This article wants to inform ordinary computer users that it is super simple and effective to prevent the computer from becoming a "broiler" of others. You only need to realize that if you become a "broiler", you will be very hurt and you will definitely refuse to be controlled by anyone. To do this, the attacker wants to catch you, neither is the door.
Closer to home, to prevent becoming a "broiler", you only need to pay attention to the following points:
Key point 1: pirated Windows XP is a huge risk, you need to immediately modify it.
If your operating system is installed by other technicians, or it may be pirated XP, such as the computer installer's Tomato Garden XP, Yumu Linfeng XP, Tornado XP and so on. Many of these systems are unattended. The installation procedure is very simple. You put the CD into the computer, go out to drink tea, and you may find that the system has been installed.
Where is the biggest flaw in such a system? Again, the administrator password for this system is empty and automatically logged in. In other words, anyone can try to log in to your system with a blank password, which is not an obstacle for the Internet.
Transformation method:
Immediately modify the administrator user password. The password uses a combination of letters and other special characters, and the length is not less than 8 digits.
To change the login method, you must press ctrl+alt+del to log in.
Point 2: Any time you leave your computer, it is recommended to unplug the network cable, the computer can not be disconnected, it is recommended to lock immediately, do not allow strangers to physically touch your computer.
Just find a Windows PE CD (Deep Mountain Red Leaf Repair Toolpad, etc.), use this CD to boot, you can easily modify your administrator login password, modify your registry information, of course, including writing Virus, then start the virus program.
There used to be an example. A white-collar online bank in Shanghai was taken away by Yunnan hackers for 100,000 yuan. For the general online banking, the popular version usually limits the withdrawal of 1,000 yuan a day, which is a small payment. Once the account is lost, the loss will not be particularly large. For professional online banking, if the digital certificate is stored on the local computer, when you leave your computer for a long time, the attacker can remotely control your computer and transfer the property on your computer. This is no different from your local online banking business. For online banking users who use mobile digital certificates, be careful not to unplug the digital certificate when it is used, and do not give the attacker any chance.
Solution:
When you need to leave the computer for a long time, lock the computer or unplug the network cable.
Point 3: Make sure to enable the network firewall
For Internet users, the network firewall (note, here is the firewall, not many people think that the virus is monitored in real time) is to isolate you from the outside world. Passing, properly enabling and configuring the firewall will reduce your chances of directly facing the attack. When your system has a patch that is not patched, the firewall may be the only solution that protects your computer's security.
However, don't think that if you turn on the firewall, you will have nothing to worry about. The firewall basically only intercepts the communication from the outside to the inside (from the Internet to the local machine). From the inside to the outside, it is easy to use various means to spoof. This is how Trojans evade the firewall to complete the theft task.
Although the firewall is not always effective, but the firewall is much stronger than no, it must be enabled.
Point 4: Pay attention to security vulnerability information and use various patch repair tools in time to improve system security.
System vulnerabilities are usually exploited by hackers for a long time before they are officially released. This is the usual 0day attack, and such attacks are becoming more common. The vulnerability involves windows operating system files and other application software, but the biggest risk is still the windows system vulnerability. The exploitation of application software vulnerabilities is subject to more environmental constraints, usually with relatively low risks.
The most recent cause of concern is the flash player vulnerability, which can be exploited by an attacker to run arbitrary code.
Solution:
Can use windows update, must use, let windows automatically update. See the icon in the bottom right corner of windows update is working, don't block it.
Some pirated users can't use windows update or microsoft update normally. It is recommended to use third-party vulnerability repair tool.
Point 5: Install anti-virus software, and often check if it works properly, can you update the virus features
The automatic maintenance feature scans the system for updates and cleans up the disk. But many user
Excel is a versatile spreadsheet, it is powerful, easy to operate, in addition to can quickly genera
Almost every computer is equipped with windows system, so we copy, paste, create, move, delete and s
After the unit is out of work, there are often many employees who do not turn off the computer. The
Let invalid programs be re-usable in Win7 to play batch uninstall [group map]
How to start installing Fedora on XP system from hard disk
Vista built-in game for no reason to lose the solution in Windows Vista, just like
Cleverly avoid the Windows XP Messenger Service Dialog Box
What if the XP search function cannot be used?
How do you remove the GRUB boot information?
Windows XP system security coup
Introduce several first aid methods after Windows XP system crashes
Ten Windows FAQs for Windows XP SP2
WinXP disk format conversion high stroke
How to share files in WinXP LAN
Five strokes to solve Windows XP post-operation delay problem [Photos]
Linux system iNode exhausted hard disk can not write files how to do?
Microsoft calls pre-installed win8 operating system
Three operating methods for Win8.1 system to return to the desktop
How to make the Windows8 system desktop automatically switch background
Three ways to upgrade Win7/8.1 to Win10 TH2 official version of graphic tutorial
How to use Jinshan reloading master? Graphic tutorial!
What is the opening of the WinXP system tmp file? How to open tmp file and steps