With the increasing number of machines in Internet cafes, the application environment has become extremely complex. To facilitate cashier management, many bosses have adopted professional management software, to calculate the Internet access fees of all current users. Although the results are good, they cannot cover up the vulnerabilities in Internet cafes, and even they may cause a lot of trouble for network administrators. It can be seen that their software has advantages and disadvantages. I will analyze and block the common technical vulnerabilities in Internet cafes and the vulnerabilities in billing software.
I. Internet Explorer is a disaster
Compared with other similar software, ie has a unique advantage. For Windows users, only a few of them choose to change other browsers to surf the Internet, the number of users is huge. As the saying goes: "big treasure" has a huge user base, and Internet Explorer has received much attention from hackers, so it is also an extremely insecure surfing tool.
In the Internet cafe application environment, the IE vulnerability is like a bomb that can be detonated at any time. Even if you use the management software to block the C drive, malicious Internet users can enter the C: path in the IE browser to browse the files and even store Trojans and logic bombs, the consequences will be unimaginable. As for how to block this IE browser vulnerability, we only need to restrict users to view hard disk files through IE, so as to easily prevent malicious attacks. Usually in Vientiane or Pubwin Internet cafe management software, there are related functions, to prohibit users from viewing hard disk files through IE browser. However, it is not ruled out that if the two management software are damaged by malicious users, they will become invalid. Therefore, it is best to block the hard disk files browsed by users through third-party software, in this way, even if the Internet cafe management software becomes invalid, malicious users are also prevented from viewing the C drive system files in the browser.
Ii. Security Risks in billing software
The Network fee is 2 yuan an hour. It seems that the cost is very small, but it also takes a lot of money to accumulate for a long time. Therefore, many people have come up with the idea of computing management software to save the cost. Generally, they will adopt a solution that will make their billing software ineffective to achieve the goal of free Internet access.
For example, the most common method for malicious users is to use the ABC Input Method Vulnerability and delete management software in security mode to terminate the running of computing software. Therefore, to prevent the above common free Internet access method, we should fix the ABC Input Method Vulnerability. The method is very simple as long as the ABC input method is upgraded to version 5.22 or later. In addition, to prevent malicious users from deleting management software in security mode, users can be prevented from deleting the billing software in security mode to access the Internet for free.
Iii. Many file downloading risks
Due to the unexpected destructive power of blacksoft, many malicious people download their software from the Internet to their local computer, and then crack the management software of their Internet cafes, so that they can access the Internet for free. Of course, it is not ruled out that experienced users will use the management software function to restrict file downloads and restrict files by modifying Shell32.dll. However, we are familiar with the two breakthrough methods, therefore, it does not play any role at all, not to mention the restriction of downloading may lead to user anger.
Therefore, you may wish to open an idle hard disk partition for users to download files. If a malicious user wants to download viruses or Trojans from the machine, the existing anti-virus software on the machine can be solved, if no, install anti-virus software before opening up the free space.