Traditional Culture Encyclopedia - Weather forecast - Can I play computer when it thunders?

Can I play computer when it thunders?

You can't play computer when it thunders.

Because thunder and lightning in thunderstorm weather will bring strong current, if it is conducted to everyone's computer through conductors, it will lead to computer restart and seriously damage the motherboard, power supply, hard disk and other hardware, which is extremely harmful. Therefore, I suggest that you turn off your mobile phone in thunderstorm weather, especially when there is thunder and lightning, then unplug the power supply and go online again after the thunder and lightning has passed.

If your power supply and host are good, you can use a computer when it thunders. In addition, it is also essential to buy a high-quality socket with surge protection function. If the air humidity is too high in thunderstorm weather, it is not suitable for playing computer. In addition, pay attention to the network cable connector to be wrapped, and the metal wire can not be exposed. If it is a desktop computer, the cable and distributor of cable TV are usually set up outside telephone poles or buildings, which is easy to be struck by lightning, so don't play in thunderstorm weather.

Computer use safety guide

A network firewall should be installed to prevent external users from invading the internal network by illegal means and effectively protect the operating environment and data information of the internal network. Network firewall can be divided into packet filtering type, address conversion type, monitoring type and proxy type, which can be selected according to the actual situation. On the other hand, anti-virus software should be installed, which is the most widely used security protection measure in personal computer security protection at present, and a corresponding virus database can be established.

Vulnerabilities are mainly reflected in software and hardware defects, or weaknesses caused by improper functional design, which often become the first target of Trojans, viruses and hackers. The research shows that it is impossible to completely eliminate the vulnerability under the current technical conditions. In order to reduce and eliminate the complete threat brought by the vulnerability, it is necessary to install the vulnerability patch in time to fill the vulnerability. In addition, you can also configure the corresponding vulnerability scanning software.