Cainiao pay attention to the security risks caused by weak passwords

Source: Internet
Author: User

Nowadays, many channels will prevent Trojans. For example, you have a good habit and the Protection looks very strict. However, the network links from your computer to the WEB site have many complicated links, and any link has problems. The consequence for you is to download Trojans. Of course, your system uses automatic updates and installs corresponding patches. In this case, your computer may be less likely to download viruses due to Internet browsing. However, there is another situation that is most easily overlooked by netizens-many people use computers to facilitate themselves and usually use very simple logon passwords.

What are the risks of simple passwords? The administrator user is disabled by default in the normal Windows installation. You must create a new user when logging on. If a non-genuine Windows XP is used, many of them are automatically installed unattended, and the default administrator password is empty. In addition, some computer users use very simple logon passwords.

Computers with weak passwords can access the Internet or Local Area Networks, which poses a serious risk. A hacker can use a scanner to detect that a port is opened on your machine and try to use a weak password for an IPC $ null connection. Once the connection is successful, hackers can remotely start the corresponding services and disable your security software. Then, they can directly plant trojans on your computer. Some of the tools used for planting Trojans are hand-planted on a single machine. what's even worse is batch Planting after batch search. This method of getting bots has become a favorite of hackers except for website Trojans.

Security suggestions:

Check whether the administrator user is enabled on your computer and a simple password is used. If so, change the password immediately. A secure password is a combination of letters, numbers, and special characters with a length of no less than 6 characters.

In addition to enhancing the password strength, the firewall should also be enabled to intercept attacks from external IP addresses on the local machine.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.