Ghost Version System Security Settings Method _ Security Settings

Source: Internet
Author: User
Tags safe mode system log administrator password strong password
Ghost version of the system because of the rapid installation, saving a lot of time, so now more and more applications, now, whether ordinary users, or computer city merchants are many of the ghost version of the system, but ghost version of the system has a lot of security risks, the system built-in account [ Administrator password is empty, some systems are open by default 3389, hackers can connect to your desktop remotely. Before long a comrade Post said, scanning the computer at a time to sweep out a lot of user name is New,administor password for the empty machine, more frightening is that these machines 3389 port is open, That is to say, someone can log on to your machine without a password and do anything (such as stealing your privacy, files, deleting files for your machine, adding viruses to your machine, trojans, etc.). Some systems in addition to 3389, may have set up a backdoor or installed Trojan virus, so here today for everyone to wake up, do not believe that ghost system, to leave some vigilance.
In order to further strengthen the safety of the ghost system, let everyone use the rest assured, I hope that you install the system after the setting:
1. System Properties--remote--Remove the "Allow Remote Assistance from this computer invitation" and "allow users to connect remotely to this computer" checkbox in front of the check box!
2. Start--Control Panel--management tools--service, "Terminal Services" (allows users to connect to remote computers interactively.) Remote Desktop, Fast User Switching, Remote Assistance, and Terminal Server dependent on this service-stopping or disabling this service can make your computer unreliable. To prevent remote use of this computer, clear the check box on the Remote tab on the System Properties Control Panel item. In parentheses is a description of the service. It's disabled!
3. Start--Control Panel--management tools--local security policy--local policy--User Rights Assignment--allows login via Terminal Services, and you remove "Administrators" and "Remote Desktop Users."
4. Enter Safe mode, the user [new], user [Guest] and user [Administrator] rename, and set a strong password (recommended: Letters + numbers + characters, the combination)! Be sure to do this and add a password to your account this is the minimum security common sense, I hope you do not bother, and this password should be strong enough.
5. Control Panel--windows Firewall--excepted--Remove the check box before "Remote Desktop"!
7. Install the latest version of anti-virus software and firewalls (with the firewall function too much), antivirus software and firewalls must pay attention to the timely upgrade, Ah, but also regularly to the system to do a comprehensive scan (no money comrades can come here to see www.riyou.com, but do not tell others this is what I said Oh ^_^ OH)!
8. Turn on the automatic upgrade function, so that the first time to download to the system patch, to remove the risk of system vulnerabilities.
9. Take a look at the system log (Start-Control Panel-management tools-Event Viewer) to see if there are other users logged in, if so, your system may have been invaded, and the rookie invasion, the old shrimp invasion will generally delete these.
10. Use Netstat-na This command to see if there are open and unfamiliar ports (run cmd, enter netstat-na at the command prompt), and if so, try to close these ports with a firewall.
11. Try not to use the system's own save username and password features.
12. The system is best to choose the pure version, to avoid interference from other software, in the process of installing some software will often appear to ask you whether to install bundled software, try not to install these, they may have malicious code.

Rain forest wind system should also pay attention to see, but overall I still more trust this team production of things, once again thank them for their dedication. But still remind everyone to do some of the above work, so after all, for their own safety!
At the same time, also remind the use of brand-name machine comrades, but also pay attention to the above aspects, to my experience, many brand-name machine system of the Administor Super User password is also empty Oh, so that some black people will have opportunity oh.
Finally sent to the same dish with the gay one word, with the computer do not be afraid to use bad, as long as you do not go every day to dismantle the chassis, do not often touch your hardware, the system has no way to solve the bad, bold to study it, how to do it, but the prerequisite is that your important information do not put on the C disk system disk on the line, out of the problem to try to solve their own , don't first is to want to ask others, not the first is to think of reloading system, to exercise their ability to think problem solving problem

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.