Ways to prevent computers from being hacked

Source: Internet
Author: User
Tags ip ban

How to prevent the computer from being hacked? The following are some simple knowledge to prevent the computer from being hacked, hoping to help.

First, the installation of security protection software: such as QQ computer Butler. Second, the operating system does not use pirated, most of them have backdoor.

Second, login users must set the password

In the control panel of the user, this is always known. And to ban the guest, right click on my Computer-> manage-> Local Users and groups.

Third, the patch must be complete

Whether it's windows or Third-party software.

Four, turn off disk sharing

That is, C, D, E, F, G, H and so on. Start-> Run input cmd return, in the cmd input net share C $/delete (and then change the C to D, in turn.) Do not understand DOS commands, of course, can also be in the management of the shared folder closed.

V. Turn off remote access

Right-click My Computer Properties-> remote to allow remote users to access the points in front of this computer removed.

Six, firewall open

As for automatic Updates, see if you are genuine, piracy technology. If you don't know, it's best to turn it off, lest it cause trouble later.

Turn off some completely unnecessary services.

such as server, IPC, System Restore service. Close method:

Start-> program-> admin tools-> Service (right-click My computer to manage faster). There are some services specific to see the requirements, do not need to shut down.

Report:

Computer Browser is closed if it is not required to be shared by local area;

DHCP client If IP is static, do not need to obtain automatic IP ban;

The print spooler is disabled if there is no printer;

Shell Hardware detection If you do not need to automatically play the ban;

TCP/IP NetBIOS helper does not need to be parsed for NetBIOS;

Themes If you do not use the theme of personality banned;

Windows Time system proofing is purely chicken-assisted;

Wireless Zero Configuration If there is no wireless card on the ban;

Workstastion If there is no need for local sharing.

Anti-Medium Horse method

Start-Settings-control surface-Add removal program-windows Installer-Remove the Windows Scripting Host in the attachment, then open Internet Explorer browser, point tool-internet Option-security-Custom level, Disable all 3 options inside the script, then the "Load programs and files in" Disabled, of course, this is just a simple method of prevention, but may affect the dynamic Java effect of some Web pages, but for the sake of security sacrifice a little, this can also prevent some malicious web bombs and viruses. Personal awareness: Do not flip the site, especially in the QQ group on the Web site, if the hair of the people did not say, no more words determined not to open. Also do not open strange hair of the file.

Nine, close some dangerous and unnecessary ports

In fact, the door fourth fifth is also close the port is more convenient. Some ports are difficult to close without third-party software, and I'll introduce a universal shutdown method:

1 Click "Start menu/Settings/Control Panel/admin Tools", double-click to open "Local policy month", select "IP Security Policy month, on the local computer" to the right side of the right mouse click, Talk about the shortcut menu, select "Create IP Security Month", Pop-up Wizard. Click Next Next in the wizard, when the display " Secure Communication Request "screen, the" Activate the default corresponding rules "to the left of the hook removed, point" finish "to create a new IP Security policy month.

2 Right-click the IP Security Policy, and in the Properties dialog box, remove the hook to the left of the Use Add Wizard. Then click on the "Add" button on the right to add a new rule, then pop the "New Rule Properties" dialog box, click on the screen "Add" button, pop-up IP Filter List window. In the list, first put the " Use the Add Wizard to remove the hook on the left, and then click the Add button on the right to add a new filter.

3 Enter the Filter Properties dialog box, first see the search address, the source address selected "Any IP address", Target address Select "My IP Address", click on the "Protocol" tab, choose "TCP" in the "Select protocol type" Drop-down list, and then enter "135" in the text box under "to this port". Click OK. This adds a filter that masks the tcp135 port to prevent the outside world from connecting to your computer via port 135. Click OK to return to the Filter List dialog box, you can see that has been added a policy month. Repeat the steps above to continue adding TCP 137 139 445 593 ports and UDP 135 139 445 ports to establish the appropriate filters for them. Repeat the steps above to add the TCP 125 2745 3127 6129 3389 port shielding strategy month, set up the above port filter, and finally click OK button.

4 in the New Rule Properties dialog box, select the new IP filter list and click the checkbox to the left of it to indicate that it has been activated. Finally, click the Filter Action tab, remove the hook to the left of the Use Add Wizard, click the "Add" button, make a "block" action, in the Security tab of the new Filter action properties, select Block, and then click OK.

5 Go to the "New Rule Properties" dialog box and click "New Filter Action". Select the checkbox to the left to indicate that it has been activated, click the Close button, and close the dialog box. The last "New IP Security Policy" dialog box, click to the left of the new IP filter list, and press OK to close the dialog box. In the Local Security policy month window , right-click the newly added IP Security Policy month, and then select Assign.

After reboot, the above ports can be shut down! The computer is much safer! This method sees clearly the point, may want to try a few more times. The way to view the port is "start"-> "Run" enter CMD return to open a command prompt and then enter Netstat-an (two words with spaces)

The above method can deal with the general rookie invasion or mass invasion.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.