Computer security, efficiency and benefits (Part)

Source: Internet
Author: User

Basic Policy

For example, disable unnecessary system services, such:

Alerter
ClipBook Server
Computer Browser
DHCP Client
Directory Replicator
FTP Publishing Service
License Logging Service
Messenger
Netlogon
Network DDE
Network DDE DSDM
Network Monitor
Remote Access Server
Remote Procedure Call (RPC) locater
Remote Registry server
RunAs Service
Schedule
Server
Spooler
Telephony
Telephone Service
Terminal Service
Telnet
TCP/IP NetBIOS Helper

Others:

Wireless Network security issues. Wireless Networks are mainly engaged in WEP, WPA/wpa2 and other encryption and authentication methods. Among them, WEP is a public key and is not secure. We recommend that you use WPA or wpa2. The password should be as complex as possible.

Data encryption. The encryption provided by office is not reliable. It not only can be cracked, but can also be directly removed, which is almost useless. For file encryption, in addition to professional Cryptographic software, Windows comes with EFS encryption, which is also safe and easy to use based on administrator authentication. (The hard disk must be in NTFS format. You must save the certificate. Otherwise, you cannot enable it after reinstalling the system, and decryption is almost impossible !)

Delete and restore data. Simple deletion or formatting of data is useless and can be completely restored. If you want to completely delete (or format) the data on the hard disk and then fill it with useless data (absolutely full), the hard disk can only recover the last written data.

Computer security, efficiency and Benefits

360 software and cloud software. 360 security guard and 360 anti-virus software, not only because they are free, but because their performance basically meets the requirements; and because they are free, this prevents the software from being ineffective due to problems that may occur during software update and activation. Cloud software is a virtual system that can install all the required but not long-used software in the cloud system. It can be used normally after being activated when necessary, without occupying system resources. Don't know. The cloud is a bit amazing!

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.