Many users connect to the Internet through the LAN. It may be the case that you don't have any files running, but the hard drive light suddenly flashes. This may be that other people are accessing your computer. Sharing files, who is accessing your computer, how can you enhance the security of system shared resources? Let's take Windows XP as an example to introduce several ways to enhance the security of Windows XP shared resources. Use XP's "Computer Management" tool to find "scarelers"
In Windows XP, Network Monitor no longer monitors access to the machine, but can use "Computer Management" for monitoring. Click Start Settings Settings Control Panel, double-click Administrative Tools, double-click Computer Management, expand Shared Folders, and there are three options: Share, Session, and Open File", as shown in Figure 1. "Share" can display the shared resources of the current system, where you can create and set the share and its permissions; "session" displays the current visitor's user name, IP address, number of open files, and visit time, etc. Right click, you can also disconnect the malicious visitor; "Open File" shows all visitors and their open files, if you do not want the other party to browse your file, right click, you can close it in the pop-up menu One or all open files. Through the above methods, you can quickly see who is stealing your secrets and quickly take measures to deal with them. Modify Group Policy to specify specific user access
Since our shared resources are accessible to all users by default, this increases the potential danger. In fact, we can modify Group Policy to specify specific users to have access. Share resource. The specific operations are as follows: Step 1: Click “Start” “Run”, enter “gpedit.msc” in the “Run” box to open the group policy setting interface. Step 2: Click "Computer Configuration", "Windows Settings", "Security Settings", "Local Policies", "User Rights Assignment", and find the "Access this computer from the network" item in the right window, as shown in Figure 2. Step 3: Double-click “Access this computer from the network”. In the pop-up window, click “Add User or Group” to add users who can access your shared resources. Of course, you can also click the “Delete” button to delete users you don’t trust. . This way, you can set up only specific users to access your shared resources, as shown in Figure 3. Prevent illegal users from accessing shared resources
Step 1: Open the Group Policy Settings window using the above method, and then open "Computer Configuration" "Windows Settings" "Security Settings" "Local Policies" "Security Options" in the right window Find the "Device: Only users who log in locally can access the CD-ROM" item, as shown in Figure 4. Step 2: Double-click the item, select “Enabled” from the pop-up window, and then click “OK”, so other users in the LAN cannot access your CD-ROM drive, as shown in Figure 5. Step 3: Using the same method, you can also enable the “Device: Only local users can access the floppy disk” and other options, the specific operation method is not specifically introduced. After several methods, we don't need any third-party tool software. Our shared files are safer, so protect your shared resources.