Ten ways for ADSL internet users to defend against hacker attacks

Source: Internet
Author: User
Tags administrator password strong password
At present, the use of ADSL users more and more, because ADSL users online long, fast, so hackers are targeted. Now there are a variety of more and more detailed "IP address library", to know some ADSL users of the IP is very easy things. How to defend your network security. Consider the following methods. One, remove folder hidden shareIf you use the Windows 2000/xp system, right click on C or other disk, choose "Share", you will be surprised to find that it has been set to "Share this folder", and in the "Network Neighborhood" is not see this content, this is what. Originally, by default, Windows 2000/xp opens hidden shares for all partitions, and you can see a "$" appended to each partition name on the hard disk by selecting System Tools/Shared Folders/shares under the Control Panel/Administrative Tools/Computer Management window.   But as long as typing "//Computer name or ip/c$", the system will ask the user name and password, unfortunately, most of the personal user system Administrator password is empty, intruders can easily see the content of C disk, which brings great potential for network security. How to eliminate default sharing. The method is simple, open Registry Editor, and enter the "Hkey_local_machine/system/currentcontrolset/sevices
/lanmanworkstation/parameters, create a new two-byte value named "AutoShareWks" and set its value to "0" and restart the computer so that the share is canceled. second, the rejection of malicious codeMalicious Web pages have become one of the biggest threats to broadband. Before using the Modem, because the speed of opening the Web page is slow, before completely open the malicious Web page and avoid the possibility of the recruit.   Broadband is now so fast that it can easily be attacked by malicious Web pages. Common malicious Web pages are because of the addition of malicious code written to be destructive. These malicious code is equivalent to some small program, as long as the page is opened to be run.   So to avoid malicious Web page attacks as long as the prohibition of these malicious code to run it. Run IE Browser, click "Tools/internet Options/Security/Custom Level", the security level is defined as "security level-high", for "ActiveX controls and Plug-ins," the 2nd and 3 items are set to disabled, other items are set to "prompt , then click OK. This setting, when you use IE to browse the Web page, you can effectively avoid malicious Web page malicious code attacks. third, to seal the dead hacker's " Back Door "   As the saying goes, "smoke", since hackers can enter, that means that the system must exist for them to open the "back door", as long as the door to block the backdoor, so that hackers have nowhere to go, there will be no worries. 1. Delete unnecessary protocols for servers and hosts, it is usually sufficient to install only the TCP/IP protocol. Right-click Network Neighborhood, select Properties, right-click Local Area Connection, select Properties, and uninstall unnecessary protocols. Among them, NetBIOS is a source of many security flaws, and for hosts that do not need to provide file and print sharing, it is possible to turn off the bindings in the TCP/IP protocol NetBIOS to avoid attacks against NetBIOS.    Select TCP/IP protocol/Properties/advanced to go to the Advanced TCP/IP Settings dialog box, select the WINS tab, and uncheck "Disable NetBIOS on TCP/IP" to turn off NetBIOS. 2. Turning off file and print sharing files and print sharing should be a useful feature, but it is also a good security breach for hackers when it is not needed. So without the need for "file and print sharing," we can turn it off.   Right-click Network Neighborhood, select Properties, and then click the File and Print Sharing button to remove the hooks from the two check boxes in the File and Print Sharing dialog box that pops up. Although file and print sharing is turned off, it is not guaranteed to be secure, and the registry is modified to prevent people from changing file and print sharing. Open Registry Editor, select the "Hkey_current_user/software/microsoft/windows/currentversion/policies/network" primary key, and under that primary key, create a new DWORD type key value. The key value is named "Nofilesharingcontrol" and the key value is set to "1" to prevent this feature from being changed for "File and print sharing," and the key value "0" indicates that this feature is allowed.    This removes file and print sharing from the Properties dialog box in Network Neighborhood. 3. The Guest account is disabled a lot of intrusion is through this account to further obtain the administrator password or permissions. If you don't want to give your computer to others as a toy, it's a good ban. Open Control Panel, double-click Users and Passwords, click the Advanced tab, and then click the Advanced button to eject theThe user and group Windows. Right-click on the Guest account, select Properties, and choose "Account deactivated" on the "General" page.    In addition, renaming the administrator account can prevent hackers from knowing their administrator account, which will largely guarantee computer security. 4. Prohibit the establishment of a null connection by default, any user can connect to the server via a null connection, enumerate the accounts and guess the password. Therefore, we must prohibit the establishment of an empty connection. There are two methods: the first is to modify the registry: Open the Registry "Hkey_local_machine/system/currentcontrolset/control/lsa", the DWORD value "RestrictAnonymous"   Change the key value to "1".   Finally, we recommend that you put a patch on your system, Microsoft's endless patches are very useful. Four, hide IP AddressHackers often use some network detection technology to view our host information, the main purpose is to get the IP address of the host in the network. IP address is a very important concept in network security, if the attacker knows your IP address, is equal to the target for his attack, he can launch a variety of attacks on this IP, such as DoS (denial of service) attacks, Floop overflow attacks.   The primary way to hide an IP address is to use a proxy server. Compared with direct connection to the Internet, the use of Proxy server can protect the IP address of Internet users, thus ensuring the security of the Internet. The principle of a proxy server is to set up a "staging point" between the client (the computer on the Internet) and the remote server (such as the user wants to access the remote WWW server), and when the client requests a service from the remote server, the proxy server intercepts the user's request, and the proxy server forwards the This enables the connection between the client and the remote server. Obviously, after using a proxy server, other users can only detect the IP address of the proxy server instead of the user's IP address, which realizes the purpose of hiding the user's IP address, and protects the user's Internet security. There are a lot of websites that provide free proxy servers, and you can find them by using tools such as proxy hunters. v. Close unnecessary portsHackers often scan your computer port at the time of intrusion, and if you have a port monitor installed (such as Netwatch), the monitor will have warning prompts. If this intrusion is encountered, the available tool software shuts down ports that are not in use, for example, using "Norton Internet security" to turn off the 80 and 443 ports used to provide Web services, and some other infrequently used ports can be closed. Vi. replacement of the administrator accountThe Administrator account has the highest system privileges, and once the account is exploited, the consequences are disastrous.   One of the common means of hacking is to try to get the password of the administrator account, so we have to reconfigure the administrator account. The first is to set up a powerful and complex password for the administrator account, and then we rename the Administrator account and create an administrator account that does not have admin privileges to deceive the intruder. In this way, it is difficult for intruders to figure out which account really has administrator rights, and to some extent reduce the risk. Vii. Elimination of Guest invasion of the accountThe Guest account, the so-called Guest account, has access to the computer, but is restricted. Unfortunately, the Guest also opened the door for hacking.   There are many articles on the web that have introduced how to use the guest user to get administrator privileges, so to eliminate the system intrusion based on the guest account. Disabling or removing the Guest account is the best way to do it, but in some cases you must use the Guest account, there are other ways to do the defensive work. First, set a strong password for the guest, and then set the Guest account's access to the physical path in detail. For example, if you want to prevent Guest users from having access to the tool folder, you can right-click the folder and select the Security tab in the pop-up menu to see all users who have access to the folder. Remove all users except administrators. Or you can set permissions for the appropriate user, such as "List Folder Directory" and "read", and so on, which is much more secure. Viii. installation of necessary security softwareWe should also install and use the necessary anti-black software on the computer, anti-virus software and firewalls are necessary. Open them on the internet so that even a hacker can attack our security is guaranteed. Nine, prevent Trojan programTrojan Horse program will steal the useful information implanted in the computer, so we also want to prevent hackers implanted Trojan program, commonly used methods are: In the download file first put into their own new folder, and then use anti-virus software to detect, play a preventive role in advance.     In the "Start" → "program" → "Start" or "Start" → "program" → "Startup" option to see if there are unknown running items, if any, delete can be. Remove all suspicious programs that are prefixed with "Run" in the registry Hkey_local_machine/software/microsoft/windows/currentversion/run. 10, do not return to the stranger's mailSome hackers may impersonate some formal website name, and then make up a good reason to send a letter to you to ask you to enter the Internet user name and password, if press "OK", your account number and password into the hacker's mailbox.   So don't just go back to a stranger's mail, even if he says it again, it's tempting to be fooled. Do a good job of IE security Settings ActiveX control and Applets have a strong function, but there are hidden dangers, the Web page malicious code is often the use of these controls to write a small program, as long as the open Web page will be run. So to avoid malicious page attacks only prohibit these malicious code from running
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.