13 Rules and 13 system security rules must be observed to maintain the security of the XP System

Source: Internet
Author: User

13 Rules and 13 system security rules must be observed to maintain the security of the XP System

Although the Windows operating system leaves us with many bad memories, we must admit that Windows is still one of the most widely used systems. In the face of such a large and complex operating system, it is imperative to protect its security. For the current Windows security technology and concepts, this article will recommend the following methods to help the majority of users better understand the Windows security mechanism.

Firewall and anti-virus software must be installed

In the face of new viruses, anti-virus software may become helpless, so it is better to find anti-virus solutions on the Internet. However, an anti-virus software adds a barrier. No matter how high or low the barrier is, it always has advantages and disadvantages.

The firewall must also be installed. At the same time, it is best to install some programs that monitor network processes and monitor whether malicious programs are operating illegally at all times.

 

Downgrading Administrator users

In Windows, the Administrator is the most advanced user and cannot be seen in the normal login mode. Therefore, it is easy to ignore the security issues caused by the Administrator user.

The Administrator user's initial password is blank. If no firewall is installed, hackers can easily access your computer through the Administrator account. At this time, it is too late to do anything.

In fact, this is not a matter of downgrading. It is to create a forged Administrator user with no actual rights.

The procedure is as follows: log on to windows with a non-Administrator account, Open Control Panel-Administrative Tools-Computer Management-local users and groups-users, and delete Administrator users, create a new Administrator user, right-click to set the password, and make the password more complex, so that it belongs to the user group at the lowest level, and select the Account Disabled in the attribute.

In this way, even if someone has cracked your Administrator account, you will find that it is only an account with no real permissions. In fact, simply delete this user. This method is available on the Internet, which wastes feelings and time.

 

Disable automatic operation of all disks

Nowadays, the USB flash drive virus is prevalent, and a slight carelessness will lead to a "lattice disk ". The general operating mechanism of the USB flash drive virus is to automatically run by double-clicking the drive letter. Therefore, disabling automatic operation of all disks is an effective preventive measure.

The specific operation process is: run the input gpedIT. msc --> User Configuration --> management template --> system, double-click [disable automatic playback] In the list on the right, select "All Drives", and select "started ". Are you sure you want to exit. Disable a service used for automatic playback.

Run the --> services. msc --> Shell Hardware Detection Service --> Start type --> disable

 

Do not double-click the USB flash drive

If you do not use a USB flash drive to disable automatic operation of all disks or use a USB flash drive on another computer, you are advised not to double-click the USB flash drive. This can easily trigger the USB flash drive virus. The best way is to first scan it with anti-virus software.

The general method to clear viruses in a USB flash drive is to check whether there is an autorun. inf file in the USB flash drive through the resource manager, which is usually hidden. Delete the autorun. inf file and the program it points to, and re-plug the USB flash drive.

 

Check boot items frequently

You often enter msconfig in the operation to view the startup Item. If any exception is found, you can immediately search for information on the Internet to see if it is a virus. Then, use regedit. Find the run item and check the startup project.

 

Back up important data frequently

Important data must be backed up frequently, such as important images and personal information. Important data will be burned once in a month, just in case.

 

Use GHOST

Ghost is often used to back up the operating system disk and directly recover the entire system disk in case of serious problems. This is a lazy practice. It is not too easy to find a hidden place for viruses, but it is also an efficient and fast method. The problem is that you must always use Ghost for backup. Otherwise, you may also lose some loss in restoring the system disk, at least the recently installed program (registration information ).

 

Private file encryption

Use encryption programs to encrypt files that you think are not ** public. There are a lot of such free software on the Internet. Do not just hide the file. Hiding is just a method of self-deception and encryption.

 

Use Google

Because the website Security Information prompt provided by Google search. When a webpage in the search result contains viruses or Trojans, Google will prompt you. I believe that domestic BAIDU will be better.

 

Use other browsers

Compared with IE, using other browsers can effectively reduce the chance of poisoning.

 

Use a complex password

This is a common topic, but there are still many people using simple digital passwords, such as birthdays and ID card numbers, which are easy to guess. "Don't worry, my birthday is only known to my friends." Who said your friends would never look at your privacy? Haha, I 'd like to tell you a small way to use a friend's birthday, ID card number, and so on.

 

Do not tell anyone your password.

Telling others is like selling yourself out.

 

Do not receive files at will

It is dangerous to receive files from others, especially in QQ. If you do not know, immediately refuse. If you are a friend, you must be clear that he sent the message on his own initiative. Do not run it immediately after receiving it. First scan windows with anti-virus software. There is also a website.

 

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.