Tip: This part of the operation uses the "Magic Cube" software, you can download the channel to download this site, the specific address is as follows:
Rubik's Cube (Optimized master new generation) 0.5 official version download address: http://down.ddvip.com/vIEw/11552790134540.Html
Close the default shared blocking system backdoor
same as XP, Vista Win7 also enables network sharing by default (as shown in Figure 1). Although this makes LAN sharing more convenient, it also creates conditions for virus transmission. Therefore, turning off the default share can greatly reduce the probability of the system being infected by a virus.
Open the Rubik's Cube, click on "System Optimization → Network Sharing", select "Disable default management sharing and disk partition sharing", click "Save Settings" and restart the computer. The system cannot be accessed through the default share (as shown in Figure 2). If you don't want to turn off all default shares at once, the cube also provides the ability to turn off a single default share. In the previous interface, select the "default share" point "refresh", you can see the current system's default share list, select the default share that is not needed, click "Clear Share", save the settings to restart the computer, the selected default share will is closed.
In addition, Rubik's Cube also provides settings such as "Restricting IPC$ remote default sharing" and "Disabling inter-process communication IPC$ empty connection" to improve system security. All enabled.
Modify Group Policy Reinforced System Registry
is the same as XP and Vista. Win7 still has a very high risk of remotely accessing the registry path. Setting the path to the remotely accessible registry to null can effectively prevent hackers from using the scanner to read Win7 system information and other information through the remote registry.
Open the Control Panel, select "Administrative Tools", double-click "Local Security Policy", open "Local Policies→Security Options", and then find "Network Access: Remotely Accessible Registry Path" on the right side and "Network access: remote access to the registry path and sub-path", double-click to open, delete the registry path in the window (as shown in Figure 3).
Lock important features to prevent virus theft
Some commonly used, high-privileged functions in the system, such as command line programs, batch files, registry editors, etc. It is also often used by viruses such as viruses to become an "accomplice" of intrusion systems. These programs are not commonly used as ordinary users. Therefore, disabling these functions can effectively strengthen the system and ensure the security of daily applications.
Open the Rubik's Cube, select "Security Optimization → System Security Settings", it is recommended to select "Disable Management Console Plugin", "Prohibit execution of autoexec.bat file", "Prohibit editing with registry", "Prohibit import." Reg registry file, "disable command line program and batch file" several items, save the settings and restart the computer to complete the settings.
Disabling automatic operation Preventing virus propagation
In addition to the network, mobile storage devices such as flash memory and mobile hard disk have become important ways for malicious programs to spread. When the system has autoplay or autorun enabled, malicious programs on the removable storage device can infect the system without the user being aware of it. So disable the auto play and auto run functions, you can effectively cut off the virus propagation path.
Turn off autoplay: Enter "gpedit.msc" in "Run" to open the Group Policy Manager, and then turn on "Computer Configuration" →Manage Templates→Windows Components→AutoPlay Policy”, double-click “Close AutoPlay”, click “Enabled”, then select “All Drives” in the options, and finally click OK, the auto play function will be turned off.
Turn off automatic operation: Double-click "Default behavior of automatic operation" in the same position, select "Enabled", select "Do not execute any automatic running command" in the option, and then confirm that the automatic running function is Closed (as shown in Figure 4).
System Functional Limits to Ensure System Security
If the computer is placed in a public environment such as a dormitory or a company, restrict important system functions to avoid other people's operations. It is very important to cause system failure.
We can use the Rubik's Cube in the "System Settings → Taskbar and Notification Area", "System Settings → Start Menu", "Security Optimization → System Security Settings", "Security Optimization → Control Panel" and other modules. Make further settings, such as disabling the control panel, disabling management tools, disabling the taskbar right-click menu, and more. These features are not only simple but also effective, and you can use them in a targeted manner depending on the specific usage environment.
Clearing history to protect personal privacy
One of the features of Win7 is that users can be recorded in multiple locations such as the Start menu, Taskbar, and Explorer search bar. Operation history. Although convenient, it sometimes leads to the leakage of personal privacy.
It's easier to close the history menu and the history function in the taskbar. Right-click on the taskbar, select "Properties" from the pop-up menu, and then uncheck all the two items in the "Start Menu→Privacy" item (as shown in Figure 5).
But the history in the Explorer search bar must be cleared using Group Policy. Enter "gpedit.msc" in "Run" to open the Group Policy Manager, and then open "User Configuration → Administrative Templates → Windows Components→Windows Explorer, double-click “Close the display of recent search entries in the Windows Explorer search box”, select “Enabled”, and then close the group policy after confirmation. This way not only the original history is gone, but here We will not record our operation anymore (as shown in Figure 6).
After a series of optimizations, our Win7 system is very safe, but I would like to remind everyone here. Develop good computer usage habits, install system patches in a timely manner and update anti-virus software virus database, do not log in to unknown websites, and do not use pirated software. Only in this way can Win7 stay away from security threats and protect them to the maximum extent. Good running condition.
AppLocker AppLocker can prevent unauthorized applications from running on the network. Stand
Rule one: Why do you have to ask for far This site is a friend of mine, it is safe! I know
computer common fault, in addition to hardware, is the software. If the partitions on the software s
Win7s large amount of reading and writing on the hard disk is really a headache, even after
You Should Know Windows 7 Keyboard Shortcuts (b)
Wireless router encryption full Raiders Avoid becoming a big head
Older MSE will hinder Win 7 SP1 system installation
Reloading the system, the second hard disk is gone, and the solution is
The input method icon in the lower right corner of Windows7 is missing. How to retrieve
Win7 remote desktop connection tricks two
Windows7 frequently dropped the line? Download the flaws, yes or no
The problem is solved by popping up the UAC dialog box every time (without turning off UAC)
Network discovery improves the security of Windows 7 clients
How to change the computer name of Win7 Win7 change computer method
Windows 8 or will be equipped with Siri voice control software
PPlive, QQlive play online video flower screen, play local video normal solution
Let win7 system run faster? Try streamlined font
Windows 8.1 API will support POS devices
CF new version of the sheep capture action let go of the sheep let me sign up to receive AWM jade
Teach you how to add a security lock to the Windows XP system
XP access to Windows 7 shared files
Win8.1 skills to deal with LAN ping nowhere computer has a trick
Win8 Time Machine file history easily restore individual files