He Rensi is a master in the rivers and lakes. He has no door but no school, but his hands can cure all the systems and computers in the sky, whether it is a hacker camp or Liuxiang Inn, if you encounter an extremely difficult problem, he is asked to come to the medical doctor and become the rule of the rivers and lakes. Although he Rensi's medical equipment is expensive, such a clever medical skill is nothing for those who have important documents and data ......
The following are examples of the machine problems in xuerou. He Rensi's hands on diagnosis and treatment and techniques hope to help you defend against Trojans.
On September 16, July 20, the phone number of xuexiang inn told me that her machine was hacked. I hope I can solve the problem. xuexiang's busy work still needs help. Then I ran to Liuxiang Inn's quiet female square.
Xuerou was first hacked. My analysis was probably due to system vulnerabilities, because she was hacked without using a computer to receive anything. There is only one reason to explain everything, that is, the vulnerability. In addition, xuerou told me that she was tracking and scanning a hacker who attacked Liuxiang Inn. I believed in my initial judgment because most hackers paid great attention to their own security defense consciousness, the firewall is usually installed, and the firewall now comes with an intrusion detection system (IDS = instrusion detection system).BlackICEFor example, they can accurately take the hackers that are scanning your systemIPThe first error of xuerou seems to be a vulnerability ......
Crux: Vulnerabilities
Symptom: the system has not been fully patched, resulting in enemy scanning and intrusion.
Solution:
Most vulnerabilities, especially overflow vulnerabilities, are caused by the programmer's negligence during programming. Therefore, once attackers take advantage of these vulnerabilities, this internal and external attack method may cause serious losses. To address this vulnerability, patch the vulnerability in the most effective way.WindowsThe patch Upgrade Method of the operating system can be roughly divided into two types, one is throughWindowsIn the Start menuWindows UpdateThe biggest advantage of network upgrading is convenience. Of course, a well-known weakness is that you must connect to the network before you can perform network upgrading.UpdateUpgrade. In this case, a problem occurs. Due to the spread of Network viruses such as shock waves, the system is infected with viruses without waiting for me to finish patching.
In this regard, I personally prefer the second method. I will first download the patch package to the hard disk and save it to the partition of the non-system disk. Of course, it is best to burn it into a CD. If this happens again, when we have to re-execute the system, we can finish the virus, for example, preventing virus vulnerabilities such as shock waves, without having to connect to the network, this avoids the embarrassing situation that requires first poisoning to install patches during network upgrades. Below isWindows 2000Major patches of the above versions:
Windows 20000System patch:
Windows 2000 Service Pack 4Simplified Chinese version patch
Http://tjtt-http.skycn.net: 8080/down/w2ksp4_cn.exe
Windows 2000Shock Wave patch
Http://tj-http.skycn.net: 8080/down/Windows2000-KB823980-x86-CHS.exe