With the advancement of technology and the development of the network, hacker attack technology is getting stronger and stronger, and we need special attention in daily life. Therefore, we specifically teach you some techniques to prevent hackers from attacking this issue.
Specific hacking attack computer program:
1. Turn off the Remote Regisry service
2. Shut down the SSDP Discover Service service
This service is mainly used. To start the UPnP device on the home network device, the service will also start the 5000 port. It is very likely that a DDOS attack will result in CPU usage reaching 100%, which will cause the computer to crash. It is reasonable to say that no one will do DDOS for personal machines,
However, this use process also takes up a lot of bandwidth, and will continue to send packets to the outside world, affecting the network transmission rate, so it is still closed. .
3, forbid IPC empty connection
Cracker can use the net use command to establish an empty connection, and then intrusion, and net view, nBTstat are based on empty connections, prohibiting null The connection is fine. First open the registry, find Local_Machine->System->CurrentControlSet->Control->LSA-RestrictAnonymous Change this value to “1”
4, forbid At command
Cracker often gives you a Trojan, and then let it run, then he needs the at command. Open the administration tool, click on the service, and disable the task scheduler service.
5, shut down the service of the HyperTerminal
If you open this, this vulnerability will rot, so this service is strictly prohibited to open
6, close the Remote Regisry service < Br>
The Remote Regisry service is meant to allow remote modification of the registry. It must be closed for security purposes.
7. Disable NetBIOS over TCP/IP
Right-click "Network Neighborhood" -> Properties -> Local Connection -> Properties -> Internet Protocol (TCP/IP) Properties -> Advanced -> WINS Panel -> NetBIOS Settings -> Disable NetBIOS over TCP/IP. This way your NetBIOS information and the address of the network card MAC will not be read by Cracker using the nBTstat command.
The above points are the places where hackers often attack, so we take precautions from these starting points and double the attention in daily life to create a safer operating environment for our computers. Let's try it together.
What should I do if the installation system fails to read the file error? I believe that everyone ha
Recently, many users are reporting that after the computer is turned on, there is a wrong prompt win
After modifying the txt text file, it can not be saved. What is going on? This happens because the t
During the use of the computer, the blue screen problem is our most common problem. Recently, some u
Use F11 to recover crash system
Simple steps to easily get the projector connected
Unix tools under windows unxutils
Analysis of the reason why the new u disk becomes a garbled file after copying the file
Looking for a computer power supply with a dual-core CPU
Use the registry to quickly find files that have not been saved due to reinstallation systems
Easily enter safe mode under dual system
What is the process of ACS.exe? The role of the ACS.exe process
Master share: network failure solution
Troubleshoot computer system problems
9 major methods to quickly solve the problem of computer black screen
How to install ios image file in windows virtual machine?
Is the 360 security guard easy to use? 360 security guards use tutorial
Win7 system silent problem troubleshooting
Win10 TH2 official version update detailed: no SP nor Win10.1 and other distinctions
Win10 Build 9901 new notification icon exposure more "slim" more "skinny"
Win10 defaults to open the home page after launching IE
How does Win8 set up a way to connect to a wireless network
Windows 7 excellent feature analysis
Win8 Consumer Preview System Installation and Usage Guide (7)