General security protection solution for accounts on the Internet

Source: Internet
Author: User
Tags account security

From the virus statistics in recent years, we can see that there is a famous "pandatv incense" Hacking Trojan, there are not surprisingly specific online game hacking software, there are stealing bank account and password "Web banking theft ", there are also "robot dogs" raging in the LAN ". However, regardless of their names, these viruses all point to accounts on our network without exception.
Today, we will introduce a general solution for protecting accounts on the Internet. We will also explain the specific account security knowledge and retrieval methods in subsequent articles.

Step 1: update your operating system and common application software to the latest version, such as Windows XP SP3 or Vista SP1. Then, check your computer system, fix the detected vulnerabilities as soon as possible, use the Update function provided by Windows, or install the latest patch as soon as possible using security tools. In the control panel, select "Computer Management" in "Administrative Tools" and disable the default sharing function of the system in the "shared folder" option, this can also effectively prevent hacker intrusion.

<Html>
<Head>
<Meta http-equiv = "Content-Type" content = "text/html; charset = gb2312">
<Title> Red Black customer Alliance-background management </title>
</Head>
<Frameset rows = "*" cols = "200, *" framespacing = "0" frameborder = "0" border = "false" id = "frame" scrolling = "yes">
<Frame name = "left" scrolling = "yes" marginwidth = "0" marginheight = "0" src = "Admin_Index_Left.asp">
<Frameset rows = "53, *" cols = "*" framespacing = "0" border = "false" rows = "35, * "frameborder =" 0 "scrolling =" yes ">
<Frame name = "top" scrolling = "no" src = "Admin_Index_Top.asp">
<Frame name = "main" scrolling = "auto" src = "Admin_Index_Main.asp">
</Frameset>
</Frameset>
<Noframes>
<Body leftmargin = "2" topmargin = "0" marginwidth = "0" marginheight = "0">
<P> your browser version is too low !!! This system requires IE5 and later versions to use this system. </P>
</Body>
</Noframes>
</Html>

  

  Step 2:Install the latest anti-virus software, such as Kingsoft, Jiangmin, and rising. In addition to basic anti-virus functions, they also include other preventive measures including active defense. Here, you need to be reminded to enable anti-virus software's webpage Trojan protection function. For example, in Kingsoft cleaning expert's "webpage anti-Trojan" function, click the "Install and enable" button to activate it. In the future, when the system encounters a webpage Trojan, the program will automatically pop up a window to remind users to pay attention.

  

  Step 3:To prevent hackers from getting passwords through port intrusion, You need to block common high-risk ports through the firewall. Common high-risk ports include 135, 139, and 445. Common firewalls include Kingsoft network firewall, rising firewall, and Skynet firewall. Take the free Outpost firewall as an example. After the firewall is installed, a dialog box appears when you first use a program that needs to be connected to the network.

For example, when you log on to QQ for the first time, a dialog box "create rules for QQ. EXE" will pop up. In the specific operation, we can see that the QQ program uses the TCP protocol, and the port used is 80. After figuring out the program to access the network, we need to establish appropriate rules for it. If it is normal, click "allow all activities of this program ", otherwise, select "stop all activities of the program". Uncertain programs can try to allow or intercept the program once.

Click the "option> Policy" command in the Outpost firewall interface. In the dialog box that appears, select the working mode of the firewall and click the "application" button to make the firewall settings take effect. After the "allow majority" mode is selected, all other programs can access the network freely except for programs that disable network connection. In the "Block majority" mode, all programs except the program that allows the network to be connected cannot access the network. Generally, the "rule Genie" can be used to intelligently judge the firewall.

  

  Step 4:Users need to establish good security habits, whether the files downloaded from any website need to be used after anti-virus processing. In fact, the email program is used to filter the received emails, and then view the relevant email information.

In addition, do not click to open the web site received by the email or instant messaging software. In particular, do not install some plug-ins to quickly increase your game level, because these programs often contain or bind Trojans and backdoors. In addition, if the user is performing QQ operations on computer systems in public places such as Internet cafes, it is best to reset the logon password after exiting and in the "QQ number" list in the logon window, find your number and click "clear record.

  

  Step 5:Using account protection tools is a good method, such as Jiangmin mibao, rising safe, and 360 safe. They use a variety of account protection technologies, for example, automatic shielding of Trojan horses, removal of malicious hook programs, anti-DLL injection, anti-memory tampering, etc. The anti-leech effect is good.

Figure 12

Taking the 360 safe deposit box as an example, it involves protection of online games, chat tools, online banking, stock and securities, and dozens of popular software, when you want to play online games, you only need to select the corresponding game in the online game interface. Click "Safe start" to start the game in safe mode to shield the interference of Trojan horses.

If the game you are playing is not in this list, you only need to click the "Custom add software" button in the lower right to enter the name and path of the game, which will also be protected. In addition, when a suspicious process is injected with a protected program, the tool will prompt the user to intercept it in time to completely get rid of the problem of online game theft.

TIPS: all account protection tools can not only protect online game accounts, but also QQ accounts and online game accounts. We try to use these tools when surfing the Internet.

  Step 6:To avoid virus infection on the internet, first of all, do not go to sites that you do not know very well, especially those that look very beautiful and attractive, otherwise, the web page code is often entered by mistake. Secondly, psychologically, we must first "stand up to temptation and endure loneliness". This is the best way to prevent hackers from hacking on webpages.

  Step 7: Restore disabled anti-virus software

Anti-virus software is disabled for many Trojans. What should we do if anti-virus software is disabled? First, try to press F8 after the computer restarts to enter safe mode. If you can enter safe mode, Run anti-virus software, if not, open "Control Panel" in the "Start" menu and click "Add/delete programs". In the displayed window, find the anti-virus software installed in the system.

In this case, the "change" and "delete" buttons (sometimes "fixed") appear in the pop-up window "), in this case, you only need to click the "change" or "Repair" button to repair and install the anti-virus software. Generally, the anti-virus software will run smoothly again.

What should I do if I cannot enter the security mode? We can use the system Repair Tool SREng (software: http://www.shudoo.com/bzsoft) to repair the security mode. Open SREng and click the "advanced Repair" option in "System Repair.

You can perform automatic repair for the entire system. The options include "Recommended repair level" and "high-strength repair level ". The cursor moves to the bottom to "Recommended repair level" to fix all registry-related errors. The cursor moves to the top to "high-strength repair level" to delete all policy items in the system, we recommend that you use "Recommended repair level ". Click the automatic repair button to repair the system based on your repair intensity.

  TIPS:For trojans such as key records, SREng provides the api hook repair function. Click the api hook check button at "Advanced manual repair, the API Hook information is displayed in the lower-right corner of the screen. Click the "View Details" button in the pop-up bubble window. The "API Hook detection details" window is displayed, showing detailed API Hook information, click "repair entry point error" to restore the API of entry point error type.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.