Basic Policy
For example, disable unnecessary system services, such:
Alerter
ClipBook Server
Computer Browser
DHCP Client
Directory Replicator
FTP Publishing Service
License Logging Service
Messenger
Netlogon
Network DDE
Network DDE DSDM
Network Monitor
Remote Access Server
Remote Procedure Call (RPC) locater
Remote Registry server
RunAs Service
Schedule
Server
Spooler
Telephony
Telephone Service
Terminal Service
Telnet
TCP/IP NetBIOS Helper
Others:
Wireless Network security issues. Wireless Networks are mainly engaged in WEP, WPA/wpa2 and other encryption and authentication methods. Among them, WEP is a public key and is not secure. We recommend that you use WPA or wpa2. The password should be as complex as possible.
Data encryption. The encryption provided by office is not reliable. It not only can be cracked, but can also be directly removed, which is almost useless. For file encryption, in addition to professional Cryptographic software, Windows comes with EFS encryption, which is also safe and easy to use based on administrator authentication. (The hard disk must be in NTFS format. You must save the certificate. Otherwise, you cannot enable it after reinstalling the system, and decryption is almost impossible !)
Delete and restore data. Simple deletion or formatting of data is useless and can be completely restored. If you want to completely delete (or format) the data on the hard disk and then fill it with useless data (absolutely full), the hard disk can only recover the last written data.
Computer security, efficiency and Benefits
360 software and cloud software. 360 security guard and 360 anti-virus software, not only because they are free, but because their performance basically meets the requirements; and because they are free, this prevents the software from being ineffective due to problems that may occur during software update and activation. Cloud software is a virtual system that can install all the required but not long-used software in the cloud system. It can be used normally after being activated when necessary, without occupying system resources. Don't know. The cloud is a bit amazing!