Sunday, August 1, 2010

computer systems

First, the computer's settings
Close the "File and Print Sharing"
File and print sharing should be a very useful feature, but do not need it, is also very good hacking vulnerabilities. Therefore, there is no need to "File and Print Sharing" situation, we can turn it off. Right-click with the mouse "network neighbors", select "Properties", Dell inspiron mini 9 battery then click "File and Print Sharing" button, will pop up the "File and Print Sharing" dialog box in two hook can be removed . Although the "File and Print Sharing" turned off, but it does not ensure safety, but also to modify the registry, it is prohibited to change the "File and Print Sharing."
Open the Registry Editor, select the "HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ NetWork" primary key, primary key in the new DWORD under the key type, key named "NoFileSharingControl", key set to "1" the prohibition of this function to achieve the ban to change the "File and Print Sharing" purpose; key to "0" to allow this feature. In this way, "Network Neighborhood" and "Properties" dialog box "File and Print Sharing" to cease to exist.
Disable the Guest account
There are many invasions were further obtained through this account administrator password or permissions. If you do not want to put your computer to others as toys, that is a good ban. Open the Control Panel, double-click "Users and Passwords", click "Advanced" tab, then click the "Advanced" button, pop-up Local Users and Groups window. Guest account in the top right-click, select Properties, in the "General" page select "Account is disabled." In addition, the Administrator account was renamed to prevent hackers know the administrator account, which will in large part to ensure computer security.

Prohibit the establishment of air link
In the case of default, any user can connect to the server through the air connection, enumerate account and guess your password. Therefore, we must prohibit the establishment of air link. Is to modify the registry: Open the registry "HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Control \ LSA", the DWORD value "RestrictAnonymous" The key to "1" can be.

Second, hide IP address
Hackers often use some network technology to detect host information see our main objective is to get the network host's IP address. IP address in network security is a very important concept, if the attacker knows your IP address is equivalent to ready his attack goal, he could be consulted IP Fadong various attacks such as DoS (Denial of Service) attacks , Floop overflow attacks. Hide IP address of the main method is to use a proxy server. Compared with the direct connection to the Internet using a proxy server to help protect Internet users IP address, thereby protecting the Internet security.
The principle of the proxy server is the client (user access to the Internet computer) and remote server (such as the user wants to access a remote WWW server) set up between a "transit point", when a client machine to the remote server requests for services, the proxy server first intercept the user's request, then the service request to the proxy server a remote server in order to achieve client and the link between the remote server. Obviously, using a proxy server, other users can only detect the proxy server IP address instead of the user's IP address, which the user IP address, Dell kd476 battery a hidden purpose, to protect the user access security. Free proxy server site there are many, you can own use tools such as proxy hunters to find.

Third, close unnecessary ports
Hackers often scan time of the invasion port of your computer, if you install the port monitor program (such as Netwatch), the monitoring program will have a warning prompt. If you encounter such invasion tool available for less than the port closed.

4, replacement of an administrator account
Administrator account has the highest system privileges, once the account is being used, lead to disastrous consequences. One common means of hacking is trying to get Administrator account's password, so we need to re-configure the Administrator account. The first is set for the Administrator account, a strong complex password, and then we rename the Administrator account, create an Administrator account without administrator privileges to deceive the intruder. In this way, intruders can hardly figure out which account has administrator privileges true, to some extent also reduced the risk.

Fifth, stop the invasion of Guest account
Guest account, the so-called guest account, it can access the computer, but limited. Unfortunately, Guest also opened the door for the hacker! Online There are many articles have introduced the use of Guest Users get administrator rights and for this reason, the eradication of Guest account on the system invasion.

Disable or delete the Guest account is a complete best way, but certain essential 在 use to Guest of account of, in respect require alternative ways to do defense work Le. First, set up to give a strong password Guest, and then set the Guest account in detail the physical access path. For example, if you want to prevent Guest users can access the tool folder, you can right-click the folder, the pop-up menu, select "Security" tab, from which you can access this folder to see all the users. Remove all users other than administrators can. Or permission for the corresponding user to set permissions, for example, only "List Folder Contents" and "read" and so on, so a lot safer.
6, install the necessary security software
We should also be installed on your computer and use the necessary Hacking Software, antivirus software and firewalls are essential. Open them in Internet time, so even if a hacker attack on our security is guaranteed.
7, against Trojans
Trojans are implanted into the computer will steal useful information, so we have to prevent the implantation of Trojan horses, hackers, commonly used methods are:
● In the download file into your first new folder, and then anti-virus software to detect, to play the role of prevention in advance.

● In "Start" → "program" → "Start" or "Start" → "program" → "Startup" option in the operation to see if there is an unknown item, if so, delete. The registry in HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run All to "Run" as the prefix can delete all suspicious programs.

8, do not return messages from strangers
Some hackers may be posing as some of the formal name of the site, and then compile a high-sounding reason to send a letter asking you to enter your Internet user name and password, if you press the "OK", your account number and password into the hacker mailbox. So Do not return messages from strangers, even if he did not say pleasant, attractive fooled again.
9, do the security settings of IE
Applets ActiveX controls and strong features, but there are also being used by the hidden malicious code in Web pages is often use small programs written in these controls, simply open the web page will be run. So to avoid attacks by malicious web page only to run against these malicious code. IE provides several options to this specific setup steps are: "Tools" → "Internet Options" → "Security" → "Custom Level", it is recommended that you disable ActiveX controls and related options.
Some caution is not always wrong! In addition, the security settings in IE, we can set the Internet, Local Intranet, Trusted Sites, Restricted Sites. However, Microsoft is hidden here, "My Computer" security settings, by modifying the registry to the option open, Dell latitude d400 battery can enable us to deal with ActiveX controls and Applets have more choices, and to generate local computer security greater impact.

The following are specific ways: Open the "Start" menu "Run" in the pop-up "Run" dialog box, type Regedit.exe, open the Registry Editor, click in front of "+" sign in turn expand to: HKEY_CURRE -NT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ InternetSettings \ Zones \ 0, in the right window, find the DWORD value of "Flags", the default key is 21 hexadecimal (decimal 33), double-click the "Flags", the pop-up The dialog will change its key value "1" to close the Registry Editor.

Without restarting the computer, re-open IE, once again click on "Tools → Internet Options → Security" tab, you'll see one more "My Computer" icon, where you can set its security level. The level of security it set higher, so to prevent more closely.

Final recommendations to patch their systems, Microsoft is still very useful to those patches.

No comments:

Post a Comment