Eight security policies for windows XP

Source: Internet
Author: User

1. Shield unnecessary service components

The more service components are installed, the more service functions you can enjoy. However, the service components that users usually use are still limited after all, and those that are rarely used not only
It occupies a lot of system resources and may cause system instability. In addition, it also provides various ways for remote intrusion by hackers. Therefore, we should try our best to block the service components that are not needed for the moment. The procedure is as follows: first, find the "service and application" icon in the control panel, then open the "service" dialog box, and select the program to be blocked in the dialog box, right-click, select "properties"/"stop" from the shortcut menu, and set "Start type" to "Manual" or "disabled ", in this way, you can block the specified service component.

2. Power Supply Protection

When using a computer to process files, the most worrying thing is that the computer suddenly loses power, because this sudden power loss will not only render the result of hard work, but also damage the computer. In order to prevent unexpected power loss in various circumstances and ensure computing security and normal operation, we should enable the function of asking or directly sleeping when pressing the power button in power management. If you want to enable the power protection function, click "my computer", "Control Panel", and "power options" on the Windows XP desktop ", select the "advanced" tab in the pop-up setting box, and find the "when the computer power button is pressed" setting item on the corresponding tab page, then select "Sleep" or "Ask me what to do" in the setting box. If you select the "shutdown" option, the power protection function is unavailable.

3. encrypt important information

To prevent others from peeking at the file information stored on their computers, Windows XP provides the "file and folder encryption" function for common users, with this function, we can encrypt important information stored in the computer, so that other users cannot access the content in files or folders without a password. To encrypt a file, first open the Windows XP Resource Manager and find the file or folder to be encrypted in the resource manager operation window, right-click the selected file or folder and select the "properties" command from the shortcut menu. Then, the file encryption dialog box appears in Windows XP, and click the "General" tab in the dialog box, then select "advanced"/"encrypted content to protect data.

4. Lock your computer

If you need to leave your computer for a short time due to an emergency, many people may choose to shut down your computer and then leave it because they are worried that your computer will be occupied by others, then you can try again, but frequent machine switch is not good for your computer. Is there a way to prevent others from using their own computers? You can quickly lock the keyboard and display by double-clicking the desktop shortcut without using ctrl alt del or screen saver. When locking your computer, you can follow these steps: first right-click Windows XP desktop, select "new"/"shortcut" in the right-click menu, and then enter the "rundll32.exe user32.dll, LockWorkStation" command character in the command line text box as prompted, in the subsequent wizard window, enter the specific name of the shortcut. For convenience, you can directly name the shortcut "lock the computer. In the future, you only need to double-click "lock computer" on the desktop to lock the computer.

5. Use the "connect to firewall" Function

In the Internet era, the spread, speed, and destructive power of viruses have dramatically changed, and hackers are also operating worldwide. To prevent viruses and hacker intrusion at will, many users have installed firewalls on their computers. Windows XP has added the free "Internet Connection Firewall" function, which enables Windows XP to dynamically filter all information in and out of the system, allow the system to allow access by people and data to access its internal network, and deny unauthorized users and data to prevent hackers from accessing its own network to the maximum extent, prevent them from arbitrarily changing, moving, or even deleting important information on the network. When using the "connect to firewall" function, you can click the "set"/"network connection" menu in the Start menu, and then select the dial-up connection to access the Internet from the pop-up window, right-click the connection icon, select the "properties" command, and click the "advanced" tab in the displayed dialing Properties window, on the corresponding tab page, select the "Internet Connection Firewall" option, and then click the "Settings" button of the corresponding firewall to set the firewall according to your requirements, so that the firewall can work more efficiently.

6. Use Screen Saver at any time

When we see the word "Screen Saver", we will naturally think of screen saver in the computer. It mainly aims to achieve screen protection by displaying the specified image in turn in different ways. However, the screen saver is started only when the preset time is not reached for the computer. What should we do if we want to start the screen saver at any specified time? Follow these steps: In the Start Menu of Windows XP, click "start"/"Search"/"file or folder ", in the displayed Search dialog box, click "all files and folders" and enter "*. scr character, then in the search range drop-down list, select "Local disk (C" or drive that stores system files on the computer, and then click "Search. Then, in the list of Screen Saver programs found, select the desired screensaver program and create a shortcut for the screensaver program to be stored on the desktop, when you want to start the Screen Saver Program, double-click the screen saver shortcut on the desktop.

7. Assign management permissions to yourself

Many programs installed in Windows XP require users to have certain management permissions to use the program, sometimes we need to assign a temporary access program management permission for ourselves. When assigning management permissions, We can log on to the Windows XP system as a normal user, right-click the program installation file, and hold down the Shift key on the keyboard, click "run mode" from the shortcut menu that appears, and enter the user name and password with corresponding management permissions in the pop-up window.

8. Eliminate system false positives

When operating applications in Windows XP, due to improper operations or system problems, the operating program does not respond for a long time. Many people think that the computer must have crashed, so many people choose to shut down directly or use Ctrl Alt Delete to restart the computer. In fact, in Windows XP, some programs that cannot run normally will lead to the false death of the system taskbar. This phenomenon is mainly caused by the incompatibility between the currently executed program and the system. In this case, you can find the execution file of the program, right-click the program, and select the "compatibility" tab in the pop-up dialog box, then select the required runtime environment in "compatibility mode.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.