Teach you to build a super defensive computer firewall

Source: Internet
Author: User
Tags net firewall

When it comes to the safety of personal Internet access, let's start with a class of problems that you might encounter. The types of intrusions we encounter probably include the following:

(1) Stolen passwords by others;

(2) The system is attacked by Trojan Horse;

(3) The malicious Java Scrpit Program attacks when browsing Web pages;

(4) QQ is attacked or leaked information;

(5) Virus infection;

(6) There are loopholes in the system to enable others to attack themselves.

(7) Malicious attacks by hackers.

Let's take a look at what means to be more effective in guarding against attacks.

1. View local shared resources

Run cmd input net share, if you see an unusual share, it should be closed. But sometimes when you turn off the shares and then appear again the next time you boot up, you should consider whether your machine has been controlled by hackers or infected with the virus.

2. Delete Share (one at a time)

net share admin$ /delete
net share c$ /delete
net share d$ /delete(如果有e,f,……可以继续删除)

3. Delete ipc$ NULL connection

Enter regedit in the registry and find the numeric data in the Hkey-local_machinesystemcurrentcontrosetcontrollsa entry in the RestrictAnonymous from 0 to 1.

4. Close their own 139 ports, IPC and RPC vulnerabilities exist in this

The 139 port is closed by selecting the Internet Protocol (TCP/IP) attribute in local Area Connection in network and dial-up connections, and entering advanced TCP/IP settings, WINS settings, which has "Disable TCP/IP NetBIOS". The 139 port is closed when the check is made.

5. Preventing RPC Vulnerabilities

Open Administrative Tools-services-Find the RPC (Remote Procedure call (RPC) Locator) service-the first failure in recovery, the second failure, and subsequent failures, all set to no action.



Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.