Hacker intrusion into Windows XP

Source: Internet
Author: User

Step 1: Screen Protection

After screen protection is enabled in windows, the system automatically starts the Screen Protection Program as long as we leave the computer (or do not operate the computer) for the preset time, when you move the mouse or press the keyboard to return to the normal working status, the system will open a Password confirmation box. Only after you enter the correct password can you return to the system, users who do not know the password will not be able to enter the working status, thus protecting data security. Tip: some poorly-designed Screen Saver programs do not block the system's "CTRL + ALT + DEL" Combination keys. Therefore, you need to test whether the program has this major bug after completing the settings. However, screen saver can only be automatically started one minute after the user leaves. Do we have to sit next to the computer and wait for n minutes to see the screen saver activated before we can exit? In fact, we only need to open the system subdirectory in the Windows Installation Directory, find the corresponding screen saver (the extension is SCR), right-click and drag them to the desktop, select the "Create shortcut in current location" command in the pop-up menu to create a shortcut for these screen saver on the desktop. After that, when we leave the computer, double-click this shortcut to quickly Start Screen Protection. Tip 2: cleverly hide the hard disk in the "by web page" view mode. A warning message is displayed when you enter the Windows directory, this is a system folder. If "modifying the content of this folder may cause program running to be abnormal, to view the content of this folder, Click Show file ", click "show file" to enter the directory. The reason is that there are two files under the Windows root directory: desktop. ini and folder. htt. Copy these two files to the root directory of a drive (because these two files are hidden files, you must click the "View" tab in the folder options and select "show all files ", in this way, you can see the two files ). Press the "F5" key to refresh the page and see if what happened is the same as when you enter the Windows directory. Next, use NotePad to Open folder. htt. This is a file written in HTML. Use your imagination to modify it. If you do not understand the HTML language, you can first find the "display file" to delete it, find "modifying the folder may cause the program to run abnormally, to view the content of the folder, click "show file" to change it to your favorite text, for example, "Please leave safely and easily ". To view the content of this folder, click "change". Otherwise, you are solely responsible for the consequences! ", Drag the slider down to the last 9th lines and find" ([url = file: // % templatedir %/wvlogo.gif] file: // % templatedir %/wvlogo.gif [/url]) "this is the path of the Gear image in the lower right corner of the window when the warning information is displayed. Change it to the path of your own image. For example, use" D: /tupian/tupian1.jpg "with" // ". Remember to name the image extension here. Otherwise, no image is displayed. Of course, you can also use web tools like Dreamweaver and FrontPage to make better results. Then, you only need to copy the original file to the end of the text below to overwrite the original file "~. * Thisfilewasautomaticallygeneratedbymicrosoftinternetexplorer5.0 * usingthefile % thisdirpath %/folder. htt. Save and exit. Press the "F5" key to refresh it. Is it quite personal? The next step is to use "Super Rabbit" to hide the drive you want and enjoy your work without restarting. The last thing I want to tell you is to simply put the folder. htt in the original file "~ "Delete all content between them, which will create an illusion of an empty drive to open your drive, making the files in it safer. Step 3: Disable the "Start" menu command and integrate the Group Policy Function in Windows2000/XP, you can set various software, computers, and user policies through group policies to enhance system security in some ways. Run the "Start> Run" command, enter "gpedit. msc" in the "open" column of the "run" dialog box, and click "OK" to start the WindowsXP Group Policy Editor. In "Local Computer Policy", expand the "user configuration> Manage template> taskbar and Start Menu" branch step by step, the "Taskbar" and "Start Menu" related policies are provided in the right window. When you disable the "Start" menu command, in the right window, provides policies for deleting the Public Application Group, my documents icon, Document menu, and network neighbor icon in the "Start" menu. When clearing the "Start" menu, you only need to enable the policy corresponding to the undesired menu items. For example, to delete the "My Documents" icon, take the following steps: 1) in the policy List window, double-click the "delete my document icon from the Start Menu" option. 2) In the "Settings" tab in the pop-up window, select "enabled" and click "OK. Step 4: Disable Windows XP desktops with desktop related options, just like your desk, which sometimes needs to be organized and cleaned. With the Group Policy Editor, this work will become easy, as long as you expand the "user configuration> management template> desktop" branch in "Local Computer Policy, the corresponding policy options are displayed in the right window. 1) Hide the System icon on the desktop. If the System icon on the desktop is hidden, the traditional method is to modify the Registry, which will inevitably cause certain risks. The Group Policy Editor is used, this can be easily and quickly achieved. To hide the "Network Neighbor" and "internetexplorer" icons on the desktop, you only need to enable the "Hide network neighbor icon on the desktop" and "Hide internetexplorer icon on the desktop" in the right window. To hide all the icons on the desktop, you only need to enable "hide and disable all projects on the desktop. After the "delete my documents icon on the desktop" and "delete my computer icon on the desktop" options are enabled, the "my computer" and "My Documents" icons will disappear from your computer desktop. If you no longer like the "recycle bin" icon on the desktop, you can also delete it by enabling the "delete recycle bin from desktop" policy item. 2) Disable some Desktop changes. If you do not want others to change the desktop settings at will, enable the policy option "do not save settings when exiting" in the right window. When you enable this setting, other users can make some changes to the desktop, but some changes, the positions and sizes of the labels, window opening, and taskbar cannot be saved after the user logs out. Step 5: Prohibit Access to the control panel. If you do not want other users to access the control panel of your computer, you only need to run the Group Policy Editor, expand the "Local Computer Policy> User Configuration> management template> Control Panel" branch in the left-side window, and then enable the "Prohibit Access Control Panel" policy in the right-side window. This setting prevents the launch of control panel program files. The result is that others cannot start the control panel or run any control panel project. In addition, this setting will delete the control panel from the "Start" menu, and also delete the control panel folder from Windows Resource Manager. Tip: If you want to select a "Control Panel" project from the context menu, a message is displayed, which indicates that this setting prevents this operation. Step 6: Set User Permissions when multiple users share a single computer and set user permissions in Windows XP, follow these steps: 1) run the Group Policy Editor Program. 2) In the left-side window of the editor window, expand "Computer Configuration> Windows Settings> Security Settings> Local Policies> User permission assignment" branch step by step. 3) double-click the user permissions to be changed, click "add user or group", double-click the user account you want to assign permissions to, and click "OK" to exit. 7. Audit of folder settings: Windows XP can use audit trails to access user accounts, logon attempts, system shutdown, restart, and similar events of files or other objects, the audit file and the folder under the NTFS partition can ensure the security of the file and folder. 1) in the Group Policy window, expand the "Computer Configuration> Windows Settings> Security Settings> Local Policy" branch in the right window step by step, select the audit policy option under the branch. 2) double-click the "Audit Object Access" option in the right window. 3) Right-click the file or folder to be reviewed, select the "properties" command in the pop-up menu, and then select the "Security" tab in the pop-up window. 4) Click the "advanced" button and select the "Audit" tab. 5) select your actions as needed: If you want to review a new group or user, click "add" and enter the new user name in the "name" box, click OK to open the audit project dialog box. To view or change the existing group or user review, you can select a user name and click "View/Edit. To delete an existing group or user review, select a user name and click "delete. 6) if necessary, in the "apply to" list in the "Review Project" dialog box, select the place you want to review. 7) If you want to prohibit files and subfolders in the directory tree from inheriting these audit items, select the "apply these audit items only for objects and/or containers in this container" check box. Note: You must be a member of the Administrator group or a user authorized to "manage audit and security logs" in the Group Policy can audit files or folders. Before reviewing files and folders in Windows XP, you must enable "Audit Object Access" in "Audit Policy" in the Group Policy ". Otherwise, an error message will be returned after you set up the file and Folder Audit, and the files and folders are not reviewed.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.