Microsoft's next-generation operating system vista has been launched for some time, but due to several reasons such as the update of the user hardware system and the compatibility of the software with the Vista system, most users are still A system that uses Windows XP extensively. Therefore, it is necessary to revisit the old words. In this article, I will talk about some aspects of Windows XP's operation strategy, so that there are as few attacks as possible from viruses and hackers.
1. Block unwanted service components
Although the more service components are installed, the more service features users can enjoy. However, the service components that users usually use are still limited, and those components that are rarely used not only take up a lot of system resources, but also cause system instability. It also provides multiple ways for hackers to remotely invade. Therefore, we should try to shield those service components that are not needed. The specific operation method is as follows: first find the “Services and Applications” icon in the control panel, and then open the “Services” dialog box, select the program to be shielded in the dialog box, and click the right mouse button. From the shortcut menu that pops up, select the “property”/“stop” command, and set the “startup type" to “manual" or "disabled", so that it can be specified The service component is blocked.
2, timely use Windows Update to update the system
Windows Update as an important component of Microsoft's protection system security and improve Windows performance, has now entered its V6 version. Through it, we can not only get the component service pack (such as the current popular Windows XP Service Pack 2) that can improve the system function and performance, but also get the latest security vulnerability patch, of course, you can also get the latest hardware driver. The latest and most popular viruses, trojans, worms, etc. usually take advantage of the latest vulnerabilities in the operating system. If the latest patches are upgraded before it is attacked on a large scale, the chances of a computer being attacked will be greatly reduced. .
3, encrypt important information
In order to prevent others from using their own computers, peek at the information stored in the computer, Windows XP specifically for our ordinary users “File and Folder Encryption" function, which allows us to encrypt important information stored on the computer so that other users cannot access the contents of the file or folder without a password. When encrypting a file, we first open the Windows XP Explorer, then find the file or folder that needs to be encrypted in the Explorer window, then right-click on the selected file or folder and pop it up. In the shortcut menu, select the “Properties” command, and then Windows XP will pop up the file encryption dialog box, click the “General” tab in the dialog box, and then select “ldquo;Advanced” to encrypt the content. Protect data & rdquo; just fine.
4, Lock your computer
If you need to leave your computer for a short while in the process of using your computer, many people will often take the lead if they are worried that their computer will be occupied by others. Shut down, then leave, then come back and turn it on again, but it is not good for the computer to switch the machine frequently. So, is there a way we can do it without shutting down and preventing others from using our own computer? The method is of course, you can quickly lock the keyboard and display by double-clicking the desktop shortcut without using CTRL+ALT+DEL Key combination or screen saver.
When locking your computer, you can follow the steps below: Right-click on the Windows XP desktop, then select New/Shortcut in the context menu, and then follow the on-screen prompts. In the command line text box, enter rundll32.exe user32.dll, LockWorkStation command characters, and then enter the specific name of the corresponding shortcut in the subsequent wizard window, here for the convenience of later calls, you can directly take the shortcut It's ok to lock the computer. In the future, you can achieve the purpose of locking by simply double-clicking "Lock Computer" on the desktop. Or you can directly press the “windows key + L & rdquo; shortcut to lock the computer.
5, use “ connection firewall & rdquo; function
In the network era, the virus's mode of transmission, speed of transmission and destructive power have changed dramatically, and hacking is also worldwide In-house activities. In order to prevent random invasion of viruses and hackers, many users have installed firewalls on their own computers. Windows XP has added the "Internet Connection Firewall" function. With this function, Windows XP can dynamically filter all the information coming in and out of the system, allowing the system to agree to access people and data into their internal network, and at the same time Unallowed users and data are blocked, maximally preventing hackers on the network from accessing their own networks, preventing them from changing, moving, or even deleting important information on the network. When using the “Connect to Firewall” function, you can click the “Settings” button in the Start menu, select the “Network Connections” menu item, and then select the dial-up connection you need to access from the pop-up window, then use Right-click the connection icon and select the “Properties” command. In the Dialing Properties window that pops up, click the Advanced tab and select the “Internet Connection Firewall” option in the corresponding tab page. Click the “Settings” button of the corresponding firewall to set the firewall according to your requirements, so that the firewall can work more efficiently.
6, install third-party anti-virus programs, firewall programs and Internet security programs
It turns out that the "Internet Connection Firewall" feature has a very limited function, first of all it does not have The function of anti-virus and anti-virus, followed by the protection of firewall technology is very limited, the effect is minimal. It is necessary for users to add a third-party firewall program based on the "Internet Connection Firewall". The choice of firewall software, first of all depends on the actual protection effect, can effectively and timely promptly ask questions when the program accesses the outside world, and can effectively shield and filter data when subjected to various types of attacks from the outside world. Package, Rising Firewall has added the technology of “Tracking Location” to monitor the attack and actively track its location in real time. Anti-virus programs must be installed. The efficiency of anti-virus is a problem worth considering. In addition, real-time anti-virus effects should be paid more attention. In terms of protection, Rising anti-virus software monitoring is quite comprehensive, and the monitoring of the registry is most effective in preventing malicious programs, Trojans, etc. from being implanted into the computer without the user's knowledge.
7, assigning administrative privileges to yourself
Many programs installed in the Windows XP operating system require users to have certain administrative privileges in order to allow users to use the program, so in order to be able to use the program We sometimes need to temporarily assign an administrative right to access the program. When assigning administrative rights, we can log in to the Windows XP system as a normal user, then right-click the program installation file, and hold down the Shift key on the keyboard, click the running mode from the shortcut menu that appears, and finally Enter the username and password with the appropriate administrative privileges in the pop-up window.
Symptom: When you start the system interface, you cant open anything. It takes about a minute to ope
According to foreign media reports, Microsoft today released the eighth edition of the Security Inte
1. Manually recover lost dual boot menus Copy the following 3 from the I386 directory to your C dri
Method One Many computers have flip shortcuts: “ctrl”+“alt”+“←&
XP system hidden desktop icon trick method
What does Appdata mean, what files can be deleted by appdata?
Windows XP shutdown and automatic restart solution
Disabled settings for folder options under Windows XP
Cleverly crack the Windows XP login password method
Ways to make Windows XP run faster and more stable
Let the virtual drive work more stable under XP
Virtual machine Linux file sharing under Windows XP
WinXP SP2 comes with a firewall settings Detailed
Two strokes to achieve automatic restart of WindowsXP system
Win8 platform remote desktop and connection client
Win8.1 is exposed limited or unable to connect to WiFi failure
How to turn off the system icon of the notification bar in Windows 10
Qq news information window is always pop up very bad? Qq News Popup Close Tutorial
System security: solve the problem of improving sshd service security
Win7 system boot appears Recovery English can not start how to do
How to change the location of Win 2000 favorites
Microsoft Office 365 is still the most popular corporate office application
What should I do if the Win10 KB3081424 patch fails to be installed?