ADSL Internet access is widely used in home applications. As bandwidth increases, more users also choose routers to build a home board network. However, all this is achieved through ADSL access. If the security protection of ADSL is not well done, it will not only pose a threat to the computer system, but more importantly, it may involve the loss of personal property.
Since the past year, many so-called "hackers" began to use scanning tools to obtain one or more ADSL accounts with users' negligence, and then began to brush qcoins and transfer money online. As a result, there were many examples of high phone bills. It can be seen that it is necessary to do a good job in the early stage of ADSL security.
1. System Security First <-- advertisement code begin --> <-- none --> <-- advertisement code end -->
In fact, ADSL is intruded, many of which are caused by system vulnerabilities. If hackers get the root of your system, they can use a Trojan horse or a dedicated ADSL password listener to get your account information. The most common intrusion method is weak passwords. In combination with the conventional IPC sharing vulnerability, it is not difficult to enter the system.
Enter CMD and enter net share and press Enter. If the disk C, D, and admin are shared, delete it immediately. You can use Windows to directly enable sharing, and the default sharing method of the system will bring a disaster tolerance to the system.
Enter the net share Name $/del and press enter to delete the share by default. However, this completes the first step. If your Administrator does not set a password, set a relatively complex password immediately. If you use a non-Administrator account, you need to set a password for the default Administrator. a blank password is not a fun task. Win + R open and run. Enter control userpasswords2 and press Enter. Select Administrator and set the password. Because the author uses the default Administrator account, this function is disabled and must be switched to another Administrator.
In the end, remember to enable automatic updates to keep the system updated. You know, today many "0-day" organizations are focusing on these vulnerabilities. Even a very small time difference, your system may be captured by thousands of black hands on the Internet.
Ii. supplemented by software protection
In this regard, it is relatively simple to use anti-virus software, firewall, and malicious rogue protection software. Anti-virus software I recommend Kaspersky or McAfee outside of China. The firewall is built on its own. Of course, if you have more needs, you can choose Look n Stop and ZoneAlarm. We recommend that you use the default settings for beginners. It is recommended that you do not set the default settings so that the network cannot be connected or the wireless signal strength is greatly reduced.
As for the protection software against malware, I think this is based on national conditions. It is not terrible to know that malware itself is not a big deal to compensate for the speed of the network. However, nowadays, the malware in workshops is bundled with Trojan viruses, and the accounts are regarded as huge, you have to defend against it!
We recommend 360 security guard. We have used upiea before, but later we were unable to compete with the Qihoo team in terms of update speed and function expansion. In terms of cooperation, third-party browsers are also very important. At least they can shield some cainiao-level malicious plug-ins. FireFox and roaming are all good choices.
Iii. Password Management
Do you like to activate the ADSL routing function by entering the user name and password, and then enabling automatic Internet access? This is indeed convenient, but it is also dangerous. Have you modified your ADSL logon password? If the other party knows the IP address and can log on using the default password, the ADSL account will be enough. You can search for any type of ADSL on the Internet. The default logon information of each type of ADSL is provided in many places.
Iv. Stability
Basically, if the "hacker" on the Internet cannot obtain your account, his confidence will be greatly compromised and his patience will no longer exist, at this time, he wants to find a new target. From the perspective of the author, it is still cainiao who are still hacking and stealing others' information. They only offer three or four moves, but still cannot ignore some details. Here, we only remind you that you can search for related information on Google: 1. remote service problems; 2. specific port threats; 3. camouflage and proxy applications of IP addresses.
The above are just some basic measures. In my opinion, using social engineering intrusion is the most difficult to prevent. We need to remember that there are not so many PLMM in the world and there are not so many free lunches, but there are more Trojans and viruses that consume your assets again and again through these methods.