How do ADSL users perform computer protection?

Source: Internet
Author: User

ADSLWhether the security of users' computer data can cause real threats to the user is during the Internet access period. Because after the user's computer accesses the InternetHackerIntrusion makes it difficult to guarantee data security. Specifically, hackers mainly use the followingVulnerabilitiesSnoop on computer data:

1. Sharing vulnerabilities:

As we all know, both Windows XP and Windows 2000 operating systems will enable disk sharing. It is undeniable that after I open my computer, I cannot see disk sharing. However, in the sharing management, we can clearly see that each hard disk partition on the computer has enabled sharing for the Administrator user. It is hard to imagine that, once the computer is connected to the Internet, the existence of disk partition sharing will undoubtedly become a loophole in the leakage of computer data of ADSL users.

Highly risky disk sharing Vulnerability

The even more fatal problem is that many ADSL users' Administrator users do not have a password, which is equivalent to opening the door for hackers to access computer data, A hacker with a little knowledge can steal data from ADSL users' computers.

2. Private Data is not encrypted:

In addition to the sharing vulnerability, the user's privacy data is not encrypted and has become another channel for ADSL user computer data leakage. There is no sharing vulnerability. As long as hackers can intrude into the computers of ADSL users, hackers will have the power to kill all the files on the hardware. If the data is not encrypted, hackers can view all files on the ADSL user's computer at will. Data Encryption is not performed on private data, which is also a cause of data leakage on ADSL users' computers.

3. Incomplete file deletion:

Many users usually delete files in the operating system. In today's increasingly developed Hard Disk Recovery Technologies, the user's hard disk is formatted, and the data before hard disk formatting can still be viewed through data recovery software. Imagine that once a hacker controls the ADSL user's computer and the file deletion is incomplete, isn't it a channel for ADSL user privacy leakage?

Layer-by-layer protection to ensure data leakage of ADSL user computers

From the above description, it is not difficult to know that in order to protect the data security of ADSL users' computers, in addition to preventing hacker intrusion, it is more important to block sharing vulnerabilities and correctly Delete useless files.

1. Multiple parties block sharing Vulnerabilities

To block the default sharing vulnerabilities in Microsoft's operating system, you need to start from multiple parties, because the sharing of operating systems involves multiple operating system settings. To disable the sharing vulnerability, take the following steps:

① Disable the Server Service: Enter "Services. msc" in "run" in the "Start" menu to enter the "service" configuration option, find the "Server" service, and select disable.

Disable Server Service

② Set the Super User Password: Because the sharing vulnerability must be enabled Based on the Super User permission, after the "Server" service is disabled, you also need to set a password for the Super User. Many ADSL users have multiple superusers on their computers and must set a password for each Super User.

③ Disable the sharing service of Application Software: in addition to sharing vulnerabilities in the operating system, application software such as MSN and QQ also have file sharing services, and users also need to disable them one by one. Currently, the file sharing service for Windows Live Messenger is the "Messenger shared folder USN magazine Reader Service ". You can disable the "service" configuration option.

It is not hard to see that the file sharing vulnerability in the ADSL user's computer is caused by multiple reasons. If a single service is disabled, the sharing vulnerability cannot be blocked.

2. encrypt important files

We recommend that you encrypt some important data in your ADSL computers so that even if the data is stolen by hackers, it is difficult to obtain the file content within a short period of time. In fact, there are many ways to encrypt hard disk data. The Windows XP operating system also has the built-in file encryption function. We recommend that you use the encryption function in the Winrar compression software to encrypt the files to be encrypted.

Encrypted volume Compression

The specific method is as follows. Select the folder to be encrypted and select the "add to compressed file" menu. An interface is displayed. In the "advanced" option, we can set a password to open the compressed file. In addition, you can select to compress the sub-volumes and save some of the files to a USB flash drive or a CD. If a sub-volume file is missing, you cannot decompress the package. In this way, the key files are protected by encryption and volume compression.

3. Permanently delete files from the hard disk

As described in the previous article, you can format the hard disk and restore the data before formatting the hard disk through the data recovery software. It is hard to imagine that once a hacker controls a user's computer and uses restoration software, all the content on the hard disk is exposed, and there is no privacy for ADSL users. In this case, when you delete a hard disk file or format the hard disk, it is best to delete the important files completely. The so-called "complete deletion" means that the data recovery software cannot be restored to its original state.

Currently, the popular data deletion software is "file shredder ". The "Rising antivirus software" is integrated with the "file shredder" software. When you smash a file, you must enable the option "stop the file from being generated again" to delete the files on the hard disk. In addition to the "file shredder", there are also some third-party deletion software that is also relatively easy to use. ADSL users can choose a suitable software based on their actual situation.

Summary

Without passwords, ADSL users' computers often store mobile phone numbers and address books on their computers. As we do not know, once a computer is connected to the Internet, all the data on the hard disk may be exposed to the Internet. To this end, ADSL users must provide defense layer by layer to ensure the security of computer data.

Edit recommendations]

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.