Security optimization for Windows 7 systems full Raiders

Source: Internet
Author: User

Close default shared lockdown system back door

Like XP and Vista, Win7 also opens the network share by default. While this can make LAN sharing more convenient, it also creates conditions for the spread of the virus. Therefore, turning off the default sharing can greatly reduce the probability of the system being infected with the virus.

Open the Rubik's Cube, click "System optimization → network sharing", the "prohibit the default administrative sharing and disk partition sharing" Check, click "Save Settings" Restart the computer, at this time can not access the system by default sharing. If you do not want to turn off all default shares at once, the Rubik's Cube also provides the ability to turn off a single default share. In the previous interface, select the "Default sharing" point "refresh", you can see the current system's default share list, the unwanted default share selected after the "Clear sharing", Save settings restart the computer, the selected default share will be closed.

In addition, the Rubik's Cube also provides "limited ipc$ remote default sharing", "Prohibit interprocess communication ipc$ null connection" and so can effectively enhance the system security settings, recommended all enabled.

Modify Group Policy Consolidation system registry

As with XP and Vista, Windows7 is still open to the most risky path to remote access to the registry. Setting the remote access registry path to NULL can effectively prevent hackers from using the scanner to read Win7 system information and other information through the remote registry.

Open Control Panel, select Administrative Tools, and double-click Local Security policy. Turn on local policy → security options, turn to "network access: Remotely accessible registry paths" and "Network access: Remotely accessible registry paths and sub paths" on the right, double-click to open, and delete the registry path in the window.

Lock down important features to prevent virus theft

Some of the commonly used, higher-power functions, such as command-line programs, batch files, Registry Editor, etc. are often used by viruses and other malicious software, become the "accomplice" of the intrusion system. And these programs as ordinary users are not often used, so disabling these functions can effectively strengthen the system to protect the day-to-day application of security.

Open the Rubik's Cube, select "Security optimization → system security Settings", we recommend that the "Disable Management Console (MMC) plug-in", "Prohibit the execution of Autoexec.bat files", "Prohibit the use of registry edit", "Prohibit import." Reg registry files, disable command-line programs, and batch files, and then restart the computer after you save the settings, to complete the setup.

Disable automatic operation to prevent virus from spreading

In addition to the network, flash memory and mobile storage devices such as the hard drive is also an important way to spread malicious programs. When the system turns on AutoPlay or autorun, a malicious program in a mobile storage device can infect the system without the user being aware of it. So disable automatic playback and automatic running function, can effectively break the spread of the virus path.

Turn off automatic playback: In Run, enter Gpedit.msc to open Group Policy manager, turn on the computer configuration → administrative Templates →windows components → AutoPlay policy, double-click turn off AutoPlay, click Enabled, select all drives in the option, and then click OK , the AutoPlay feature is turned off.

Turn off Autorun: Double-click "Default behavior automatically" at the same location, select enabled, select "Do not perform any Autorun commands" in the option, and then click OK to have the Autorun feature turned off.

Restricting system functionality to ensure system security

If the computer is placed in the public environment such as dormitory and company, it is very important to restrict the important system function to avoid the system malfunction caused by others ' operation.

We can pass the Rubik's Cube, in the "system settings → taskbar and notification area", "system settings → Start menu," Security optimization → system security Settings "," Security optimization → control Panel "and other modules for further settings, such as disabling Control Panel, disabling administrative Tools, disable the taskbar right-click menu, and so on. These functions are not only simple but also effective, you can choose to use the specific use of the environment targeted.

Purge history to protect personal privacy

A major feature of the Win7 flagship is the ability to record the user's action history in multiple locations, such as the Start menu, taskbar, explorer Search bar, and so on. Although convenient, it can sometimes lead to personal privacy leakage.

It is easier to turn off the history feature in the Start menu and taskbar. Right-click on the taskbar, select "Properties" in the pop-up menu, and then cancel both of the "Start menu → privacy" item.

However, the history in the Explorer search bar must be cleared by using Group Policy. In run, enter Gpedit.msc to open the Group Policy manager, turn on user Configuration → Administrative Templates →windows component →windows Explorer, double-click the display of recent search entries in the Windows Explorer search box, and select Enabled. Close Group Policy when determined. This is not only the original history of the record is not, in the future will not record our operations here.

After a series of optimizations, our Win7 system is already very secure. But here also remind you to form good computer habits, timely installation of system patches and update anti-virus software virus library, do not log on to unknown sites, do not use pirated software, only in this way to make Win7 furthest away from security threats and maintain a good running state. This is why the same installation of antivirus software, some people are all right some people are often poisoned, because a good sense of security and habit is to ensure the final core system security, at this point system optimization and system security no difference!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.