Fourth, hidden IP addresses
hackers often use some network detection technology to view our host information, the main purpose is to get the IP address of the host in the network. IP address is a very important concept in network security. If an attacker knows your IP address and is ready for his attack, he can launch various attacks on this IP, such as DoS (Denial of Service) attacks. , Floop overflow attacks, etc. The primary method of hiding an IP address is to use a proxy server.
Compared with direct connection to the Internet, the use of a proxy server can protect the IP address of Internet users, thus ensuring Internet security. The principle of the proxy server is to set up a "transit station" between the client (the computer that the user accesses the Internet) and the remote server (such as the user wants to access the remote WWW server). When the client requests the service from the remote server, the proxy server first The user's request is intercepted, and then the proxy server forwards the service request to the remote server, thereby enabling the connection between the client and the remote server. Obviously, after using the proxy server, other users can only detect the IP address of the proxy server instead of the IP address of the user. This achieves the purpose of hiding the user's IP address and ensuring the security of the user's Internet. There are many websites that offer free proxy servers, and you can also find them yourself with tools such as proxy hunters.
5. Turn off unnecessary ports
When a hacker invades, you will often scan your computer port. If a port monitor (such as Netwatch) is installed, the monitor will have a warning. . If you encounter such an intrusion, you can use the tool software to close the ports that are not used. For example, use "Norton Internet Security" to close the ports 80 and 443 for providing web services, and other ports that are not commonly used can be closed.
Six, replace the administrator account
Administrator account has the highest system privileges, once the account is used, the consequences are unimaginable. One of the common ways to hack is to try to get the password for the Administrator account, so we have to reconfigure the Administrator account.
The first is to set a strong and complex password for the Administrator account, then we rename the Administrator account, and then create an Administrator account without administrator privileges to deceive the intruder. In this way, it is difficult for an intruder to figure out which account actually has administrator privileges, which reduces the risk to a certain extent.
Seven, to prevent the invasion of the Guest account
Guest account is the so-called guest account, it can access the computer, but is restricted. Unfortunately, Guest has also opened the door for hacking! There are many articles on the Internet that describe how to use the Guest user to get administrator privileges, so you should put an end to the system invasion based on the Guest account.
Disabling or completely deleting the Guest account is the best way, but in some cases where you must use the Guest account, you need to do some other defenses. First, give the Guest a strong password, and then set the Guest account access to the physical path in detail. For example, if you want to prevent Guest users from accessing the tool folder, you can right-click on the folder and select the "Security" tab in the pop-up menu, where you can see all the users who can access this folder. Just delete all users except the administrator. Or set the permissions for the corresponding users in the permissions, for example, only "list the folder directory" and "read", so it is much safer.
For a computer user, the word formatting should not be unfamiliar. Disk formatting is also one of th
The initiator of the remote assistance sends a request for assistance to the contact in the Messenge
The xp system, which is no longer brilliant, always has a headache for us. Users often use the xp op
On a Windows XP system computer, we can view basic information about the computer through the proper
The five major computer optimization tools let you choose
You don't know the 9 windows XP secrets
How to set up the wireless network
How to fix management in my computer's right-click menu
Want to use the CD to install XP system? Master teaches you to quickly install
The system's task manager could not display the username
Four reasons lead to the emergence of "virtual memory is not enough"
27 stroke optimization tips for releasing C drive space under Windows XP
Wonderful question and answer on Windows XP issues
WinXP system collection function magical
Win8 runs genuine XP tutorial with VMLite virtual machine
Win8 system running Metro interface IE Jump to the desktop version of IE browser solution
What if the win7 computer's optical drive cannot be used
What should I do if the Win7 system opens the CDR file blank?
Solving the problem of NTLDR loss
Simple way to make volume adjustment easier from now on
Microsoft's November Tuesday patch: Win8/Win8.1 has a total of 16 security updates
How to restore Win10 to the previous version of Windows How to restore Win10 to Win7 or Win8.1
Windows NT/2000/XP/2003 administrator system password removal tool