Top 10 tricks to free you from inexplicable hacker network attacks

Source: Internet
Author: User
Tags strong password

Now, more and more users are using ADSL. Because ADSL users have been online for a long time and are fast, they have become the targets of hackers. Now there are various more and more detailed "IP address libraries" on the Internet. It is very easy to know the IP addresses of some ADSL users. How can we protect our network security? Take a look at the following methods.

1. Cancel folder hiding and sharing

If you use Windows 2000/XP, right-click drive C or another disk, and select share, you will be surprised to find that it has been set to share this folder ", but I cannot see the content in "Network neighbors". What is the problem?

Originally, by default, Windows 2000/XP enables hidden sharing of all partitions, select system tools, shared folders, and shared from the "control panel, administrative tools, and computer management" window ", you can see that each partition name on the hard disk is followed by a "$ ". However, if you type "computer name or IPC $", the system will ask the user name and password. Unfortunately, the password of the Administrator for most personal users is empty, intruders can easily see the content of the C drive, which poses a great risk to network security.

How can we eliminate default sharing? The method is simple. Open the Registry Editor, go to "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetSevicesLanmanworkstationparameters", create a dual-byte value named "auto‑wks", set it to "0", and restart the computer, in this way, the sharing is canceled.

Ii. Reject malicious code

Malicious web pages have become one of the greatest threats to bandwidth. In the past, Modem was used because it was slow to open a webpage. Closing a malicious webpage before it was fully opened is also possible to avoid recruitment. Now the bandwidth is so fast that it is easy to be attacked by malicious web pages.

Generally, malicious web pages are destructive only when malicious code is written. These malicious codes are equivalent to some small programs, which can be run as long as the web page is opened. Therefore, to avoid malicious web page attacks, you only need to prohibit the running of these malicious code.

Run IE and click "tools/Internet Options/security/Custom Level" to define the security level as "Security Level-high ", set 2nd and 3 items in ActiveX controls and plug-ins to disabled, set other items to prompt, and click OK ". After this setting, when you use IE to browse the Web page, it can effectively avoid malicious code attacks on the malicious web page.

3. Block the hacker's "backdoor"

As the saying goes, "no wind and no waves", since hackers can access it, it means that the system must have a "backdoor" for them. As long as the backdoor is blocked and hackers have nowhere to start, there will be no worries!

1. Delete unnecessary protocols

Generally, only the TCP/IP protocol is enough for servers and hosts. Right-click "Network Neighbor", select "attribute", right-click "Local Connection", and select "attribute" to uninstall unnecessary protocols. NETBIOS is the root cause of many security defects. For hosts that do not need to provide files or print shared files, you can also disable NETBIOS bound to the TCP/IP protocol to avoid NETBIOS attacks. Select "TCP/IP protocol/properties/advanced", enter the "Advanced TCP/IP Settings" dialog box, select the "WINS" tab, and select "Disable NETBIOS on TCP/IP, disable NETBIOS.

2. Disable "file and print sharing"

File and print sharing should be a very useful function, but it is also a good security vulnerability that hackers intrude into when they do not need it. So we can disable "file and print sharing. Right-click "Network Neighbor", select "properties", and click "file and print sharing, remove the hooks in the two check boxes in the pop-up "file and print share" dialog box.

Although "file and print sharing" is disabled, it cannot ensure security. You need to modify the registry and prohibit others from changing "file and print sharing ". Open the Registry Editor, select the "HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesNetWork" primary key, and create a New DWORD type key value. The key value is "NoFileSharingControl" and the key value is "1, in this way, the "file and print sharing" cannot be changed. If the key value is "0", this function is allowed. In this way, "file and print sharing" no longer exists in the "properties" dialog box of "Network Neighbor.

3. Disable the Guest account

Many intrusions use this account to further obtain the administrator password or permissions. If you don't want to use your computer as a toy for others, you can still deny it. Open the control panel, double-click "user and password", click the "advanced" tab, and then click the "advanced" button. The local user and group window is displayed. Right-click the Guest account, select properties, and select "Account Disabled" on the "General" page ". In addition, renaming Administrator accounts can prevent hackers from knowing their Administrator accounts, which ensures computer security to a large extent.

4. Do not create a null connection

By default, any user can connect to the server through an empty connection, Enumerate accounts, and guess the password. Therefore, we must disable NULL connections. There are two methods:

The first method is to modify the Registry: Open the Registry "HKEY_LOCAL_MACHINESystemCurrentControlSetControlLSA" and change the key value of DWORD "RestrictAnonymous" to "1.

Finally, we suggest you patch your system. Microsoft's endless patches are still very useful!

4. Hide IP addresses

Hackers often use some network detection techniques to view our host information. The main purpose is to obtain the IP addresses of hosts on the network. IP address is a very important concept in terms of network security. If an attacker knows your IP address, it is equal to preparing a target for his attack. He can launch various attacks on this IP address, such as DoS and Floop overflow attacks. The main method to hide an IP address is to use the proxy server.

Compared with direct connection to the Internet, proxy servers can protect the IP addresses of Internet users, thus ensuring Internet security. The principle of proxy server is to set up a "Transfer Station" between a client (a computer on which the user accesses the Internet) and a remote server (for example, a user wants to access a remote WWW server ", after the client requests a service from the remote server, the proxy server first intercepts the user's request and then forwards the service request to the remote server to realize the connection between the client and the remote server. Obviously, after using the proxy server, other users can only detect the IP address of the proxy server rather than the IP address of the user. This achieves the purpose of hiding the user IP address and ensuring the security of the user's Internet access. There are many websites that provide free proxy servers. You can also search for them using tools such as proxy hunters.

5. disable unnecessary ports

Hackers often scan your computer ports during intrusion. If a port monitoring program (such as Netwatch) is installed, the monitoring program will receive a warning. In the event of such intrusion, tools and software can be used to close ports that are not in use. For example, use "Norton Internet Security" to close ports 80 and 443 used to provide web services, other ports that are not commonly used can also be disabled.

6. Change the Administrator account

The Administrator account has the highest system permissions. Once the account is used, the consequences are unimaginable. One of the common means of hacker intrusion is to try to obtain the password of the Administrator account, so we need to reconfigure the Administrator account.

First, set a powerful and complex password for the Administrator account. Then, rename the Administrator account and create an Administrator account without Administrator permissions to cheat intruders. In this way, it is difficult for intruders to find out which account has administrator permissions, which reduces the risk to a certain extent.

7. Prevent Guest Account intrusion

A Guest account is a so-called Guest account. It can access computers but is restricted. Unfortunately, Guest also opens the door for hacker intrusion! There are many articles on the Internet that show you how to use the Guest user to obtain administrator permissions. Therefore, you must prevent system intrusion based on the Guest account.

Disabling or permanently deleting a Guest account is the best option, but when you have to use a Guest account, you need to do a good job of Defense through other means. First, set a strong password for Guest, and then set the access permission for the Guest account to the physical path in detail. For example, if you want to prevent the Guest user from accessing the tool folder, right-click the folder and select the "Security" tab in the pop-up menu, you can see all users accessing this folder. Delete all users other than administrators. You can also set permissions for the corresponding users in the permissions, for example, you can only "list folder directories" and "read", which makes it much safer.

8. install necessary security software

We should also install and use the necessary anti-Black software in the computer, anti-virus software and firewall are essential. Open them when surfing the Internet, so that even if hackers attack us, our security is guaranteed.

9. Prevent Trojans

Trojans can steal useful information from embedded computers. Therefore, we must prevent hackers from inserting Trojans. Common methods include:

● Put the downloaded file in a new folder and Use anti-virus software to detect the file.

● Check whether any unknown running project exists in the "Start" → "program" → "start" or "start" → "program" → "Startup" options. If yes, delete it.

● Delete all suspicious programs prefixed with "Run" under HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun in the registry.

10. Do not return emails from strangers

Some hackers may pretend to be the names of some regular websites, and then write a letter to you asking you to enter the name and password of the online users. If you press "OK ", your account and password enter the hacker's email address. Therefore, do not return emails from strangers, even if they are more attractive.

Set IE Security

ActiveX controls and Applets have strong functions, but there are also hidden dangers of exploitation. Malicious Code on webpages is usually a small program written using these controls, as long as the web page is opened, it will run. Therefore, to avoid malicious webpage attacks, only the operation of such malicious code is prohibited. IE provides multiple options for this. The specific setting steps are: "Tools"> "Internet Options"> "security"> "Custom Level ", we recommend that you disable ActiveX control and related options. Always be cautious!

In addition, we can only set Internet, local Intranet, trusted sites, and Restricted Sites in IE security settings. However, Microsoft hides the Security Settings of "My Computer" here. By modifying the Registry to enable this option, we can have more options when dealing with ActiveX controls and Applets, it also has a greater impact on the security of local computers.

The following is the specific method: Open the menu to open the menu in the menu to run, in the displayed dialog box to input regedit.exe, open the Registry Editor, click the front of the "+" number sequentially expand to: HKEY_CURRE-NT_USERSoftwareMicrosoftWindowsCurrentVersionInternetSettingso

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.