Disabling or completely deleting the Guest account is the best way, but in some cases where you must use the Guest account, you need to do some other defenses. First, give the Guest a strong password, and then set the Guest account access to the physical path in detail. For example, if you want to prevent Guest users from accessing the tool folder, you can right-click on the folder and select the "Security" tab in the pop-up menu, where you can see all the users who can access this folder. Just delete all users except the administrator. Or set the permissions for the corresponding users in the permissions, for example, only "list the folder directory" and "read", so it is much safer.
VIII. Install the necessary security software
We should also install and use the necessary anti-blackware in the computer, anti-virus software and firewall are necessary. Open them when you are online, so even if a hacker attacks our security, it is guaranteed.
IX, prevent Trojans
Trojans will steal useful information from the embedded computer, so we must also prevent hackers from implanting Trojans, commonly used methods are:
When you download a file, first put it in your new folder, and then use anti-virus software to detect it, which plays a role in preventing it in advance.
In the "Start" → "Programs" → "Start" or "Start" → "Programs" → "Startup" options to see if there are any unknown running items, if there is, delete it.
Delete all suspicious programs prefixed with "Run" under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\
CurrentVersion\\Run in the registry.
X. Don't go back to strangers' emails
Some hackers may pretend to be in the name of some regular websites, and then make a sounding reason to send a letter to the user name and password that asks you to enter the Internet. If you press "OK", your account and password will be in the hacker's mailbox. So don't just go back to the stranger's mail, even if he says it will be tempting and tempting.
XI, do IE security settings
ActiveX controls and Applets have strong features, but there are hidden dangers of being exploited, malicious code in web pages is often the use of these controls The small program you write will be run whenever you open the web page. Therefore, to avoid malicious webpage attacks, only the malicious code is prohibited from running. IE provides a variety of options for this. The specific setup steps are: "Tools" → "Internet Options" → "Security" → "Custom Level". It is recommended that you disable ActiveX controls and related options. There is nothing wrong with being cautious!
In addition, in the security settings of IE, we can only set the Internet, local intranet, trusted sites, restricted sites. However, Microsoft hides the security settings of "My Computer" here. By modifying the registry to open this option, we can have more choices when dealing with ActiveX controls and applets, and generate more security for local computers. Great impact.
The above methods are for your reference. If you have a better way, please let us know. Let us all share it together!
Despite the popularity of broadband, there are a lot of dial-ups like the author. After disconnectin
Normally, the installation of fonts in the system is a very simple matter, as long as the font file
Many friends of WinXP system installed the latest SP3 patch, found that the Internet speed is slower
Windows XP SP2 has been released for a long time, and many of my friends have installed it. However,
Two monitors simultaneously use one to watch a movie (3)
Scanner driver installation problem under Windows XP
How to add background music to a folder
Modify XP settings skill set desktop adjustment
Save the crashed Windows XP operating system
Visiting the web page under Vista
Windows system remote desktop connection method Daquan (2)
How to use the DOS command to quickly see the system through the
XP system can't stop the solution of universal volume device
Let the client automatically enable it? Group strategy to help you busy
Win XP operating system image production skills big release
Word document printing tips Raiders: output documents in page order
Win7 system running yy prompts this operation is canceled due to the limitation of this computer
Win8 start menu gorgeous transformation start screen
How to quickly find hidden files in win8
How to delete the Windwos 2000 system login interface
How to delete Windows.old folder in win10 system
How to center the icon on the Win7 system taskbar
WeChat 6.1 like statistics viewing method
Tips for quickly cleaning up Windows 8 search records