当前位置:网站首页>Chromebook system without anti-virus software
Chromebook system without anti-virus software
2022-06-12 10:15:00 【[email protected]】
Chromebook Adhere to the principle of in-depth protection , Provide layers of safety protection measures , Even if you avoid a layer of security , There are multiple layers of protective measures ready for help . Although users themselves should be careful to protect their data , but Chromebook The design of can still make people feel a little relieved . Chromebook The built-in safety protection functions include :
One 、 Auto update
The most effective way to prevent malicious software attacks , It is to ensure that all software is kept up to date and subject to the latest security amendments . The traditional operating system has many software components from different manufacturers , Each has its own update mechanism and user interface , This aspect of management may be difficult . Chromebook Can automatically manage updates , Therefore, it can execute the latest and safest software version at any time . I especially want to update the mobile phone operation . comparison Windows Program update for , It's really much better .
Two 、 Use sandbox mechanism
Chromebook Every web page and Application on is executed in a restricted environment , This environment is called 「 The sandbox 」. If Chromebook Connected to the infected web page , Other pages in the computer 、 The application or other parts will not be affected at all , It can stop the threat of malware . This applies the current expensive sandbox design to every machine chromebook, And it's free .
3、 ... and 、 Verify the boot procedure
Even if malware tries to avoid sandbox protection ,Chromebook Still protected . Chromebook Every time it starts , It's all going on 「 Verify the boot procedure 」 Self checking mechanism . If any tampering or damage to the system is detected , Verify that boot programs can usually easily repair themselves , Give Way Chromebook The operating system is as good as new .
Four 、 Data encryption
stay Chromebook When using web applications on , All important data will be safely stored in the cloud . Certain types of files may still appear on the computer , For example, downloading items 、Cookie And browser cache files . Chromebook Use tamper proof hardware to encrypt data , Make it difficult for others to access these files . The target should be Windows Of BitLock encryption , Encryption through hardware , Avoid data tampering .
5、 ... and 、 Restore mode
If Chromebook Any problems , You just press a button or use a shortcut key combination , You can enter recovery mode , Restore the operating system to a well-established version . This ratio Windows The restore point of is designed to be easy to use .
Said at the end : The more complex the system design , There are bound to be more and more security vulnerabilities ,Windows、Internet Eexplorer、adobe flash And so on . Although it can not be used directly in China , But I hope chromebook The security mechanism can change the past Windows and Linux Security design of operating system , Security hardening doesn't require so many registry changes 、 Group policy, etc .
版权声明
本文为[[email protected]]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/163/202206121010262874.html
边栏推荐
- Introduction to on-line circuit simulation and open source electronic hardware design
- 2021-01-13
- 2021-02-12
- Japanese economic foam and house price foam
- Tp6 debugging (trace)
- 93. 获得内网的所有IP地址
- 一测两三年,记测试交流经验的一些感想
- CEPH performance optimization and enhancement
- [Mozilla] basic concept analysis of IPDL
- OpenCV中CLAHE用于16位图像增强显示
猜你喜欢

在线电路仿真以及开源电子硬件设计介绍

JVM (VI) Virtual machine bytecode execution engine (with stack execution process and bytecode instruction table)

True north reading notes

Redis (II) Memory mapped data structure
![Data processing and visualization of machine learning [iris data classification | feature attribute comparison]](/img/a3/1d181b9dd5268e13cc276a78862d1f.png)
Data processing and visualization of machine learning [iris data classification | feature attribute comparison]

First NFT platform in dfinity Ecology: impossible thoughts
![[Wayland] Weston multi screen display](/img/58/698e2cc790d3dbef9260cb2ad690d8.jpg)
[Wayland] Weston multi screen display

Introduction to IOT

Code implementation of hash table based on linear detection

Tp6 debugging (trace)
随机推荐
2021-03-26
SAP Hana error message sys_ XSA authentication failed SQLSTATE - 28000
Checkpoint of the four cornerstones of Flink
[CEGUI] window environment compilation
MySQL 7 affair
Reading notes of the fifth cultivation
np. Meshgrid() function and coordinate position generation in 3D space and numpy Introduction to repeat() function
7-5 zhe zhe playing games
Auto. JS learning note 9: basic methods such as using the script engine, starting the script file with the specified path, and closing
六月集训(第12天) —— 链表
5 most common CEPH failure scenarios
Spark complex structure data retrieval method
Access and traversal of string class objects
Theoretical explanation of hash table
ASP.NET Core权限系统实战(零)
学生管理系统
How high can C language reach by self-study alone?
[path of system analyst] Chapter 18 security analysis and design of double disk system
【MySQL】sql_ Model mode
string类对象的访问及遍历操作