System security is in my hands—computer complete solution (1)

  

Introduction:

With the virtual world booming, today’s virtual property is directly equated with the renminbi, so the QQ account is stolen. Online trading has been accustomed to … … on the other hand, privacy has been stolen, encrypted data has been cracked, and the losses have been heavy. The system is destroyed, and wasting time is tantamount to losing money. The importance of system security is self-evident, and we have all paid a heavy price for it. This article is designed to lead the average user, to easily manage system security and minimize threats. This will be a journey of joy ……

Software involved in this article:

First, system self-filtering

RealPlayer 11 Chinese version of the storm Audio and video intelligent HD version

Second, peek at no door! System Data Encryption

Folder Encryption Super Master WinRAR Official Simplified Chinese Version

III. Strictly Controlling the First Level: Firewall Selection

Rising Personal Firewall Agnitum Outpost Firewall Pro Simplified Chinese version

Fourth, anti-virus software: only suitable

McAfee VirusScan Kaspersky full-featured software 2009

ESET NOD32 security package simplified Chinese version

V. System crashes I am not afraid —— The last big move GHOST

One-click GHOST hard disk version 2008


First, system security & ldquo;Self-filtering&rdquo ;

The system requires a security patch, which is something that entry-level users know. As a Microsoft user, you need to develop a good habit of “every month.” What can't be ignored is that there is still a hidden forgotten killer in the system.

1, update or uninstall the old version /not commonly used software

In the Internet, 0day usually refers to the vulnerability that the outside world has not yet known, and the 0day finder can easily use it Destruction, software developed based on professional technology may exist for 0day, and the underground trading at home and abroad has begun to take shape, and 0day is hard to prevent. With 0day, a series of troubles such as dynamic network attacks, computer control, and data theft can be triggered.

Two well-known players & mdash;— storm video and realplayer have had 0day<fronts>; realplayer's 0day intrusion tool can be easily downloaded in Baidu (Figure 1).
(Figure 1) Dangerous "0day exploit tool" "flooding"

High-risk software:

Multimedia player software, entertainment platform, battle platform software.

Solution:

Useless software, you can consider uninstalling or upgrading the latest version.


2, turn off the system to automatically play

Automatically play the virus can not be defended, usually they have a resurgence, automatic running and updated skills. By default, the default open auto play is the main reason for the rapid spread of such viruses. As long as we turn off this feature, we can effectively prevent it. There are many ways to turn off automatic playback. You can use the software method, such as the 360 ​​security guard's system protection settings, of course, without any software!

Tips: I hope everyone can develop, right mouse button to open the "movable media" habit.

Method:

From XP, run the command from the start menu <;gpedit.msc”, through the left menu bar & ldquo; computer configuration - management template - system & rdquo; inside (such as Figure 2 ) Find the “auto play” item to close it.
(Figure 2)

3, close remote control and network sharing

Turn off remote control and network sharing, is an important means to ensure computer security, both of which are the same as turning off automatic playback. Can be banned by software, here to explain how to turn off remote control.
(图3)

By right-clicking on the “My Computer-System Properties-Remote” page (Figure 3), you can turn off the Remote Assistance, Remote Desktop & rdquo;

4, on the "system restore" function

The outside world is different for the system restore function, but I think it is useful to open the C drive system restore, some system glitch can pass The quick fix for restores has the disadvantage that system restores can be penetrated by viruses.

<;Self-filtering" Overview:

The operating system is a comparison of "weak things", the so-called "system security features" can only be said to be some furnishings And what we can do is just to make it slightly stronger, you can't report too much hope.


Second, peek at no door! System Data Encryption

What should I do if my diary written on my computer is peeked? Encrypted! What Trojans are stealing, who is around you, and who wants to peep at your privacy, let him or her look! Usually, we can achieve this through software encryption.

1, lightning & ldquo; soil encryption & rdquo; method

& ldquo; soil encryption & rdquo; method is to modify the extension of the encrypted object, and hide the file, so as to achieve the purpose of protecting files, data, The feature is simple and easy to learn.
(Figure 4) Modify file extension
(Figure 5) Hide modified file


2. Folder encryption super master —— conventional encryption software< Br>

Folder Encryption Super Master is a powerful encryption software that can satisfy different users through 5 encryption methods. The user is quite simple to operate, just need to "add = "select encrypted object => OK => set password => OK" (Figure 6), then enter the encryption password, it is OK (Figure 7) ( Figure 8)!
(Figure 6) Simple Encryption Process
(Figure 7) Enter Encryption Password
(Figure 8) Encrypted Folder


3. Ignore Encryption Sharp ——WinRAR

That's right, this is the most decompressing software we use in our daily lives ——WinRAR! Why do I strongly recommend WinRAR?

1, WinRAR penetration rate is very high, you do not need to download encryption software.

2, most of the encryption software is shareware, you have to pay to get full functionality, WinRAR free use will not have any impact.

3, security is definitely the strength of WinRAR, security is extremely high!
(Figure 9)

Using WinRAR encryption is very simple, right-click the target file "Add to compressed file => compressed file name and parameter => advanced" (Figure 9), after setting the password can. Today's most sophisticated password cracking tool, its application principle is "excessive algorithm of setting Encrypted File", recognized RAR compression encryption algorithm, security is very high, ZIP compression is relatively poor. For absolute security needs, if you set a complex password, with double-layer compression package encryption, RAR can be seamless, even software developers may not be able to unlock, so please remember your password, not conceited … &hellip ;

Data Encryption Overview:

If your computer does not contain state secrets or privacy photos, then the difference in encryption will be small.


Third, strictly the first level of external control: the choice of firewall

Port is a hacker intrusion system, the only way for Trojans to contact the outside world. Many people advocate the closed port method to block Internet threats. There are a total of 65,535 ports on the computer, "small white", and the number of heads in the head has been dizzy, can you learn to operate? And an excellent firewall can help you manage port problems, hide ports, control the local program to access the Internet, and filter out normal data and harmful data through two-way filtering.

1, system firewall

Suitable users: all users

System firewall is introduced from the post-Windows XP SP2 period, Microsoft is in response to increasingly complex networks Environment and components designed for the user. “System Wall” can set some simple program activity rules and services, and the protection ability is mediocre. The advantage is that there is no problem with the compatibility of the system.

2, Rising Personal Firewall 2008

Suitable users: Users who have certain needs for security

Rising Personal Firewall is the security software produced by Rising Company earlier. One. The feature of Rising Personal Firewall is that the resource consumption is not large. The recognition rate of Chinese software is high, and it does not depend on firewall rules and user self-operation. The protection capability is acceptable. After several years of tempering and tempering, it is a relatively mature firewall software.


(1) Enter the working state immediately after installation (Figure 10)
(Figure 10) Immediately intercept the RTX.EXE online behavior

After installation it can Enter the role immediately and do not need to restart the computer.

(2) Reduce the user's self-identification operation
(Fig. 11) Automatic verification
(Fig. 12) Automatic status setting

Unconsciously (Fig. 11) (Figure 12), Rising Personal Firewall has identified most of the Chinese software and normal programs, thoughtful! It is very suitable for ordinary users who have certain security requirements.



3, Outpost Firewall Pro 2009

Outpost Firewall software is the world's most outstanding, also referred to as the world is no Over! In September 2008, in a new round of firewall testing just announced by Matousec, nearly 40 well-known firewalls were pressed, and the crown was once again crowned. At the level of anti-information leakage, Outpost is already invulnerable.

Matousec detailed test results click here to visit (language friends can choose Chinese version, won the English version)

Outpost suitable network security & nbsp; enthusiasts rdquo;, need Have English ability, otherwise you can't understand the power of the English version, which is not recommended by ordinary users.

Firewall Overview:

When users can gradually realize the importance of firewalls for system security protection, it shows that they have a preliminary understanding of the security protection concept. A good firewall that blocks vulnerabilities from the source, reducing your chances of being compromised.

Often, it is a good idea to choose a system firewall for users with relatively fixed websites. If you play online games or stocks, you can choose the domestic Rising Firewall, Skynet Firewall, and Fengyun Firewall. The performance of foreign firewalls ——Outpost, ZoneAlarm Pro, and Look 'n' Stop is quite strong.

Copyright © Windows knowledge All Rights Reserved