Fully build personal network security XP article _ Security-related

Source: Internet
Author: User
For netizens, a variety of potential threats may come at any time. In these threats, often is "Ming gun good hide, stabbed difficult to prevent", network virus, hacker tools we pay more attention, the loss is relatively few, but for the use of special means to spy on personal privacy, but have overlooked. Clearly has caused the privacy of the leak, but no knowledge. Therefore, what kind of measures to ensure personal network security, must become the network users are the most concerned about the problem.

One, the network stealth method

Remind netizens who often surf the web to note that Win9x above operating system can have memory function to the information of the previous user login, the next time we restart the computer, we will find the last user's login name in the username column, this information may be exploited by some illegal molecule, and give the user a threat, It is necessary for us to hide the name of the user who logged on to the computer. There are three ways to use this, with the following steps:

First, open the Local Area Connection properties (Control Panel → network connection), select "File and Printer Sharing for Microsoft Networks" on the General tab, click the Uninstall button, and click OK in the pop-up dialog box to ban the File and Printer sharing on a Microsoft network, which hides the computer.

The second method: first open Registry Editor (start → run →regedit), find "hkey_local_machine\system\currentcontrolset\services\lanmanserver\ Parameters Branch, in the right pane, change the value of "Hidden" (REG_DWORD) to 1 (0 is not hidden), quit Registry Editor when you are done, and restart your computer.

The third method: first, open the Run dialog box on the Start menu, enter the Gpedit.msc command in open, Start Group Policy, click Computer Configuration →windows settings → local policy → user rights assignment, and in the right window, find deny access to this computer from the network , double-click, click Add User or group, click Advanced in the pop-up dialog box, and use the Find Now feature to select which users are blocked from accessing the computer over the network. Use the above method to reset later, rest assured! Your computer has been hidden, no longer need to worry about the problem of resource leaks!

II. Update your software regularly

To protect your computer from Internet attacks. Our antivirus software needs to be updated regularly. At present, most anti-virus software has automatic reminder function, if your virus library has been used for some time without updating, anti-virus software will be pop-up reminders, please be sure to update your anti-virus software in time. Antivirus software for the virus in the library does not define the virus is not. If you do not, you will pay a heavy price.

In addition, it is necessary to update the Windows operating system itself. The current Microsoft security patch frequency is very high. But on the other side, Microsoft, while not avoiding vulnerabilities, has been actively taking steps to be effective. From Windows98 to the latest version of Windows, there is a link to the Windows Update site in the Start menu, Windows2000 with Service Pack 3, and XP with Automatic Updates to automatically download the latest upgrade files in the background. Keeping computer software in the latest version is a great help for computer security.

Also be wary of shared services like Kazaa files, because these file-sharing services are a lot more traps than they were a few years ago. If you want to use this kind of software to download files, be sure to check the size of the file is not reasonable, especially to check the file you downloaded the real name. Doing so also does not guarantee 100% security, because Peer-to-peer (point-to-point) shareware itself is an unsafe factor. You can go here to see the reports of Kazaa being used in the spread of the virus. http://www.blue198.com.cn/news/findnews/shownews.asp?newsid=4328, you can also search for "Kazaa" to learn about the relevant information on Www.google.
  
Third, configure the Windows XP firewall

Installing and configuring a firewall is a good way to protect your computer or network effectively today. But need to have an integrated firewall/nat CABLE/DSL router, or a firewall software, such as Zonealarm,blackice. You can also use Windows XP Home Edition or Professional Edition. The firewalls we will be configuring here, and most firewall software, have the default configuration of shutting down all data receiving ports. So, if you want a computer on the Internet to access certain parts of your network, you must modify the default configuration. Also, you need to check your applications to determine which ports they will use. All software vendors will add this information to their own software. Now we're going to configure the two most common firewalls. Main role: Firewall program with Windows XP operating system and a common CABLE/DSL router.

How do I configure the Windows XP firewall? First you need to activate the firewall. For example, in English XP, go to the Start/control panel/network and Internet connections/network connections, and then right-click your Internet connection and choose Properties ", when you enter the property page, select the" Advanced "tab, and then click" Internet Connection Firewall ". What we do at the moment is just to get the composition of a packet filter and link level gateway to work. Your computer will now record local programs that are intended to access the Internet to be used as a reference for incoming data checks. Packets that are not requested are blocked by firewalls. If you also choose to open Internet Connection Sharing, firewalls will also accept requests from computers that are connected to your network, like gateways. XP firewalls can effectively block unauthorized data from outside.

In addition, configuring the Firewall service is also critical because XP firewalls cannot filter the data you send, which is a major shortcoming. This is also a dangerous danger. Because your computer is likely to be placed in a Trojan horse without your knowledge, the Trojan horse program sends your personal information to the default location of the extranet. Does not filter the outgoing data, means to open the door to the Trojan program. For this reason, you need to make sure you update your anti-virus software regularly. If you want to allow extranet access to programs on your intranet, such as Web pages or FTP servers, you must configure them in the firewall settings bar. Go to the Advanced tab of the Internet connection properties and click the Settings button at the bottom of the dialog box. Each list option on the screen represents an operating system preset service that you can set to allow a service to be accessible from a specific port to other computers on the extranet. For example, select the Web Server (HTTP) list item, and then click the Edit button. As you can see, the pop-up dialog box lists the description of the service, which facilitates ease of operation. "Name or IP address of the computer hosting"-Your network "--establish the hostname or IP addresses of this service--this text box needs to fill in the name of the intranet computer you want to be able to access by the extranet or I P address. The External Port # (external port number) is used to specify the port number that the intranet HTTP service opens to the extranet. The "Internal Port" (internal port number) is used to specify the ports that the intranet computer accesses to ask for this service. If the HTTP service is running on an intranet computer instead of the gateway, it needs to fill in the service port of the intranet computer running the service. This step is called port mapping. Port mapping enables access to specific port services from the Internet to the local area network internal machines. How do you make it easy to create your own services? It's really simple, you just need to figure out which port the service is going to open to the extranet, and whether it's following TCP or UDP protocol. If it's easy, it's OK to keep the external port number consistent with the internal port number when the port is mapped.

As we all know, in recent years, a variety of viruses and hacking software, despite a wide range of network firewalls and anti-virus software protection, but also often is impossible. So we should also remind you that: in our use of computers, in order to the local security of data must be a layer of fortification, can not be careless, not only to open the virus firewall, but also to open the network firewall-to ensure that the computer and the entire intranet security, with such "multiple insurance" we can be more secure in the network!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.