3. Disable Guest account
There are many intrusions to obtain administrator passwords or permissions through this account. If you don't want to give your computer a toy, it's forbidden. Open the Control Panel, double-click User and Password, click the Advanced tab, and then click the Advanced button to bring up the Local Users and Groups window. Right click on the Guest account, select Properties, and select "Account is disabled" on the "General" page. In addition, changing the name of the Administrator account can prevent hackers from knowing their own administrator account, which will largely guarantee the security of the computer.
4. It is forbidden to establish an empty connection
By default, any user can connect to the server through an empty connection, enumerate the account and guess the password. Therefore, we must prohibit the establishment of an empty connection. There are two methods:
The first method is to modify the registry: open the registry "HKEY_LOCAL_MACHINE\\System\\CurrentControl\\SetControl\\LSA" and change the key value of the DWORD value "Restrict Anonymous" to "1". can.
The second method is to modify the local security policy of Windows 2000/XP to "not allow anonymous enumeration of SAM accounts and shares".
Fourth, hidden IP address
Hackers often use some network detection technology to view our host information, the main purpose is to get the IP address of the host in the network. IP address is a very important concept in network security. If an attacker knows your IP address and is ready for his attack, he can launch various attacks on this IP, such as DoS (Denial of Service) attacks. , Floop overflow attacks, etc. The primary method of hiding an IP address is to use a proxy server.
Compared with connecting directly to the Internet, using a proxy server can protect the IP address of Internet users, thus ensuring Internet security. The principle of the proxy server is to set up a "transit station" between the client (the computer that the user accesses the Internet) and the remote server (such as the user wants to access the remote WWW server). When the client requests the service from the remote server, the proxy server first The user's request is intercepted, and then the proxy server forwards the service request to the remote server, thereby enabling the connection between the client and the remote server. Obviously, after using the proxy server, other users can only detect the IP address of the proxy server instead of the IP address of the user. This achieves the purpose of hiding the user's IP address and ensuring the security of the user's Internet. There are many websites that offer free proxy servers, and you can also find them yourself with tools such as proxy hunters.
V. Turn off unnecessary ports
Hackers often scan your computer port during an intrusion. If a port monitor (such as Netwatch) is installed, the monitor will have a warning. . If you encounter such an intrusion, you can use the tool software to close the ports that are not used. For example, use "Norton Internet Security" to close the ports 80 and 443 for providing web services, and other ports that are not commonly used can be closed.
Six, replace the administrator account
The Administrator account has the highest system privileges, once the account is used, the consequences are unimaginable. One of the common ways to hack is to try to get the password for the Administrator account, so we have to reconfigure the Administrator account.
The first is to set a strong and complex password for the Administrator account, then we rename the Administrator account, and then create an Administrator account without administrator privileges to deceive the intruder. In this way, it is difficult for an intruder to figure out which account actually has administrator privileges, which reduces the risk to a certain extent.
VII, to prevent the invasion of the Guest account
Guest account is the so-called guest account, it can access the computer, but is restricted. Unfortunately, Guest has also opened the door for hacking! There are many articles on the Internet that describe how to use the Guest user to get administrator privileges, so you should put an end to the system invasion based on the Guest account.
WIFI wireless signal is not 崂山道士, the ability to penetrate the wall is poor. In the student dormitor
Although the data in the registry is very complicated, in order to improve system performance, we ha
Microsoft Windows XP introduces a new icon design style. In the following article, well discuss the
Apples Mac OS operating system, the interface is very beautiful, so there are many Windows beautific
The uncommon faults of the network in the win xp system are solved together
Win 2000/XP: System users switch cool tricks
Simple way to completely turn off the notification function of Windows XP SP2
Thoroughly master Windows Update
Microsoft officially released the Yahoo font Windows XP version
The use of Windows system Regsvr32 command
Learn about Windows XP system contraindications to avoid system crashes
The system can't start the two methods solved by the novices normally (2)
Two monitors simultaneously use one to watch a movie (3)
VXD and 386 errors occur when starting the system
Three ways to open the file in the computer is more convenient.
How does Win10 uninstall the edge browser? Win10 uninstalls the Edge browser method
After Win8 reinstalls the system, there is only a recycle bin on the desktop. How to solve it?
Win10 new preview version /mobile preview version issued
Install Win8 dual system graphic tutorial with U disk (2)
Windows 7 comes with burning ISO image function
How to use WeChat on a Win7 system computer
Microsoft will provide two updates for Win10
Win10 custom installation command detailed Win10 installation custom setting method
Correcting misunderstandings and misconceptions about Linux by Chinese people