XP system users how to keep the system secure

Source: Internet
Author: User

1. Update all applications in use and delete applications that are no longer updated

The most frequently exploited program for security vulnerabilities, Flash player, Java framework,. NET Framework, PDF reader and media dials, and any applications that have access to the Internet, keep the latest version as much as possible

2. Immediately update IE browser to IE8

IE as the most compatible browser, whether you usually have in the use of IE browser, because IE components deep into the system core, many places we will indirectly use IE, so we recommend that the IE6 upgrade to IE8 browser as soon as possible.

3. Similarly, office that is stopped for support should be deleted as soon as possible

Office is also a large part of security vulnerabilities, especially the ability to embed objects ... So switch to a newer version as soon as possible (for example, the current XP support to Office2010), or switch to free open office alternatives

4. Remove infrequently used browser plug-ins and applications

In addition to the most common flash, such as JRE (Java), QuickTime, PDF Reader, Silverlight, and so on, many are actually rarely used, but are the most hidden vulnerabilities

5. Change the use of restricted access to the account

This has been mentioned many times before, because it is really important to restrict access to the core of the system can effectively reduce the damage of viruses or trojan attacks, just as Android does not have root permissions to change the system

6. Install the reliable Anti-Virus, fire walls program, and keep the update

This may be the last line of defense when the system no longer accepts updates, but it should be noted that Microsoft's free antivirus MSE for XP will continue to provide updates until next July!

7. Move XP into a virtual machine

You want to get used to the new system and use the good choices of the old system program, such as Win7 XP mode, or VirtualBox (of course the performance part is not expected)

8. Filter the source of the network

As far as possible through the fire wall function of the router Internet, can reduce the direct attack of the network (of course, hardware fire walls need to set detailed), while paying attention not to use unknown wireless network or direct networking, so that the system can be trusted in the network environment if not feasible, please break the net!!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.