Data Encryption Book II: system encryption

Source: Internet
Author: User
Tags account security password protection

 

System encryption:

1. Windows

Windows is the most widely used operating system, and the login password before entering Windows naturally becomes our second barrier.

Windows XP supports multiple users. Each user can set his/her own personality as needed, such as desktop icons, wallpapers, shortcuts, and so on. User accounts can be divided into three levels by power: Administrator, user, and guest. To protect your settings or privacy from being used or viewed by others, you can create a password for your users. When you enter the system, you must enter the account name and password. The entered account and password will be sent to an account security database called SAM for comparison, if the account and password can be found in SAM and are correct, the system will assign the permissions registered in SAM to the user and allow the user to access the system for corresponding permissions, if the password is incorrect or the account does not exist in SAM, the user's login request will be rejected.

2. Create a password

Log on with your own account, click "Control Panel/User Account" in turn, click your own account name to enter the settings panel, find and click "create password ", on the displayed page, enter your desired password as prompted. Enter the password again and click "create password. Of course, in order to avoid forgetting the password, you can set a prompt to remind yourself of the password in the "password prompt" Blank box.

3. Change the password

If the password is accidentally leaked, you only need to select your account (2) in the "User Account" as described above and click "change my password ", first, enter the original password. Then, enter the new password twice and click "Change Password.

Figure 2

Although many friends are used to setting a password for their user accounts, they often forget that after Windows XP is installed, the system also has a built-in system Administrator account Administrator, this account has the highest level of control over the entire system. Even if we set a password for our user account, this is also a false setting for some hackers or malicious intruders. Because the Administrator account is automatically hidden in Windows XP, the password of this account is entered when the operating system is installed, and many people do not realize the importance of this account, no password is set for the Administrator account during installation. In this case, as long as a malicious person can access your computer through the network or directly, then your system and data are in danger. Therefore, if the password of the Administrator account in the system is blank, it is best to set a password for this account.

Because the Administrator account has the highest power, it has always been the main target of hackers. Therefore, in addition to setting a password for the Administrator account, we can create an account with all permissions first, disable the Administrator account. Open "Control Panel/Management Tools" and click "Computer Management. In the left-side list of the displayed "Computer Management" window, find "local users and groups" (3), click "users", and double-click the Administrator account in the right pane, select "Disabled Account.

Figure 3

Tip: When you leave the computer, press Win + L to lock the computer and remember to set a password for the current user. If you are using Windows 2000, press Ctrl + Alt + Del and then click lock computer. You can also set a password for screen saver.

4. Shared Folders

If you do not want to view the information in the folder, you can create a user, such as share, and set the password, click the "Permissions" button, delete all users in the window that opens, click "add" to add share users (4), and set the corresponding access permissions below. In this way, only the share user can log on to your machine and view the information. Other users cannot view this information even if they log on to your machine.

Figure 4

5. Lock the printer

We once mentioned that locking the external port of the computer can prevent others from using the printer. However, this method is often used by printer users, it is very troublesome to switch back and forth between "disabled" and "available" ports. Click Start/printer and fax, and right-click the printer icon to be locked in the printer and fax window, in the shortcut menu that appears, right-click "share", select "share as", enter a share name, and click the "Security" tab, delete all users in the "name" list, click "add" to add a share user, and set the corresponding access permissions (5) below ). After the preceding settings, the printer can be used only when the share user logs on to your machine.

Figure 5

6. Ghost

Ghost is a favorite system backup/recovery software, but the generated GHO file contains the system and all the software in it, unencrypted files may be recovered by others or opened and decompressed by using Ghost Explorer, which is not safe.

In fact, you only need to write a batch command containing "ghost-sure-pwd, 888666-clone, mode = pdump, src =, dst1_system.ghow.sentence, And put ghost.exe in a folder, after running, the first partition of the first hard disk is backed up to the system in the current folder. and uses 888666 as the password of the generated gho file for encryption. In the future, when you use Ghost to restore the system. gho file, or use Ghost Explorer to release the file, you must enter a password. Otherwise, the file cannot be recovered or released, which serves as a secret.

Tip: If you enter "ghost-sure-pwd-clone, mode = pdump, src =, dst = system. gho "statement, that is,"-pwd "is followed by a password, then Ghost will ask the user for the password used to encrypt GHO before making the GHO file. This password must be kept in mind. This is because once the GHO file is encrypted, it cannot be viewed or restored at will by others.

7. Nero

In addition to Burning the disc, the Nero-Burning Rom also supports hard disk backup, audio recording/editing, virtual optical drive, and CD tag creation software. Data backed up by Nero can also be encrypted.

Click Start/Program/Nero 6 Demo/Nero BackItUp, and then click wizard/backup on the toolbar to enter the Nero backup wizard. During the backup creation process, select the backup source file and folder, and click "use password" (6 ), in the displayed "use password" window, set "Activate password", and then select the backup target path to complete the backup.

Figure 6

To restore the backup file, double-click. nbi file. In the displayed "recovery wizard/target source Settings" window, enter the correct password (7) to restore the backup file.

Figure 7

Tip: As long as your hard disk space is large enough, you can select the entire hard disk partition when using Nero BackItUp.

8. Second Copy

In addition to using Ghost and Nero for backup, Second Copy2000 is also a common backup software that can encrypt backup files.

Figure 8

Start Second Copy2000, click "file/new solution", select "personalized settings", and select "compression" when performing the "how" step as prompted by the wizard ", then, set the encryption password (8) in the middle of the window. In the future, Second Copy 2000 will compress the file into the ZIP package and carry the password protection. In this way, when recovering the compressed backup file, double-click the ZIP file. You must enter the correct password to use WinRAR or WinZip to open the file.

Figure 9

In addition, click "Edit/option", switch to the "regular" tab card in the "Second Copy2000 option" window, and enter the password (9) at the bottom of the "password protection" column ), right-click a scheme and select "attribute" to edit it. A window is displayed asking for a password (10 ).

Figure 10

9. True Launch Bar

As an excellent replacement for the Windows Quick Start toolbar, the True Launch Ba, as part of the toolbar, is almost seamlessly connected to Windows and can be added to the Quick Start bar, for example: multiple functions such as hidden buttons, quick shutdown, directory menu, and virtual directory are absolutely compatible with the previous toolbar. Therefore, there are more and more people using the True Launch Ba. But how can we prevent the various settings of the True Launch Ba from being damaged by outsiders?

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.