As computers become more and more in the lives and work of ordinary users, problems that only professionals can encounter, such as configuring small (home) networks, are now common to ordinary users. The Windows family of operating systems has always been known for its ease of use, trying to make complex tasks a simple operation. But sometimes, ease of use and security are conflicting. At the same time, because of the widespread use of the network, each Internet-connected PC is actually an Internet node, so security is a concern that every user must pay attention to. XP is the easiest operating system for Windows, and many of the default settings used to improve ease of use pose a security risk.
First, simple file sharing.
In order to allow users on the network to share files with just a few clicks of the mouse, XP has added a feature called "simple file sharing", but it also opens up many NetBIOS vulnerabilities. To turn off the simple file sharing function, open "My Computer", select the menu "Tools" → "Folder Options", click "View", and cancel "Use Simple File Sharing (Recommended)" in "Advanced Settings".
Second, FAT32.
Many new hard drives are formatted as FAT32 for new machines. To improve security, you can convert the FAT32 file system to NTFS. NTFS allows for more comprehensive and fine-grained control over the permissions of files and folders. It can also use Encrypting File System (EFS) to ensure that data is not stolen from the file partition level. You can view the current file system of the drive by right-clicking on the drive in "My Computer" and selecting "Properties". If you want to convert the file system to NTFS, first backup the important files, select the menu "Start" → "Run", enter cmd, click "OK". Then, in the command line window, execute convert x: /fs:ntfs (where x is the drive letter of the drive).
Third, the Guest account.
A Guest account is a so-called guest account that can access a computer but is restricted. Unfortunately, Guest has also opened the door for hacking. If you do not need to use the Guest account, it is best to disable it. In Win XP Pro, open "Control Panel" → "Administrative Tools" and click "Computer Management". In the list on the left, find "Local Users and Groups" and click on "Users". In the right pane, double-click the Guest account and select "Account is disabled." WinXP Home does not allow you to disable the Guest account, but allows you to set a password for the Guest account: first execute the Net user guest password command in the command line environment, then go to the Control Panel, User Settings, and set the password for the Guest account.
Fourth, the Administrator account.
One of the common ways to hack is to try to get the password for the Administrator account. At least one account per computer must have Administrator privileges, but not necessarily the name "Administrator". So, whether in XP Home or Pro, it's best to create another account with full privileges and then deactivate the Administrator account. Also, in WinXP Home, modify the default owner account name. Finally, don't forget to set a sufficiently complex password for all your accounts.
Five, exchange files.
Even if your operation is completely normal, Windows will leak important confidential data (including passwords). Maybe you will never think of looking at these leaked confidential documents, but hackers will definitely. The first thing you need to do is to ask the machine to clear the system's page file (swap file) when it is shut down. Click on the Windows Start menu, select Run, and execute Regedit. Find KEY_local_machinesystemcurrentcontrolsetcontrolsessionmanagermemory management in the registry, then create or modify ClearPageFileAtShutdown and set the DWORD value to 1.
Six, dump files.
When the system encounters a serious problem, it will save the data in the memory to the dump file. The role of the dump file is to help people analyze the problems encountered by the system, but it is not useful to the average user; on the other hand, like swap files, the dump file may leak a lot of sensitive data. The procedure for prohibiting Windows from creating a dump file is as follows: Open "Control Panel" → "System", find "Advanced", and then click the "Settings" button under "Startup and Recovery" to write the "Write Debugging Information" column. Set to "(None)". Similar to dump files, Dr. Watson also saves debugging information when an application error occurs. The procedure to disable Dr. Watson is to find HKEY_local_machinesoftwareMicrosoftWindowsNTCurrentVersionAeDebug in the registry and change the Auto value to "0". Then open Documents and SettingsAll UsersShared DocumentsDrWatson in Windows Explorer and delete the two files User.dmp and Drwtsn32.log.
Seven, redundant services.
For the convenience of users, WinXP launches many services that are not necessarily used by default, and also opens the back door of the intrusion system. If you don't need these services, it's best to turn them off: NetMeeting Remote Desktop Sharing, Remote Desktop Help Session Manager, Remote Registry, Routing and Remote Access, SSDP Discovery Service, telnet, Universal Plug and Play Device Host. Open "Control Panel" → "Administrative Tools" → "Services" to see the description and running status of these services. To close a service, simply right-click on the service name and select the "Properties" menu. In the "General" tab, change the "Startup Type" to "Manual" and click the "Stop" button.
Word is an office software that we often use. Many functions are familiar to everyone. The use of te
Today, Linux has not only made great progress in the application of the server field, but also more
Now, whether it is an old user or a new user, you will choose to install the Windows XP operating sy
Sometimes when we use WinXP system, some unintentional mistakes will cause the control panel to be u
Why can't I install Windows XP in DOS mode
Briefly analyze the importance of hardware collocation
Windows XP SP2 configuration and troubleshooting tips revealed
Win XP automatic batch file clearing machine dog virus
The use of Windows system Regsvr32 command
XP daily application skills and experience summary (3)
Win7 video playback no sound solution
Looking for a lost Windows XP firewall
Graphic details: xp system font installation encountered those things
How does the XP system set the font size of a web page?
"Library" Frequently Asked Questions in Windows 8 System
Win10 double click on the program will appear how to do the card
What is the built-in version of Internet Explorer for Windows 7?
How does Win8 open Windows To Go function?
How does the Win10 system re-open the notification center and suddenly found that there is no
I can't find the Internet Explorer 10 icon on the Start screen
Computer_windows7 System How to create a broadband connection
Microsoft says it is testing Win10 Mobile 10537: Fixing most issues