Security Assurance: measure the test taker's knowledge about the stealth methods in the LAN.

Source: Internet
Author: User

As the saying goes, "one piece is hard to prevent". What actually threatens your information security in the LAN is not a remote hacker, but a "person" around you ". Because files shared by network peers are widely used in the LAN, in order to better protect ourselves, we need the help of stealth to prevent internal malicious attacks when sharing files.

  Basic hiding: Hiding Shared Folders

Do not think that adding a password to the shared folder can ensure security. There are many Windows vulnerabilities, so it is easy to download the password cracking tool from the Internet ". It would be much safer if someone else could not see your shared folder from their network peers. It is not difficult to achieve this effect: Right-click the folder to hide the shared folder, click the share option, and enter the name of the shared folder in the share name, add the dollar sign "$", for example, "Shared File $", and enter the password. To access your shared files, enter "computer name (or IP address) Shared File $" in the address bar, press enter, and enter the password to confirm.

  Advanced hide: sharing without sharing tags

Using the method described above, you cannot see your shared folders through the network neighbors, however, if one day he finds that there is a shared folder on your computer (the shared folder has a special logo shared, there is a little hand to hold, A folder is obviously different from a common folder), but the folder you share is not visible from the network neighbors, so he is likely to exert his own research spirit, try your best to open the shared folder. If you can remove the small hand icon of the shared folder, so that the shared folder is the same as the normal folder, so that others can not see it is shared, then the security is more guaranteed. The following describes how to share a ddisk without a shared logo: first, use the initial stealth technique described in this article-hide the shared folder method to set the D disk as a hidden share, and then open the Registry Editor, enable "HKEY_LOCAL_MACHINESoftWareMicrosoftWindowsCurrentVersionNetworkLanMand $" in sequence (you can also use the registry search function to directly find the primary key "d $ "). Change the key value of the DWORD Value "Flags" from "192" to "302", and restart Windows to take effect. If you want to access the data disk, enter "computer name \ d $" in the address bar to view the shared content of disk d. At this time, you will find that even the local resource browser cannot see the D disk is shared, isn't it amazing? Who else knows that your d disk is shared?
 "Fake and fake" IPs in the LAN

Currently, many machines in the LAN are configured with fixed IP addresses, which can be easily identified by internal or external hackers and subsequently initiated attacks. Therefore, we need to hide the IP address of the computer in the LAN to ensure security. We can change the computer name in the LAN to a fake IP address to cheat the novice hacker. The specific method is as follows:

Under Windows 9x, click Start> Settings> control panel, double-click Network, and click the "ID" tab in the pop-up window, set the computer name as an IP address and click [OK.

In Windows 2000/XP, right-click my computer and select properties. In the displayed System Properties window, select the computer name tab, on this tab, change the content in the text box after "computer description" to an IP address (see the figure below), and click [apply.

Set the name of a fake Machine

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.