"System security" has been the focus of the majority of users, like various firewalls, anti-virus software, etc. in order to suppress the virus they are also a force. However, the security of the system relies solely on “defense” and it is also necessary to have sufficient security awareness. Every move you make to the system may leave traces of access in the system. If these traces are not cleaned up in time, they are likely to pose a security risk. To ensure absolute security, you usually You should focus on the details and promptly clean up the various privacy traces of the system to prevent these privacy from posing a security threat.
Clean the traces in the run box
When you click the drop-down button at the system run box, you will be clear in the interface of Figure 1 "Peeping" to the system owner recently Which commands are executed, so that the usage habits of the system owner can be monitored, and targeted damage measures will be taken. In order to prevent others from peek into your own "running" privacy, you'd better clean up the usage traces in the run box as follows:
Click “Start” “Run ” command, in the pop-up window, execute the registry editing command "Regedit", and in the editing interface opened later, locate the mouse in the HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionEXPlorerRunMRU branch.
In the right sub-window corresponding to the RunMRU branch, you will see the most recent execution record, select each record in turn, and execute the “edit” “delete” command to delete them all. Finally, restart the computer system and you will find that the usage traces in the run box have been cleaned up.
Cleaning traces in network ants
Each time you use a network ant to download programs or information, the system automatically keeps the download address of the corresponding information in the download list of the program. These addresses will sneak your important files or programs "as it is", thus giving you a security loss. In order to avoid this phenomenon, you must firmly establish a security awareness. After downloading important information, you must clean up the address traces in the network ants in time:
First open the network ant download list interface, select In the list box, compare the important address records, and then click the
“delete” command in the “Edit” menu item, so that the corresponding address record is cleared; Check other important address records and execute the delete command to clear them one by one from the list box.
Cleaning up traces in Office
When using any program in Office to edit or access a document, it will leave the most recent access under the "Files" menu item of the corresponding program. Traces, click on these traces of access, others can peek into your private information. For this reason, it is very important that you clear these traces in time:
Click
in the Office program interface to clean up the traces in the clipboard
Everyone knows, if you execute After the cut or copy operation, the system will “snap” a small amount of space to temporarily “save” the content currently being cut or copied. Under some applications, the clipboard can even Dozens of cuts, copy content is automatically saved; while enjoying the convenience of the clipboard, it will also copy the content you have previously copied or cut out "leaked". In order to avoid leakage of private information, you must remember to delete the important content in the clipboard in time. There are several ways to clear the traces in the clipboard. For example, you can repeat the copy operation, overwrite the important content in the clipboard with invalid content, or clear the important content in the clipboard by logging out or shutting down the system. .
Cleaning up traces in the search box
Each time you use the system's “Search” dialog to find important information, the last few target keywords will be "searched" & rdquo; The box is automatically remembered. Other people will be able to easily know your recent search privacy in the next time you use the “Search” dialog box. To ensure the absolute security of your privacy, you may wish to follow the steps below to “system”. The privacy record in the Search & rdquo; box is cleared:
If you are using the Windows 98 operating system, you can open the system registry editing window, locate the mouse in the HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerDoc Find Spec MRU branch, and then select All the records under the branch, and then execute the “edit ” “delete” command in the menu bar, and finally refresh the registry, you can clean up the privacy record in the search box.
If your workstation is installed with Windows 2000 operating system, then you can locate the mouse in the registry editing interface HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerExplorerBars{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}; Then expand the “FilesNamedMRU” option and the "ContainingTextMRU" option under the branch separately, and then delete all the records below the respective options.
IE is the systems own browser, online browsing through IE browser is a very simple operation, but in
Windows2008 is the operating system of the Microsoft server family. It must be used
Recently, a friend is asking how to migrate the server? Migration server is a must-
According to the news on September 10, MSDN and TechNet subscribers can already dow
Flexible settings enable Win2008 to download efficiently
Close the IDE channel to improve the efficiency of windows2008
How to achieve remote multi-user sharing under Win2008
Win2008 launches the desktop theme of the small Raiders
Clever use of win2008 mission planning function
Xp system tips: Prevent changes to desktop settings
Solve the problem of coexistence between Win2008 and Win7.
Win2008 Bluetooth driver assembly tutorial
Win2008 dual system virtual memory sharing method
Forced potential! win2008 optimization small coups to share
Use Win 2008 with its own firewall to effectively protect server security
Win7 system computer into the U disk to display the available space 0KB how is the matter
Win7 modify the background color of the window
How to repair Win7 system Win7 repair command repair system method
How to set the handset mode for WeChat
Win7 system prohibits modification of IP address how to set
Some settings for protecting user privacy under Win10 system
What is a cool photo stick? How to use the cool open shadow stick?
Common WEB Server Security Configuration Tips
How does WinXP close the scheduled task service? WinXP system shutdown plan task service method