More and more users are currently using Windows XP. The attack on PCs was an exceptionally easy task because of the large number of security vulnerabilities that developers Microsoft (Microsoft) left on Windows operating systems and browsers. Even if you install Windows XP's latest patch service Pack 2, your PC will still be vulnerable to attack. How can we guarantee the safety of the system? As a user, the necessary security settings can be used to solve the problem, and the use of passwords to protect the system is paramount. Here's how to protect your password in Windows XP, and some ways to use it.
1, how to set a reliable password
How can I set a reliable password? In fact, the Win XP system through the local security settings can be completed. You can open the Local Security Settings window by typing "secpol.msc" in the start → run window and entering a carriage return. Or you can open this setup interface through the control Panel → administrative tools → local security policy. Expand account policy → password policy on the left side of the Local Security Settings window, and a series of password settings in the right pane (Figure 1) can be configured to create a complete password policy that maximizes password protection. When you set up an item, you first enable the password must meet complexity requirements policy, and then set the minimum password age, and finally open the Enforce password history. When set up, reset the administrator's password in Control Panel, where the password is not only secure (no less than 6 bits and contain different categories of characters), and it is not easy to duplicate the password later.
Figure 1
2, password hint can not be ignored
Because of busy work or some other reason, when we forget our password, although we can find the administrator to modify the user's password, but it is very troublesome to do so! In fact, in Windows XP, users are allowed to create a hint so that they can get some clues when they forget their password. Open Control Panel, click or double-click the user account icon (Figure 2), and the next steps need to be based on your system's settings.
Figure 2