When many technical vulnerabilities in Windows are damaged, the security of Internet cafes is threatened by the technical vulnerabilities in Internet cafes. The Internet cafe application environment involves not only the operating system, but also the network, online games, and billing management software. This also makes the Internet cafe application environment numerous technical vulnerabilities. More importantly, the countless technical vulnerabilities have brought huge economic losses to Internet cafes. As a result, a technical competition between the attackers and Internet cafe network administrators has been staged. What puzzles Internet cafe network management is how to effectively block technical vulnerabilities in Internet cafes?
What are the technical vulnerabilities in Internet cafes?
I am afraid no one can give an accurate answer to the number of technical vulnerabilities in the actual application environment of Internet cafes. Strictly speaking, the technical vulnerabilities of Internet cafes refer to some technical vulnerabilities that are powerful and destructive to the normal operation of Internet cafes and have destructive power on the billing system. In general, the technical vulnerabilities of Internet cafes mainly fall into the following categories:
1. Internet browser-based technical vulnerabilities: As we all know, in Windows, Internet era, Internet Explorer has become a "curse ", many vulnerabilities are caused by IE. In the application environment of Internet cafes, Internet Explorer-based technical vulnerabilities have become a time bomb for Internet cafes.
Attackers can exploit Internet Explorer vulnerabilities to do many bad things. Currently, many Internet cafes use some functions of billing management software to restrict users from viewing files on hard disks to prevent malicious damages. However, with the vulnerability of Internet Explorer, attackers can easily break through the lock of billing management software and view files on the computer hard drive of Internet cafes. In the address box of IE browser, enter drive letters such as C:/to view the files in the hard drive partition. After you view the content on the computer hard disk of an Internet cafe, put a trojan in the computer or get a hard disk logic bomb. The fate of the Internet cafe computer can be imagined.
2. Technical Vulnerabilities Based on billing management software: In the price war, the internet price for Internet cafes is not as expensive as a kilo of cabbage. However, some people are still figuring out how to access the Internet for free, get rid of the restrictions of billing management software. Enter the keyword "billing management software vulnerability" in Google, Baidu, and other search engines at will. We can see 129000 search results, most of which are articles about how to avoid billing management software.
Figure 1 shocking billing management software Vulnerability
I will not describe how to damage the internet cafe's billing management software. The vulnerability based on the billing management software has become one of the most dangerous vulnerabilities for Internet cafes. It is also a technical problem that troubles Internet cafe network management.
3. File Download-based technical vulnerabilities: Many network administrators believe that the "File Download" function of the operating system is a hidden risk in the internet cafe application environment. Some hacker software and software that damages the internet cafe billing system are downloaded from the Internet. Because of this, file downloads become a technical vulnerability and a high-risk vulnerability in Internet cafes. It is true that the Internet cafe's billing management software can restrict file downloads. By modifying Shell32.dll, it can also restrict file downloads. However, these methods of blocking file downloads already exist on the Internet.
In short, the technical vulnerabilities of Internet cafes are not limited to the above three categories. With the development of technology, there will be more technical vulnerabilities in Internet cafes, and the normal operation of Internet cafes is also affected by these technical vulnerabilities. As a network administrator responsible for ensuring normal operation of Internet cafes, how can we effectively block these technical vulnerabilities?
How can I block Internet cafe technical vulnerabilities?
What measures should network administrators use to block these technical vulnerabilities? In addition, some methods have been used to block the technical vulnerabilities of Internet cafes. In this case, blocking the technical vulnerabilities of Internet cafes by network administrators is undoubtedly a challenge. Therefore, the network administrator must find a relatively effective blocking policy.
1. Block Internet Explorer-based technical vulnerabilities: Although there are many Internet Explorer-based technical vulnerabilities and new vulnerabilities, Internet Explorer-based technical vulnerabilities are constantly emerging, the harm to Internet cafes is to view files on the computer's hard disk through the IE browser, so as to damage the billing management software or hard disk files. To this end, you only need to restrict users from viewing hard disk files through IE.
In Vientiane or Pubwin, the two mainstream Internet cafe billing management software, there are related management options, prohibit users from viewing hard disk resources through the address bar of IE browser. In addition, users can also use third-party optimization software to prohibit users from viewing hard disk resources through the address bar of the IE browser. In contrast, it is safer to use third-party software to block technical Vulnerabilities Based on IE browsers, because the use of billing management software to block vulnerabilities has certain defects. Once the owner disables the billing management software, there is no way to talk about the technical vulnerabilities that block ie browsers using the billing management software.
2. Block the technical vulnerabilities of the billing management software: the technical vulnerabilities of the billing management software are nothing more than making the billing management software ineffective and surfing the Internet for free. In general, the attacker uses the Input Method Vulnerability and deletes the management software in security mode to terminate the operation of the billing management software. This is also the direction to block the technical vulnerabilities of the Software Based on billing management.
To prevent the owner from terminating the operation of the billing management software, you must add the vulnerability of the smart ABC Input Method to the vulnerability. You can use the smart ABC Input Method of version 5.22. In addition, you must disable the security mode to avoid deleting the billing management software in security mode. The most important thing is that some billing management software can work under multiple protocols such as IPX and IP. In this case, the network management must allow the billing management software to work under the IP protocol. If you use the IPX protocol in the billing management software, once you delete the IPX protocol, the billing management software will not work. However, if you use the IP protocol, this vulnerability will not exist, you cannot access the Internet because you have deleted the IP protocol.
Figure 2 latest smart ABC Input Method
3. Block download-based technical vulnerabilities: For file downloads, many Internet cafe network administrators disable download. In fact, the "File Download" restrictions are removed.
There are too many methods. Therefore, it is not wise to restrict file downloads. For Internet cafes, an idle hard disk partition is opened for users to store and download files. It is true that when files are downloaded, users may download Trojans or damage software. However, Trojans or malicious damage software can be blocked by anti-virus software, you do not have to restrict downloading to prevent trojans from entering the computer. if you have too many restrictions, the effect may be counterproductive.
Some technical vulnerabilities in Internet cafe operations can be blocked by technical means, and some can only be resolved by other means, rather than simply blocking. Whether blocking or resolution, the ultimate goal is to ensure the normal operation of Internet cafes.
Conclusion: At the technical level, the Internet cafe system and network are not absolutely secure. Blocking is not the only way to eradicate Internet cafe technical vulnerabilities. Internet cafes are a service-oriented place. Therefore, when using technical means to block technical vulnerabilities in Internet cafes, we must ensure the interests of users to the maximum extent, because users are God, does not guarantee the interests of God. How can Internet cafes survive?