Introduction:
With the virtual world booming, today’s virtual property is directly equated with the renminbi, so the QQ account is stolen. Online trading has been accustomed to … … on the other hand, privacy has been stolen, encrypted data has been cracked, and the losses have been heavy. The system is destroyed, and wasting time is tantamount to losing money. The importance of system security is self-evident, and we have all paid a heavy price for it. This article is designed to lead the average user, to easily manage system security and minimize threats. This will be a journey of joy ……
Software involved in this article:
First, system self-filtering
RealPlayer 11 Chinese version of the storm Audio and video intelligent HD version
Second, peek at no door! System Data Encryption
Folder Encryption Super Master WinRAR Official Simplified Chinese Version
III. Strictly Controlling the First Level: Firewall Selection
Rising Personal Firewall Agnitum Outpost Firewall Pro Simplified Chinese version
Fourth, anti-virus software: only suitable
McAfee VirusScan Kaspersky full-featured software 2009
ESET NOD32 security package simplified Chinese version
V. System crashes I am not afraid —— The last big move GHOST
One-click GHOST hard disk version 2008
First, system security & ldquo;Self-filtering&rdquo ;
The system requires a security patch, which is something that entry-level users know. As a Microsoft user, you need to develop a good habit of “every month.” What can't be ignored is that there is still a hidden forgotten killer in the system.
1, update or uninstall the old version /not commonly used software
In the Internet, 0day usually refers to the vulnerability that the outside world has not yet known, and the 0day finder can easily use it Destruction, software developed based on professional technology may exist for 0day, and the underground trading at home and abroad has begun to take shape, and 0day is hard to prevent. With 0day, a series of troubles such as dynamic network attacks, computer control, and data theft can be triggered.
Two well-known players & mdash;— storm video and realplayer have had 0day<fronts>; realplayer's 0day intrusion tool can be easily downloaded in Baidu (Figure 1).
(Figure 1) Dangerous "0day exploit tool" "flooding"
High-risk software:
Multimedia player software, entertainment platform, battle platform software.
Solution:
Useless software, you can consider uninstalling or upgrading the latest version.
2, turn off the system to automatically play
Automatically play the virus can not be defended, usually they have a resurgence, automatic running and updated skills. By default, the default open auto play is the main reason for the rapid spread of such viruses. As long as we turn off this feature, we can effectively prevent it. There are many ways to turn off automatic playback. You can use the software method, such as the 360 security guard's system protection settings, of course, without any software!
Tips: I hope everyone can develop, right mouse button to open the "movable media" habit.
Method:
From XP, run the command from the start menu <;gpedit.msc”, through the left menu bar & ldquo; computer configuration - management template - system & rdquo; inside (such as Figure 2 ) Find the “auto play” item to close it.
(Figure 2)
3, close remote control and network sharing
Turn off remote control and network sharing, is an important means to ensure computer security, both of which are the same as turning off automatic playback. Can be banned by software, here to explain how to turn off remote control.
(图3)
By right-clicking on the “My Computer-System Properties-Remote” page (Figure 3), you can turn off the Remote Assistance, Remote Desktop & rdquo;
4, on the "system restore" function
The outside world is different for the system restore function, but I think it is useful to open the C drive system restore, some system glitch can pass The quick fix for restores has the disadvantage that system restores can be penetrated by viruses.
<;Self-filtering" Overview:
The operating system is a comparison of "weak things", the so-called "system security features" can only be said to be some furnishings And what we can do is just to make it slightly stronger, you can't report too much hope.
Second, peek at no door! System Data Encryption
What should I do if my diary written on my computer is peeked? Encrypted! What Trojans are stealing, who is around you, and who wants to peep at your privacy, let him or her look! Usually, we can achieve this through software encryption.
1, lightning & ldquo; soil encryption & rdquo; method
& ldquo; soil encryption & rdquo; method is to modify the extension of the encrypted object, and hide the file, so as to achieve the purpose of protecting files, data, The feature is simple and easy to learn.
(Figure 4) Modify file extension
(Figure 5) Hide modified file
2. Folder encryption super master —— conventional encryption software< Br>
Folder Encryption Super Master is a powerful encryption software that can satisfy different users through 5 encryption methods. The user is quite simple to operate, just need to "add = "select encrypted object => OK => set password => OK" (Figure 6), then enter the encryption password, it is OK (Figure 7) ( Figure 8)!
(Figure 6) Simple Encryption Process
(Figure 7) Enter Encryption Password
(Figure 8) Encrypted Folder
3. Ignore Encryption Sharp ——WinRAR
That's right, this is the most decompressing software we use in our daily lives ——WinRAR! Why do I strongly recommend WinRAR?
1, WinRAR penetration rate is very high, you do not need to download encryption software.
2, most of the encryption software is shareware, you have to pay to get full functionality, WinRAR free use will not have any impact.
3, security is definitely the strength of WinRAR, security is extremely high!
(Figure 9)
Using WinRAR encryption is very simple, right-click the target file "Add to compressed file => compressed file name and parameter => advanced" (Figure 9), after setting the password can. Today's most sophisticated password cracking tool, its application principle is "excessive algorithm of setting Encrypted File", recognized RAR compression encryption algorithm, security is very high, ZIP compression is relatively poor. For absolute security needs, if you set a complex password, with double-layer compression package encryption, RAR can be seamless, even software developers may not be able to unlock, so please remember your password, not conceited … &hellip ;
Data Encryption Overview:
If your computer does not contain state secrets or privacy photos, then the difference in encryption will be small.
Third, strictly the first level of external control: the choice of firewall
Port is a hacker intrusion system, the only way for Trojans to contact the outside world. Many people advocate the closed port method to block Internet threats. There are a total of 65,535 ports on the computer, "small white", and the number of heads in the head has been dizzy, can you learn to operate? And an excellent firewall can help you manage port problems, hide ports, control the local program to access the Internet, and filter out normal data and harmful data through two-way filtering.
1, system firewall
Suitable users: all users
System firewall is introduced from the post-Windows XP SP2 period, Microsoft is in response to increasingly complex networks Environment and components designed for the user. “System Wall” can set some simple program activity rules and services, and the protection ability is mediocre. The advantage is that there is no problem with the compatibility of the system.
2, Rising Personal Firewall 2008
Suitable users: Users who have certain needs for security
Rising Personal Firewall is the security software produced by Rising Company earlier. One. The feature of Rising Personal Firewall is that the resource consumption is not large. The recognition rate of Chinese software is high, and it does not depend on firewall rules and user self-operation. The protection capability is acceptable. After several years of tempering and tempering, it is a relatively mature firewall software.
(1) Enter the working state immediately after installation (Figure 10)
(Figure 10) Immediately intercept the RTX.EXE online behavior
After installation it can Enter the role immediately and do not need to restart the computer.
(2) Reduce the user's self-identification operation
(Fig. 11) Automatic verification
(Fig. 12) Automatic status setting
Unconsciously (Fig. 11) (Figure 12), Rising Personal Firewall has identified most of the Chinese software and normal programs, thoughtful! It is very suitable for ordinary users who have certain security requirements.
3, Outpost Firewall Pro 2009
Outpost Firewall software is the world's most outstanding, also referred to as the world is no Over! In September 2008, in a new round of firewall testing just announced by Matousec, nearly 40 well-known firewalls were pressed, and the crown was once again crowned. At the level of anti-information leakage, Outpost is already invulnerable.
Matousec detailed test results click here to visit (language friends can choose Chinese version, won the English version)
Outpost suitable network security & nbsp; enthusiasts rdquo;, need Have English ability, otherwise you can't understand the power of the English version, which is not recommended by ordinary users.
Firewall Overview:
When users can gradually realize the importance of firewalls for system security protection, it shows that they have a preliminary understanding of the security protection concept. A good firewall that blocks vulnerabilities from the source, reducing your chances of being compromised.
Often, it is a good idea to choose a system firewall for users with relatively fixed websites. If you play online games or stocks, you can choose the domestic Rising Firewall, Skynet Firewall, and Fengyun Firewall. The performance of foreign firewalls ——Outpost, ZoneAlarm Pro, and Look 'n' Stop is quite strong.
VII. Auxiliary functions Auxiliary functions include some special functions, which can fulfi
2, quickly modify the file (folder) property each file (folder) has its own properties, can be rou
Starting with Windows 2000, Microsoft introduced the Windows File Protection feature. WFP ru
For Windows XP, because it uses the NT core with high security performance, the system runs fairly s
Windows XP advanced skills and applications one
XP quick start the latest tips (a)
Easily lock Windows XP taskbar with Group Policy
Six Tips for Accelerating Disk Defragmentation
Windows explorer.exe encountered problems need to close the cause analysis and solution
How to install xp installation version under WinPE
The solution is not available after the new XP installation
Teach you how to solve the problem of entering XP system can not respond to failure
How to complete a comprehensive defragmentation in XP
Computer IP Subnet Mask Algorithm
Win7 screen protection settings graphic tutorial
Do you know how several ways WIN7 activation is impossible?
June Win7 browser shuffling: IE11 bucket IE8, Chrome warfox
What are the differences between the three load balancing methods of LVS?
How does win7 set the Wubi input method to the front?
Win10 microphone to strengthen how to close win10 microphone enhanced setting method
Microsoft's new trademark Windows 365 exposure, Win10 or annual fee
Win10 Anniversary Update Cumulative Update KB3201845 Patch Update Content Daquan
What should I do if the third-party player installed in win10 always shows color distortion?