Blocking all Windows system vulnerabilities

Source: Internet
Author: User

Since Microsoft launched the Windows operating system, to date the birth of the vista system, its inevitable loophole, has always been a headache for everyone. Because of all kinds of hacker intrusion, virus Trojan intrusion, are in the loopholes in the system, if your system in the management of problems, it will be easy to be visited by hackers, then imagine the consequences will be, so to protect the system security, through the system of loopholes is particularly important.

First, the establishment of the system itself the most important

This article takes the Windows XP system as an example, because its system is currently using the most users, and the most self-contained operating system, is very representative, the following is to the system security settings.

1. Administrator account should be optimistic

Administrator account is the system's admin account, by default, the system does not set the password, and its weak password, it is easy for hackers to detect and crack, so for your system security, please give its account set strong security password.

Step 1. First on the operating system desktop, right-click the My Computer tab, select the Manage option, and then, in the Computer Management dialog box that pops up, expand the "system management → local Users and groups → users" option on the left, and then right-click the "Adminis-trator" bar on its side, In the shortcut menu shown, select the "Set password" option, and then follow the prompts below to enter a strong security password.

Step 2: Set the Administrator user's permissions limit, because the administrator super User has too much permissions, the outside of a hacker to crack success, it will be easily compromised to other users. So here in the account list right click on the "Administrator" tab, select the "rename" option, change its name to any name, such as CCC. A new administrator-Limited User is then created, even if the user is compromised later, it will not be implicated in other users.

Step 3. The safest way, of course, is to let its users disappear forever, so that the hacker's solution naturally loses its meaning. The specific deletion method is as follows: Open the Registry Editor dialog box, expand the left main part to Hkey_local_machinesamsamdomainsaccountusers, and then under [000001f4] and Hkey_local_ Machinesamsamdomainsaccountusersnamesadministrator key value deletion, and then restart the computer, the Administrator super User can disappear without trace.



Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.