Many of the services and processes in the system are not used in peacetime, these services and processes will affect the speed and security of the system, small series today to share with you 10 systems must prohibit the services, including to prohibit the reasons, we may wish to know.
1.NetMeeting Remote Desktop Sharing: Allows authorized users to access each other on the network via NetMeeting. This service is not of much use to most individual users, and the opening of the service also poses a security problem, because the service sends the user name in clear text to the client connecting to it while surfing the internet, and the hacker's sniffer program can easily detect these account information.
2.Universal Plug and Play device Host: This service provides support for Universal Plug and Play devices. This service has a security vulnerability in which the computer running the service is vulnerable to attack.
An attacker who sends a bogus UDP packet to a network with more than one win XP system may cause these win XP hosts to attack the specified host (DDoS). In addition, if a UDP packet is sent to the system 1900 port, the address of the "location" domain points to the Chargen port of the other system, it is possible to put the system into a dead loop, which consumes all the resources of the system (it needs to be opened manually when hardware is installed).
3.Messenger: Commonly known as Messenger service, computer users in the LAN can use it for data exchange (transmission between client and server net send and Alerter service messages, this service is independent of Windowsmessenger. Alerter messages are not transmitted if the service is stopped. This is a dangerous and annoying service, the Messenger service is basically used in the enterprise network management, but spam and junk advertising vendors, also often use the service to publish pop-up ads, titled "Messenger Service." And the service is flawed, and msblast and slammer viruses are used to spread quickly.
4.Performance Logs and Alerts: Collects performance data from a local or remote computer based on preconfigured schedule parameters, and then writes this data to a log or triggers an alert. To prevent the remote computer from searching for data, it is strongly forbidden.
5.Terminal Services: Allows multiple users to connect and control a single machine, and displays desktops and applications on remote computers. If you do not use the remote control feature of Win XP, you can disable it.
6.Remote Registry: Enables remote users to modify registry settings on this computer. The registry can be said to be the core of the system, the general user is not recommended to change their own, let alone to allow others to modify the remote, so this service is extremely dangerous.
7.Fast User Switching Compatibility: Provides management for applications in need of assistance under multiple users. Windows XP allows for fast switching between multiple users on a single computer, but this feature has a vulnerability, when you click on the "start → logout → fast switching", in the traditional login mode repeatedly entered a user name to log in, the system will be considered a brute force, and lock all non-administrator accounts.
If you do not use it frequently, you can disable the service. Or, in the control Panel → user account → change user logon or Logoff mode, cancel use Fast User Switching.
8.Telnet: Allow remote users to log on to this computer and run programs, and support multiple tcp/iptelnet customers, including UNIX-based and Windows-enabled computers. Another dangerous service, if started, the remote user can log in, access the local program, and even can use it to modify your Adslmodem and other network settings. Unless you are a network professional or the computer is not used as a server, be sure to disable it.
9.Remote Desktop help Session Manager: If this service is terminated, Remote Assistance will not be available.
10.TCP/IP NetBIOS Helper:netbios is often used for attacks under win 9X, which can be disabled for users who do not require file and print sharing.
Citation: http://www.xp85.com/html/article-95-2064.html
10 services that must be banned in a system