Comments: With the rapid development of the network, the most popular topic now is network security. In the information age, almost everyone is facing security threats. It is necessary to have a certain understanding of network security and be able to deal with security issues. Those who do not pay attention to security at ordinary times, I often regret it when I pay a heavy price. Next I will introduce several topics that protect lan network security with the rapid development of the network. Now the most popular topic is network security. In the information age, almost everyone is facing security threats. It is necessary to have a certain understanding of network security and be able to deal with security issues. Those who do not pay attention to security at ordinary times, I often regret it when I pay a heavy price. Below I will introduce several security defense techniques for Protecting Shared Resources in the LAN, hoping to help you.
In a LAN, sometimes in order to share some resources, you can create a sharing name for the resources that need to be shared. Then, users who need to use the shared resources can use the network neighbor function in the LAN, to access shared resources. Although sharing can bring us operational convenience, it is undeniable that it also brings us security threats. Some illegal users can use the sharing function to delete, modify, or damage resources on other computers in the LAN. To protect the security of shared resources, we can set the shared password in the Windows Shared level system, and set the access type of shared folders to "read-only" or "completely ", to ensure its security. For example, to securely share a folder containing important information, you can set password protection for the folder, set access permissions, and only tell the specific user the password.
Even if we set an access password for the shared resource, every user in the LAN can still see the shared resource in "Network neighbors". Today, hackers are rampant, these access passwords are just useless in front of senior hackers, so we should never think that it is safe to set the password.
So what measures should we take to ensure relative security?
Hide Shared Folders
Shared Folders and passwords are not omnipotent. If you cannot see your shared folders from your network peers, they will be much safer. The method is as follows: Right-click the folder and select the share option, type the Share Name, add the dollar sign "$" to the end, and enter the password. Enter "computer name (or IP address) Shared File $" in the address bar, press enter, and enter the password to enter the folder.
Hide shared file flag
After the above method is hidden, you can also see the sharing icon (a small hand holding a folder). The following describes how to use the shared D disk as an example: First, you can use the primary hiding method to set the D disk as a hidden share, open the Registry Editor and choose "HKEY_LOCAL_MACHINE/SoftWare/Microsoft/Windows/CurrentVersion NetworkLanMand $" (you can also use the registry search function to directly find the primary key "d $ "), change the key value of the DWORD Value "Flags" from "192" to "302", and restart Windows to take effect. You only need to enter "computer name d $" in the address bar. At this time, even if the local resource browser does not see the D disk is shared.
Fake IP addresses cheat "hackers"
You can also change the computer name in the LAN to a false IP address to cheat the novice hacker. The procedure is as follows: in Windows 2000/XP, select "properties" for "My Computer" and select the "computer name" tab in "System Properties, change the content in the text box after "computer description" to an IP address, and click [apply].
After the preceding steps, it is safer to share files on the LAN. However, security is always relative. Proper prevention means to ensure the foundation of security.