Generally, our protection system will be protected by some external software or system password, but the system commands are still strange to some people. However, the security of the system is not limited to the system password. A better protection method can help us get rid of Trojans and crack attacks. For the current operating system in the MicroSoft camp, the Syskey command is a good choice. (If you have already enabled the syskey command, there is no way to cancel it, unless there is a backup before.) Take Windows XP as an example. There is a general, but powerful command in the system, which is: syskey command.
This command can effectively enhance your system security. Maybe you have to say that you have to enter your account and password when you enter Windows XP or Windows 2000. This is not safe. If your computer is used by multiple people, others can access the system by breaking someone else's simple password and use various vulnerabilities to gain administrator privileges. With the encryption disk made by syskey, you can use Windows XP with complete peace of mind. Let's take a look at the usage of the syskey command.
1. Double Password
1. Enter "syskey" in "Run" in the Start menu and click OK.
2. Next click on "Update", because of the knowledge of NTFS, the disk partition is preferably NTFS format.
3. Select the password to start, enter a password, and then click OK. Doing so will cause Windows XP to require more than one password to be entered at startup, which serves as a secondary encryption. When the operating system starts, the window prompt will appear before we enter the user name and password. "This computer requires a password to start, please enter the startup password ". This is the first password protection we have just created.
Second, the password floppy disk
1. If we choose "Save the startup password " on the floppy disk, this will generate a password floppy disk, without this floppy disk, no one wants to enter you The operating system. Of course, if you have previously set the syskey system startup password, you will need to enter that password again to obtain the corresponding authorization. This double protection makes the system operation more secure.
2. Then the system will prompt you to put a floppy disk in the floppy disk drive, and a prompt will appear when the password floppy disk is generated.
3. Then we start the system again, then the system will prompt you to insert the password floppy disk, if you do not insert the floppy disk, click OK, the system will not give you the release.
Insert a password floppy disk and enter a different password for each account. At the same time, if you prefer, the key file in the password floppy disk can be copied to other floppy disks.
Third, recovery system
If one day, your security requirements for the operating system are not so high, and you are tired of entering a floppy disk every time you enter the system, what should I do? Select "Save boot password on this machine" It will be fine. Of course, you must have a floppy disk with a key to perform this step. This is a reason to require an authorization password when creating a floppy disk. Originally, the syskey encryption system has been very secure, but there are still methods for cracking. For such cracks, we must be optimistic about our love machine, and not give some people who are ill-intentioned to start the opportunity. At the same time, we can also use the popular flash drive boot lock on the market to protect our system. The main function of the boot lock is to prevent others from illegally using your computer, and to set the lock time of the computer. Of course, this type of computer lock is also expensive, and can be used by users with particularly high security requirements!
I didn’t expect a small system command to work so well. In fact, the system’s function is very powerful. However, we don’t know how to make good use of it. The order introduced today must be tried when you go back.
Excel is a versatile spreadsheet, it is powerful, easy to operate, in addition to can quickly genera
Everyone has a small secret for everyone. Everyone is a small individual living independently. So ev
How to make IE allow to install objects with invalid signatures Phenomenon If an object contains inv
Windows XP SP3 is the most advanced version of the Windows XP system patch, and many users love it,
Thunder download has a high trick, good configuration is king
Several ways to easily replace the xp login background image
How to make XP's theme become as beautiful as Win7 goddess
Seven tricks to avoid illegal intrusion without hacking broilers (2)
Tips and tricks: Excel double click magic
The principle of fraud in XP+SP2 system properties
Windows XP Super Nirvana Big Decryption
Optimization system can not blindly follow the trend Optimization points to remember
Win XP System Removable Storage Service
Practical DOS commands let you know what a simple "hacking" is
Win10 Build 14316 Enable Linux Bash Environment Graphic Tutorial
How to modify the number of scroll lines per mouse wheel in Win8.1
Win8 taskbar can not be displayed after being automatically hidden. What to do if the
How does Windows 8 open a command prompt?
WinXP system installation did not find the hard drive reason analysis and its solution skills
Win7 disable usb port, win7 disable u disk software, win7 disable usb storage tool method
Windows 10 Fallback to Windows 7 or Windows 8.1 Features
MyEclipse Tutorial Creating a Data Source in WebSphere Tutorial
How does Win7 increase virtual memory? How to increase the virtual memory