How ADSL users defend against hacker attacks

Source: Internet
Author: User
Tags web services administrator password strong password

Because of the depth of our reliance on computers, information security issues are getting more and more attention. In the network technology so developed today, some of the folk network "hackers" can easily steal our private information. Friends who use computers want their computers to be safe, although there are many computers are small white, but, who do not want their own computer security performance high? The following small series to teach you a few simple computer settings, so that your computer away from hackers.

Reject malicious code

Malicious Web pages have become one of the biggest threats to broadband. Before using the modem, because the speed of opening the Web page is slow, before completely open the malicious Web page and avoid the possibility of the recruit. Broadband is now so fast that it can easily be attacked by malicious Web pages.

Common malicious Web pages are because of the addition of malicious code written to be destructive. These malicious code is equivalent to some small program, as long as the page is opened to be run. So to avoid malicious Web page attacks as long as the prohibition of these malicious code to run it.

Run IE browser, click "Tools/internet Options/Security/Custom Level" to define the security level as "security level-high", set the 2nd and 3 items to "disabled" in ActiveX controls and Plug-ins, set the other items to "prompt", and then click OK. This setting, when you use IE to browse the Web page, you can effectively avoid malicious Web page malicious code attacks.

Replace the Administrator account

The Administrator account has the highest system privileges, and once the account is exploited, the consequences are disastrous. One of the common means of hacking is to try to get the password of the administrator account, so we have to reconfigure the administrator account.

The first is to set up a powerful and complex password for the administrator account, and then we rename the Administrator account and create an administrator account that does not have admin privileges to deceive the intruder. In this way, it is difficult for intruders to figure out which account really has administrator rights, and to some extent reduce the risk.

Eliminate the intrusion of the Guest account

The Guest account, the so-called Guest account, has access to the computer, but is restricted. Unfortunately, the guest also opened the door for hacking! There are many articles on the web that have introduced how to use guest users to get administrator privileges, so avoid system intrusions based on the guest account.

Disabling or removing the Guest account is the best way to do it, but in some cases you must use the Guest account, there are other ways to do the defensive work. First, set a strong password for the guest, and then set the Guest account's access to the physical path in detail. For example, if you want to prevent guest users from having access to the tool folder, you can right-click the folder and select the Security tab in the pop-up menu to see all users who have access to the folder. Remove all users except administrators. Or you can set permissions for the appropriate user, such as "List Folder Directory" and "read", and so on, which is much more secure.

Install the necessary security software

We should also install and use the necessary anti-black software on the computer, anti-virus software and firewalls are necessary. Open them on the internet so that even a hacker can attack our security is guaranteed.

Prevent Trojan Program

Trojan Horse program will steal the useful information in the implanted computer, so we also want to prevent hackers implanted Trojan program, commonly used methods are:

In the download file first put into their own new folder, and then use anti-virus software to detect, play an early preventive role.

In the "Start" → "program" → "Start" or "Start" → "program" → "Startup" option to see if there are unknown running items, if any, delete can be.

Remove all suspicious programs that are prefixed with "Run" in the registry Hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun.

To close unnecessary ports

Hackers often scan your computer port at the time of intrusion, and if you have a port monitor installed (such as Netwatch), the monitor will have warning prompts. If this intrusion is encountered, the available tool software shuts down ports that are not in use, for example, using "Norton Internet security" to turn off the 80 and 443 ports used to provide Web services, and some other infrequently used ports can be closed.

Hide IP Address

Hackers often use some network detection technology to view our host information, the main purpose is to get the IP address of the host in the network. IP address is a very important concept in network security, if the attacker knows your IP address, is equal to the target for his attack, he can launch a variety of attacks on this IP, such as DOS (denial of service) attacks, Floop overflow attacks. The primary way to hide an IP address is to use a proxy server.

Compared with direct connection to the Internet, the use of Proxy server can protect the IP address of Internet users, thus ensuring the security of the Internet. The principle of a proxy server is to set up a "staging point" between the client (the computer on the Internet) and the remote server (such as the user wants to access the remote WWW server), and when the client requests a service from the remote server, the proxy server intercepts the user's request, and the proxy server forwards the This enables the connection between the client and the remote server. Obviously, after using a proxy server, other users can only detect the IP address of the proxy server instead of the user's IP address, which realizes the purpose of hiding the user's IP address, and protects the user's Internet security. There are a lot of websites that provide free proxy servers, and you can find them by using tools such as proxy hunters.

Remove folder hidden share

If you use the Windows 2000/XP system, right click on C or other disk, choose "Share", you will be surprised to find it has been set to "Share this folder", and in the "Network Neighborhood" is not see these content, what is this?

Originally, by default, Windows 2000/xp opens hidden shares for all partitions, and you can see a "$" appended to each partition name on the hard disk by selecting System Tools/Shared Folders/shares under the Control Panel/Administrative Tools/Computer Management window. But as long as you type "computer name or ipc$", the system will ask the user name and password, unfortunately, most of the personal User system administrator password is empty, the intruder can easily see the content of C disk, which gives the network security has brought great hidden dangers.

How do you eliminate default sharing? method is simple, open Registry Editor, enter "Hkey_local_machinesystem currentcontrolsetseviceslanmanworkstationparameters", Create a new Double-byte value named "AutoShareWks" and set its value to "0" and restart the computer so that the share is canceled.

Related Article

E-Commerce Solutions

Leverage the same tools powering the Alibaba Ecosystem

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.