How can we do a good job in the early stages of ADSL security?

Source: Internet
Author: User

ADSL Internet access is widely used in home applications. As bandwidth increases, more users also choose routers to build a home board network. However, all this is achieved through ADSL access. If the security protection of ADSL is not well done, it will not only pose a threat to the computer system, but more importantly, it may involve the loss of personal property. It can be seen that it is necessary to do a good job in the early stage of ADSL security.

System Security first

In fact, ADSL is intruded, many of which are caused by system vulnerabilities. If hackers get the root of your system, they can use a Trojan horse or a dedicated ADSL password listener to get your account information. The most common intrusion method is weak passwords. In combination with the conventional IPC sharing vulnerability, it is not difficult to enter the system.

Enter CMD and enter net share and press Enter. If the disk C, D, and admin are shared, delete it immediately. You can use Windows to directly enable sharing, and the default sharing method of the system will bring a disaster tolerance to the system.

Enter the net share Name $/del and press enter to delete the share by default. However, this completes the first step. If your Administrator does not set a password, set a relatively complex password immediately. If you use a non-Administrator account, you need to set a password for the default Administrator. a blank password is not a fun task. Win + R open and run. Enter control userpasswords2 and press Enter. Select Administrator and set the password. Because the author uses the default Administrator account, this function is disabled and must be switched to another Administrator.

In the end, remember to enable automatic updates to keep the system updated. You know, today many "0-day" organizations are focusing on these vulnerabilities. Even a very small time difference, your system may be captured by thousands of black hands on the Internet.

Supplemented by software protection

In this regard, it is relatively simple to use anti-virus software, firewall, and malicious rogue protection software. Anti-virus software I recommend Kaspersky or McAfee outside of China. The Firewall uses the built-in systems. Of course, if you have more needs, you can choose Look 'n' Stop and ZoneAlarm. We recommend that you use the default settings for beginners. It is recommended that you do not set the default settings so that the network cannot be connected or the wireless signal strength is greatly reduced.

As for the protection software against malware, I think this is based on national conditions. It is not terrible to know that malware itself is not a big deal to compensate for the speed of the network. However, nowadays, the malware in workshops is bundled with Trojan viruses, and the accounts are regarded as huge, you have to defend against it!

We recommend 360 security guard. We have used upiea before, but later we were unable to compete with the Qihoo team in terms of update speed and function expansion. In terms of cooperation, third-party browsers are also very important. At least they can shield some cainiao-level malicious plug-ins. FireFox and roaming are all good choices.

Password Management is heavy

Do you like to activate the ADSL routing function by entering the user name and password, and then enabling automatic Internet access? This is indeed convenient, but it is also dangerous. Have you modified your ADSL logon password? If the other party knows the IP address and can log on using the default password, the ADSL account will be enough. You can search for any type of ADSL on the Internet. The default logon information of each type of ADSL is provided in many places.

The details of the branches are stable.

Basically, if the "hacker" on the Internet cannot obtain your account, his confidence will be greatly compromised and his patience will no longer exist, at this time, he wants to find a new target. From the perspective of the author, it is still cainiao who are still hacking and stealing others' information. They only offer three or four moves, but still cannot ignore some details. Here, we only remind you that you can search for related information on Google: 1. remote service problems; 2. specific port threats; 3. camouflage and proxy applications of IP addresses.

Related Articles]

  • Consumers who have been compromised by ADSL users should strengthen their awareness of Network Security
  • Improve Security Awareness: Be careful with your ADSL cat

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.