A few simple settings teach you to better protect your Mac! Tips to prevent your Mac from being poisoned!

You can often hear the news of Windows user system poisoning, but you rarely hear about it on MacOS. Therefore, many consumers will think that Apple computers are the safest in the world, and there is no virus. Will Mac be poisoned? Of course the answer is yes!

How can I protect you, my MacBook?

Indeed, generally speaking, Macs are not easy to be infected with viruses. The scene of turning on the computer every day and killing them with a digital combination of anti-virus software does not apply to MacBooks with higher safety factors. However, everything is in case, after all, Nokia's booming day also had a slump (Nokia CEO:???). It’s better to be careful with your own equipment. Careful can make the Wannian ship. However, the virus is very cunning. It will not use a loudspeaker to tell you "hello, I am here to invade your computer, please take care of it". Instead, it will be implanted quietly, and when you ask for it When doing business,

It came, it came with a mess of pop-up windows—

· Some inexplicable advertising slogans will appear on the webpage you are visiting.

· When you visit the website normally, you will be randomly directed to another website that you do not intend to visit.

· A browser pop-up window appears, and "warm-hearted suggestion" that you use its own (counterfeit) software.

· Without your knowledge, other unwanted adware programs may be installed automatically.

· and many more.

If your computer has experienced one or more of the above symptoms, it is very likely that the MacBook has been invaded by some virus, but don't panic, the computer can be saved, just remove the malicious app from the MacBook. Adware usually installs a new toolbar in the Internet browser and changes the default search engine setting to a third-party search engine. Then you need to delete the extension and reset the browser settings, so that you can completely remove the unnecessary toolbars and search engines.

Now let’s take an example of the three most widely used browsers on the market:

Safari browser:

1. Start the Safari browser.

2. On the Apple menu bar, select History> Clear History> All History> Clear History. Note: When you clear the browsing history in Safari, website data (such as saved passwords and other entries) will also be cleared.

3. On the Apple menu bar, select Safari> Preferences> Extensions> Uninstall.

Google Chrome

1. Launch the Chrome browser.

2. On the Apple menu bar, click Chrome, and then select Preferences.

3. In the left pane of the Settings page, do the following:

o Select extension. If you find any suspicious extensions in the list, click the "trash paper icon" icon to delete them.

o Select settings. Scroll down and click Show advanced settings. In the list of advanced settings, to restore Chrome’s default settings, click Reset browser settings. Finally, in the dialog box that appears, click Reset.

Firefox browser

1. Start the Firefox browser.

2. On the Apple menu bar, do one of the following:

o Click Tools and select attachments. In the left pane of the Add-ons Manager page, click Extensions. Similarly, if you find any suspicious extensions in the list, click the "Remove" button next to it.

o Click "Help" and select "Troubleshooting Information". On the "Troubleshooting Information" page, under "Reset Firefox to Default", click "Reset Firefox."

In addition, when you have reset Firefox to its default settings, it will also delete all installed attachments or extensions.

Then the pop-up problem has been solved, but some people may still have lingering fears: Why is my computer infected with such things? Is there any way to stop it? Of course there is!

Please keep each of the following in mind

1. Update frequently. Remember to update your operating system and other software frequently. This prevents hackers from accessing your computer through loopholes in outdated programs that can be exploited by malicious software. At the same time, consider disabling software that is particularly vulnerable to infection, such as Java or Flash.

2. Remember to delete the trace. Delete all traces of personal information on the hardware. So even if the device is recycled, it is almost impossible for others to restore your files.

3. Confidential Wi-Fi. Do not use open Wi-Fi on the router, otherwise hackers can easily steal your connection and download illegal files. So it’s best to protect your Wi-Fi with an encrypted password and consider updating your device every few years.

4. Set the power-on password. Use a password to protect all devices, including electronic products such as desktops, laptops, mobile phones, tablets, cameras, etc. After all, the popularity of mobile devices makes them particularly vulnerable to attacks, and mobile devices are a veritable treasure trove of personal information. Once unlocked, it may lead to devastating consequences. (There have been many leaks like celebrities, right?)

5. Improve the answers to security questions. The security problem seems to be very safe, but now, others can search through google or other a little bit to find out the birthday or even the school graduated from. So, you might as well let no one think of the answer to your security question. For example, ask: "Where is your birthplace?" Answer: "Arctic." But don't forget the answer yourself.

6. Use xx cloud less. Although cloud software is very convenient now, as a security company practitioner, in my opinion, no matter which method is used to upload to the cloud, the data stored in the cloud does not belong to one person, but to everyone. Specifically, when you are using cloud services, you have passively agreed to a series of treaties, such as: not all cloud providers encrypt data; possible security incidents (and not necessarily timely remediation of loopholes); service providers’ The force majeure disclaimer, etc., may cause your data content to be lost or damaged or leaked. So, use the cloud appropriately. If the file is really important and secret, don't upload it, just use a separate method!

The above is all about "Will a Mac be poisoned? How to protect my Apple system!" For more Mac usage tips, please follow orsoon.com!

CleanMyMac X for mac (Mac system cleaning and optimization tool) to repair the password pop-up window

McAfee Endpoint Security for mac (McAfee antivirus software) permanent license

Antivirus VirusKiller for Mac (antivirus tool) activated

Guess you like

Origin blog.csdn.net/zjj778899/article/details/110915431