Third, prohibiting the operation of the four places Currently, many of the virus Trojans sneaked into the user's computer will hide their own tracks, thus avoiding the eyes of managers. Here we need to establish a strategy to prevent Trojans from starting from the Recycle Bin, System Volume Information, C:\\WINDOWS\\system folder, C:\\WINDOWS\\system32\\Drivers folder. As follows: ?:\\Recycled\\*.* Not allowed %windir%\\system\\*.* Not allowed %windir%\\system32\\Drivers\\*.* Not allowed?:\\System Volume Information\\*.* No Allowed Note: When using the *.* format, programs other than executable programs, such as txt, jpg, etc., are not blocked. Fourth, prohibit the camouflage process As the virus will change the file name to a name close to the system process, such as: explorer.exe, sp00lsv.exe, etc., its case and O and 0 problems are not recognized by the user, so here The following strategy needs to be established to make it impossible to start. *.pif does not allow sp0olsv.exe to not allow spo0lsv.exe to not allow sp00lsv.exe to not allow svch0st.exe to not allow expl0rer.exe to not allow explorer.com not allowed Note: Some viruses use the pif suffix, ie explorer.pif.pif And exe, com, are executable files, and the default com priority in XP system is higher than exe executable program, its suffix is extremely concealed. If the user cannot see the program suffix when the display file extension is turned on, it can be viewed through WinRAR or a third-party browser. Port Group Policy When the software policy is completed, the user can enter the last level and configure the computer port policy. As everyone knows, setting up a port strategy can greatly prevent intrusion attacks and common ports of Trojan viruses. The setup process is also very simple. It only takes four steps to proceed as follows: Step 1: Open in sequence: Control Panel - Administrative Tools - Local Security Policy - IP Security Policy, in the next step of the wizard, fill in the security policy name - secure communication request, and remove the hook to activate the default corresponding rule, and click to complete the creation of a new IP security policy. The second step, right-click the IP security policy, in the properties dialog box, use the hook on the left side of the Add Wizard to remove it, then click Add to add a new rule, and in the pop-up new rule properties dialog box, click Add, then pop up In the IP Filter List window, remove the hook to the left of the Add Wizard and add a new filter. The third step, enter the filter properties dialog box, select any IP address in the source address, select my IP address as the destination address, click the protocol option, select TCP in the Select Protocol Type drop-down list, and then in the text box below this port Enter “XXXX” (XXXX is the port number to be closed, such as 3389, 139, etc.), and you can confirm the exit. (Note: The detailed shutdown port setting scheme depends on the port list and its own requirements. The port list can be searched by each major search engine.) Step 4, then select the new IP in the new rule properties dialog box. The filter list, after the activation point filter operation option, will be removed using the left side of the Add Wizard, add a block operation, select the block in the security options of the new filter action attribute, and then go back to the new IP security policy attribute. In the dialog box, check the left side of the new IP filter list to confirm. Right-click on the local security policy window to assign the IP security policy you just created.
Next, there are some other installation options that have no special requirements. You can s
Problem DescriptionThe user said that the folder displayed in the CD-ROM drive has
every time you boot, Windows XP must start more than 80 services, and the average user knows little
Recently, WinXP system users found that the hard drive can not be found when installing WinXP system
How much memory does the computer XP system support?
Window xp is a good way to keep your desktop clean and tidy
Playing a new mouse pattern in XP
What should I do if the Windows XP input method is gone?
Unlock WINDOWS XP SP2 10 thread connection limit
Detailed analysis of the nine major problems that led to the failure of the reinstallation system
Process item of troublesome autumn
How to perform the cleanest boot in Windows XP
Windows Network Management Tips
How to delete folders and files under dos
Win7 Explorer stopped working Solution
WinXP system mouse driver problems caused by clicks and no response how to solve?
Explain the cause of the computer shutdown failure and the solution strategy
Watch the European Cup exciting event with Win7 recording to retain the classic
Win8 anytime, anywhere, touch the note application
Windows 2003 system switch machine optimization skills two
Ballmer predicts that 500 million users will use the Win8 system next year
Win8 touch keyboard can not prompt the Lenovo vocabulary how to solve?