7. Create a safe Windows XP operating system

Source: Internet
Author: User

Microsoft's new-generation operating system, Vista, has been launched for some time. However, due to the upgrading of users' hardware systems and the compatibility between software and Vista systems, most users are still using Windows XP. Therefore, it is necessary to repeat the old words. In this article, we will talk about some Windows XP security operation policies to minimize attacks from viruses and hackers.
1. Shield unnecessary service components

The more service components are installed, the more service functions you can enjoy. However, the service components that users usually use are still limited, and those rarely used components not only occupy a lot of system resources, but also cause system instability, it also provides a variety of ways for hackers to remotely intrude into the system. Therefore, we should try our best to block unnecessary service components. The specific operation method is as follows: first, find the "service and application" icon in the control panel, then open the "service" dialog box, and select the program to be blocked in the dialog box, right-click, select "properties"/"stop" from the shortcut menu, and set "Start type" to "Manual" or "disabled ", in this way, you can block the specified service component.

2. Use Windows Update to Update the system in time

Windows Update is an important component of Microsoft to protect system security and improve Windows performance. It is now available in version V6. Through it, we can not only obtain the Service Pack (for example, Windows XP Service Pack 2, which is currently popular), but also obtain patches for the latest security vulnerabilities, of course, you can also obtain the latest hardware drivers. The latest and most popular viruses, Trojans, worms, and other vulnerabilities often take advantage of the latest operating system vulnerabilities. If they are detected on a large scale, they can upgrade the latest patches, the chances of computer paralysis caused by attacks will be greatly reduced.

3. encrypt important information

To prevent others from peeking at the file information stored on their computers, Windows XP provides the "file and folder encryption" function for common users, with this function, we can encrypt important information stored in the computer, so that other users cannot access the content in files or folders without a password. To encrypt a file, first open the Windows XP Resource Manager and find the file or folder to be encrypted in the resource manager operation window, right-click the selected file or folder and select the "properties" command from the shortcut menu. Then, the file encryption dialog box appears in Windows XP, and click the "General" tab in the dialog box, then select "advanced"/"encrypted content to protect data.

4. Lock your computer

If you need to leave your computer for a short time due to an emergency, many people may choose to shut down your computer and then leave it because they are worried that your computer will be occupied by others, then you can try again, but frequent machine switch is not good for your computer. Is there a way to prevent others from using their own computers? You can quickly lock the keyboard and display by double-clicking the desktop shortcut without using CTRL + ALT + DEL or screen saver.

When locking your computer, you can follow these steps: first right-click the Windows XP desktop, right-click the desktop, and choose create/release from the shortcut menu. Then, press the screen prompt and enter rundll32.exe user32.dll in the command line box, the LockWorkStation command character, and then enter the specific name of the shortcut in the subsequent wizard window, which will be called later for convenience, you can simply name the shortcut and lock the computer. In the future, you only need to double-click "lock computer" on the desktop to lock the computer. You can also press the "windows key + L" shortcut to lock the computer.

5. Use the "connect to firewall" Function

In the Internet era, the spread, speed, and destructive power of viruses have dramatically changed, and hackers are also operating worldwide. To prevent viruses and hacker intrusion at will, many users have installed firewalls on their computers. Windows XP has added the "Internet Connection Firewall" function, which enables Windows XP to dynamically filter all information in and out of the system, allow the system to allow access by people and data to access its internal network, and deny unauthorized users and data to prevent hackers from accessing its own network to the maximum extent, prevent them from arbitrarily changing, moving, or even deleting important information on the network. When using the "connect to firewall" function, you can click the "Settings"/"network connection" menu items in the Start menu, and then select the dial-up connection to access the Internet from the pop-up window, right-click the connection icon, select the "properties" command, and click the advanced tag in the displayed dialing Properties window, on the corresponding tab page, select the "Internet Connection Firewall" option, and then click the "Settings" button of the corresponding firewall to set the firewall according to your requirements, so that the firewall can work more efficiently.

6. install third-party anti-virus programs, firewall programs, and Internet security protection programs

Facts have proved that the function of "Internet Connection Firewall" is very limited. First, it does not have the anti-virus and anti-virus functions, and secondly, it has limited technical protection and minimal effect. It is necessary for users to install third-party firewall programs on the basis of enabling "Internet Connection Firewall. The selection of firewall software should first look at the actual protection effect. Is it possible to promptly send a prompt when the program accesses the outside world, in addition, when being attacked by the outside world, data packets cannot be effectively blocked or filtered out. Rising Firewall adds the "tracking location" technology, monitors attacks in real time and actively tracks their locations. The anti-virus program must be installed. The efficiency of Anti-Virus is worth considering. In addition, the real-time anti-virus effect should be paid more attention. In terms of protection, Rising anti-virus software monitoring is quite comprehensive. Registry monitoring is the most effective way to prevent malicious programs and trojans from being implanted into the computer without your knowledge.

7. Assign management permissions to yourself

Many programs installed in Windows XP require users to have certain management permissions to use the program, sometimes we need to assign a temporary access program management permission for ourselves. When assigning management permissions, We can log on to the Windows XP system as a normal user, right-click the program installation file, and hold down the Shift key on the keyboard, click RUN mode from the shortcut menu that appears, and enter the user name and password with corresponding management permissions in the pop-up window.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.