(帮助)
传真:(248)370-4863
(电子邮件保护)
办公时间:上午8时至下午5时

帮助台计算机病毒信息

防止电脑病毒贴士

如何保护你的台式机和笔记本电脑免受电脑病毒的侵害.

  1. Turn on Windows firewall and use the recommended automatic updates in Windows.
  2. 使用杀毒软件保护电脑.  University computers are eligible for free Symantec Endpoint Protection software.
  3. Do not open email messages from unknown sources and do not click on any suspicious email or links.
  4. Make a strong password by combining letters, symbols and numbers and do not share passwords.
  5. Only download from trusted websites and only install software with authentic DVDs or CDs.
  6. 定期备份关键数据.
  7. Online safety tips include keeping personal information private and check website security by looking at the URL address that should start with "http".

The best protection from viruses and malware starts with awareness.  Always use caution online and pay special attention to email attachments, 您打开的链接或下载.  Stay away from suspicious websites and install and maintain an updated antivirus program.

University employees should contact the Help Desk if they are using an 十大菠菜台子 owned computer that is not currently running Symantec Endpoint Protection (SEP). The Help Desk will install the program for free and uses it to assist with virus management  on campus.  Please call the Help Desk at (248) 370-4357 to schedule an installation today.

Students and faculty using campus network resources with personal laptops are strongly encouraged to install and maintain security protections such as personal firewalls and anti-virus software, e.g.、微软安全必备.

The two most common questions we receive at the Help Desk about computer infections are: "Who does these things?和“这是怎么发生的??"

  • The reasons vary why a software programmer might create these harmful programs; from simple pranks and experiments, 严重的有组织网络犯罪, 比如身份盗窃.
  • Computers are typically infected with a virus by clicking on a link or file that opens the malicious program which infects the computer.  Computers not protected with antivirus software are at greater risk.

电脑病毒资讯

什么是恶意软件?
The term Malware is short for malicious software and exists in forms that include viruses, worms, 特洛伊木马和其他类型的有害软件. 这些程序是用来干扰计算机运行的, 收集敏感信息, 或者进入你的电脑系统.

什么是间谍软件?
Spyware is a software program that is designed to collect user's activity and send the information back to a hacker. The software tracks personal or sensitive information and once installed is silent to avoid detection. Spyware can change the configuration of your computer and be difficult to remove. Typical spyware behavior is to change a web browser's home page or search page, 或向您的Internet浏览器添加其他组件. 间谍软件没有任何感染机制.

More sophisticated forms of spyware allows the hacker to capture network data giving them access to network files, 数字证书, 加密密钥和其他敏感信息.

什么是病毒?
A computer Virus is a program that is loaded onto your computer without your knowledge and spread from one computer to another.  病毒可以伪装成附件,如贺卡, 或音频和视频文件, but cannot infect your computer unless you run or open the program. They can be hidden in files or programs that you download from the Internet. Viruses can replicate themselves and pose a danger to your computer or transmit itself across networks.

Unfortunately, no currently existing anti-virus software is able to catch all computer viruses. It is important to keep your anti-virus software updated to detect new virus infections.

什么是病毒骗局?
A computer Hoax is a message that is received usually in an email message that warns a user of a fictional computer virus threat. Most Hoaxes are usually harmless in nature and exaggerate the ability of the virus. It will stress the urgent nature of the threat and encourage readers to forward the message to others.

Visit the McAfee and Symantec websites to see a comprehensive lists of virus hoaxes.

什么是特洛伊木马?
A Trojan is a type of malicious program designed to provide unauthorized, 远程访问用户的计算机. Trojans are also known to create a backdoor on your computer that gives users access to your system, allowing confidential or personal information to be compromised. Trojan horses do not have the ability to replicate themselves like viruses.

When a Trojan is activated on your computer, the results can vary. Some Trojans are malicious and can cause serious damage by deleting files and destroying information on your system.

什么是蠕虫?
蠕虫类似于病毒. Worms spread from computer to computer and has the ability to travel without any human action and can allow malicious users to control your computer remotely. A worm takes advantage of file or information transport features on your system.

A worm has the capability to replicate itself and could send out hundreds or thousands of copies of itself. An example would be to send a copy of itself to everyone listed in your e-mail address book, then replicate and send itself out to everyone listed in each of the receiver's address book, 清单还在继续.

其他有用资源