When Microsoft began to aggressively launch the Windows 7 program, the outside world has long been arguing about this new operating system. After all, Vista is coming out soon, and the new operating system will really bring a better experience for users. For users who have long been concerned about the Windows operating system, whether security can be improved is more worthy of attention. Although Apple released the words "Windows 7 is just Vista plus a few patches", but everyone has reason to believe Microsoft, I believe that this new version of the change will never be so simple.
First, UAC transforms
In fact, when Vista has UAC function, the outside world is arguing, which improves the user experience while improving security. Thus in Windows 7, Microsoft began to let users choose the UAC notification level, and also improved the user interface to enhance the experience. The biggest improvement in UAC in Windows 7 is that it provides more control options in the Control Panel, allowing users to choose the appropriate UAC level for their needs.
Enter "Secpol.msc" in the start menu search box and press Enter. Open the local security policy editor, select "Local Policies" → "Security Options", then find the "User Account" in the list on the right. Control: Administrator's promotion prompt behavior attribute in the administrator approval mode, the user can see that there are six choices in the drop-down list in the "Local Security Settings": no prompt, direct promotion; prompt credentials on the secure desktop Agree to prompt on the secure desktop; prompt credentials; consent prompt; consent prompt for non-Windows binaries. It is necessary to mention "non-Windows binary consent prompt", this option can be a good way to filter Windows system files and directly use UAC function for the application, which is the highlight of Windows 7.
Another intuitive modification method is to enter the control panel user account change interface, click "Change User Account Control Settings", UAC settings under Windows 7 provides a slider to allow users to set the level of notifications. There are 4 ways to choose, but obviously the above method is not flexible.
Second, Behavior Center
Windows 7 removed the Security Center that was originally introduced with Windows XP SP2 and switched to the Action Center. This includes security centers; issues, reports and resolvers; Windows Defender; Windows Update; Diagnostics; network access protection; Backup and Restore; Recovery; and UAC mentioned above.
After entering the Behavior Center, Windows 7 supports fast scanning of local computers with Windows Defender. We scan the system disk in the Lenovo T61 notebook, which takes only 33 seconds and scans up to 34,931 resources. Although it is not good to define how high the security of the system itself is, Windows Defender is a software with high system compatibility. In this case, the scanning speed is already very good.
In fact, Windows Defender's features in the settings center can also make it perform better. Real-time protection allows you to scan downloaded and running programs. It can also be filtered for specific file types and paths, and supports scanning of mail and mobile storage, and so on.
In the security settings, the user can clearly see the activation status of the current system services, and the maintenance area can also display information such as detection problem reports or backups.
Three, new firewall function
The biggest feature of the firewall under Windows 7 is internal and external defense, through the Home or work networks and Public networks to protect the internal and external networks.
The advanced setting project is also more comprehensive. Through the inbound and outbound rules, the current network circulation can be clearly outlined, and the operation of the configuration file and the introduction of the strategy are greatly improved. I believe that in the future update, Windows 7 firewall will have a greater use.
Fourth, security deployment details & Summary
Like XP, Vista, Windows 7 security deployment also needs to learn from the Windows series of security processes. This near-universal approach provides a better guarantee of Windows 7 security.
1. Account Issues
The vast majority of hackers, after gaining root privileges, will be in a situation of no one. The security of the account has become a top priority. As you all know, the Administrator level account can have enough high authority to control Windows. Therefore, it is necessary to give the Administrator an unnoticed name, but please do not use the name of Admin, because in the dictionary of many hacking tools, the authentication of Admin is no less frequent than the Administrator.
In addition, the Guest account is stopped in the user management, and it is not allowed to log in to the system at any time. Of course, this method is more suitable for personal PCs. If you often encounter multi-user login or restricted login, it is best to set a common password for the account to shield the invasion of the external network.
2. Sharing problems
Enter "net share" under CMD to view shared resources. There are IPC channels, documents and printers shared, of course, the default system may also include the sharing of hard drives. The prohibition method is as follows:
net share c$ /delete (delete C drive sharing, other drive letters are similar)
net share ipc$ /delete (delete IPC share)
3. Port problems
There are some ports in the system that are very dangerous. Hackers can control our computers through these ports, such as port 3389. Before shutting down, you need to know the open ports in the computer, under CMD. Enter "netstat -an" and see that ports 135, 139 are open and need to be disabled. This method is best monitored or closed directly through a dedicated firewall, which is more convenient and faster than the system filtering method.
Obviously, "Windows 7 is just Vista plus a few patches" is slightly biased, but Windows is by no means invulnerable. We can understand some of the complaints and doubts from the outside world and competitors about Microsoft, but there is no doubt that Windows 7 does have better performance in terms of security. The UAC vulnerability is just an event that has been magnified by public opinion.
In the face of such a huge code camp, Windows 7 built by many computer experts is bound to exist, just like Windows 2000 faces Windows 98, Windows XP faces Windows 2000, and Windows Vista faces Windows XP. Similarly, even if there is still a flaw, Windows 7 is destined to become a driving force in the history of operating systems.
Perhaps everyone has encountered the boot display dll file error, can not be loaded problem, this is
. Compared with the WinXP system that everyone is already familiar with, it is just like the latest
that can be used under Windows7 installed Windows7, found that the virtual optical drive software DA
With the increasing number of computer programs, many people find that the icons on the desktop are
Solve QQ auto-hide function in Win 7 system
Make good use of Win7 built-in fingerprint recognition function
Replace Windows 7 Windows Media Center theme
A simple two-step process can determine whether Win 7 is activated.
Tips for two Windows 7 systems
How to set up XP and Win7 printer sharing (detailed graphic steps)
Hard disk installation windows7 practical method
Teach you how to modify the Windows 7 user configuration folder location
Let your Windows 7 system up and running faster Windows7
How Win10 adjusts the speed, volume and pitch of the Narrator function
How to delete all restore points in Windows 7 system?
Windows can't log out of the solution
How to completely remove oneDriver without the local strategy win8 system?
How to save a web page with a cloud note
How to open isz file? What type of file
The magic of the Win XP taskbar
Adobe CS6 series failed in WIN7 WIN8 installation failure
Microsoft Win10 SDK Preview 10166 Chinese version download Updates and known issues summary