China Naming Network - Baby naming - Can I play computer games during thunderstorms?

Can I play computer games during thunderstorms?

You cannot play on the computer during thunder.

Because lightning in thunderstorms will bring strong current, if it is conducted to your computer through a conductor, it will cause the computer to restart. In serious cases, it will cause damage to the motherboard, power supply, hard disk and other hardware, which is extremely harmful. big. Therefore, it is recommended that during thunderstorms, especially when there is lightning, shut down your phone first, then unplug the power supply, and then go online again after the lightning has passed.

If your power supply and host performance are good, you can use your computer during thunder. In addition, buying a high-quality socket with surge protection is also essential. If the air humidity is too high during thunderstorms, it is not advisable to play on the computer. In addition, pay attention to the network cable connectors to be wrapped well, and no metal wires should be exposed. If it is a desktop computer, the cables and distributors of cable TV are usually installed on telephone poles or outside buildings, which are prone to lightning strikes, so do not use them during thunderstorms.

Security Guidelines for Computer Usage

A network firewall should be installed to prevent external users from intruding into the internal network through illegal means and to effectively protect the internal network operating environment and data information. Network firewalls can be divided into packet filtering type, address translation type, monitoring type and proxy type, which can be selected according to the actual situation. On the other hand, anti-virus software should be installed, which is also the most widely used security protection measure in current personal computer security protection and can build a corresponding virus database.

Vulnerabilities are mainly reflected in software and hardware defects, or weaknesses caused by improper functional design. They often become the first choice for Trojans, viruses and hacker attacks. Studies have shown that under current technical conditions, it is impossible to completely eliminate vulnerabilities. In order to reduce and eliminate the complete threats caused by vulnerabilities, vulnerability patches need to be installed in a timely manner to fill the vulnerabilities. In addition, you can configure corresponding vulnerability scanning software.