Computer Information and Security skills for office staff under Xp

Source: Internet
Author: User

(The following operations apply to the Windows XP operating system currently in use)

I. Security Settings

1. Set the boot password.
Method: click Start → Open Control Panel → double-click User Account → click the account name you want to change in the list → Click Create password → enter your own password, enter your password in the second column to confirm the setting. Then, click "create password" in the lower-right corner of the page. After you restart your computer, you will find that a dialog box asking you to enter a password is displayed before you log on to the desktop. In the Password box, enter the correct password to log on to the system.

Role: it can prevent others from opening their computers without their own permission, and effectively prevent ANONYMOUS hacker intrusion into the system.

2. Screen Protection settings.
Method: Right-click the blank area of the system desktop, and choose "properties"> "Screen Protection" to set the settings.

Purpose: After screen protection is enabled in Windows, the screen protection program is automatically started as long as we leave the computer (or do not operate the computer) for the preset time, when you move the mouse or press the keyboard to return to the normal working status, the system will open a Password confirmation box. Only after you enter the correct password can you return to the system, users who do not know the password will not be able to enter the working status, thus protecting data security.

3. screen lock.
Method: To prevent others from using your computer when the computer is on and temporarily leaves, press Windows + L to lock the computer screen. To return to the system desktop, you only need to click the user name and enter the correct password.

Purpose: quickly lock the computer when the computer is turned on to prevent others from using it.

4. Disable the remote function.

Method: Right-click "my computer"> "properties"> "remote"> remove the hooks in the "Remote Assistance" and "Remote Desktop" boxes.

Purpose: prevent hackers from using the Remote Assistance and remote desktop functions to connect to your computer and control your computer.

5. Disable sharing settings.

Method: Choose Start> Control Panel> Management Tools> Computer Management> shared folder to view all the shared resources on the computer, choose Start> Control Panel> Management Tools> services, and find the Server service to stop it, set "Start type" to "Manual" or "disabled" in "properties ". Note: In this case, other computers cannot print the network.

Role: The Shared Service facilitates hacker intrusion. After being disabled, it can effectively prevent hacker intrusion.

6. Enable automatic update.

Method: on "My Computer", right-click → "properties" → "Auto Update" → select "auto (recommended)" → OK.

Purpose: after Microsoft discovers an operating system vulnerability, it will release a patch to enable this function. On a computer connected to the Internet, it can automatically download and install the patch to effectively prevent hacker intrusion.

7. Open the firewall.

Method: Choose Start> Control Panel> network connection> local connection, and double-click "Local Connection, select "general"> "properties"> "advanced"> "Windows Firewall"> "Settings"> "enable (recommended )".

Purpose: prevent hacker intrusion.

2. Third-party software

1. install anti-virus software and virus firewall. A virus is a harmful computer program that damages the software programs and documentation that we normally use. It is mainly from the network and spread through emails or virus-infected floppy disks, USB flash drives, mobile hard disks, CDs, and other storage media. Computers that do not have a computer that can install an upgradeable antivirus software or a virus firewall are vulnerable to viruses. Currently, commonly used anti-virus software includes Kaspersky, rising star, Kingsoft, Jiangmin, Norton, and PC-cillin (recommended in sequence. Rising firewall is recommended for virus firewalls. USB flash drive and USB cleaner are recommended for virus detection and removal. Rising Kaka is recommended for rogue software cleanup. We recommend that you use the wooden marker to scan and kill Trojans. We recommend that you use Huangshan ierepair experts for various non-French networks. These software can be downloaded and used online.

2. Install software such as Windows optimization master and super magic rabbit to optimize the system settings and clear the online traces, document operation traces and temporary files, error files, and fragment files to reduce the risk of leaks.

3. Encryption or hiding

1. encryption. There are a lot of encryption software. You can download some small software on the Internet to encrypt the folder. Make sure to back up the file before trying it out. You can also use common compression software, such as winram and winzip, to encrypt and Compress folders. For word and Excel files, you can open the file directly, select "Tools"> "options"> "security", enter the open password or change the password for encryption.

2. Hide. You can download software from the Internet to hide disk or disk partitions, folders, and files. A simple method is to right-click a folder or file, select "properties", click the left mouse button in the box before "hide", and press F5 to check the information, is the file missing? To find this file, open "my computer"> "Tools"> "Folder Options"> "View"> select "show all files" under "hide files and hide Folders"> OK.

Iv. Data Backup

According to the relevant provisions of confidentiality, confidential data may not be stored on non-confidential computers, including important documents and official documents for our daily work. These data should be collected and sorted in a timely manner, and copied to a mobile hard disk or burned to a data disc for proper storage.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.