How to prevent hacker attacks

Source: Internet
Author: User
Tags administrator password

At present, the use of ADSL users more and more, because ADSL users online long, fast, so hackers are targeted. Now there are a variety of more and more detailed "IP address library", to know some ADSL users of the IP is very easy things. How to defend your network security? Look at the following methods.

One, remove folder hidden share

If you use the Windows 2000/XP system, right click on C or other disk, choose "Share", you will be surprised to find it has been set to "Share this folder", and in the "Network Neighborhood" is not see these content, what is this?

Originally, by default, Windows 2000/xp opens hidden shares for all partitions, and you can see a "$" appended to each partition name on the hard disk by selecting System Tools/Shared Folders/shares under the Control Panel/Administrative Tools/Computer Management window. But as long as you type "\ computer name or ip\c$", the system will ask the user name and password, unfortunately, most of the personal User system administrator password is empty, intruders can easily see the content of C disk, which brings great potential for network security.

How do you eliminate default sharing? method is simple, open Registry Editor, go to "hkey_local_machine\system\currentcontrolset\sevices\lanmanworkstation\parameters" , create a new Double-byte value named "AutoShareWks", set its value to "0", and then restart the computer so that the share is canceled.

Second, the rejection of malicious code

Malicious Web pages have become one of the biggest threats to broadband. Before using the modem, because the speed of opening the Web page is slow, before completely open the malicious Web page and avoid the possibility of the recruit. Broadband is now so fast that it can easily be attacked by malicious Web pages.

Common malicious Web pages are because of the addition of malicious code written to be destructive. These malicious code is equivalent to some small program, as long as the page is opened to be run. So to avoid malicious Web page attacks as long as the prohibition of these malicious code to run it.

Run IE browser, click "Tools/internet Options/Security/Custom Level" to define the security level as "security level-high", set the 2nd and 3 items to "disabled" in ActiveX controls and Plug-ins, set the other items to "prompt", and then click OK. This setting, when you use IE to browse the Web page, you can effectively avoid malicious Web page malicious code attacks.

Third, the "back door" of the hacker who sealed the dead

As the saying goes, "smoke", since hackers can enter, that means that the system must exist for them to open the "back door", as long as the door to block the backdoor, so that hackers have nowhere to go, there will be no worries!

1, delete unnecessary agreement

For servers and hosts, it is usually sufficient to install only the TCP/IP protocol. Right-click Network Neighborhood, select Properties, right-click Local Area Connection, select Properties, and uninstall unnecessary protocols. Among them, NetBIOS is a source of many security flaws, and for hosts that do not need to provide file and print sharing, it is possible to turn off the bindings in the TCP/IP protocol NetBIOS to avoid attacks against NetBIOS. Select TCP/IP protocol/Properties/advanced to go to the Advanced TCP/IP Settings dialog box, select the WINS tab, and uncheck "Disable NetBIOS on TCP/IP" to turn off NetBIOS.

2. Turn off file and print sharing

File and print sharing should be a very useful feature, but it is also a good security breach for hackers when it is not needed. So without the need for "file and print sharing," we can turn it off. Right-click Network Neighborhood, select Properties, and then click the File and Print Sharing button to remove the hooks from the two check boxes in the File and Print Sharing dialog box that pops up.

Although file and print sharing is turned off, it is not guaranteed to be secure, and the registry is modified to prevent people from changing file and print sharing. Open Registry Editor, select the "Hkey_current_user\software\microsoft\windows\currentversion\policies\network" primary key, and under that primary key, create a new DWORD type key value. The key value is named "Nofilesharingcontrol" and the key value is set to "1" to prevent this feature from being changed for "File and print sharing," and the key value "0" indicates that this feature is allowed. This removes file and print sharing from the Properties dialog box in Network Neighborhood.

3, the Guest account is disabled

There are a lot of intrusions through this account to further obtain the administrator password or permissions. If you don't want to give your computer to others as a toy, it's a good ban. Open the Control Panel, double-click Users and Passwords, click the Advanced tab, and then click the Advanced button to eject the Local Users and Groups window. Right-click on the Guest account, select Properties, and choose "Account deactivated" on the "General" page. In addition, renaming the administrator account can prevent hackers from knowing their administrator account, which will largely guarantee computer security.

4, prohibit the establishment of a null connection

By default, any user can connect to the server via a null connection, enumerate the accounts, and guess the password. Therefore, we must prohibit the establishment of an empty connection. The following two kinds of methods are available:

Method One is to modify the registry: Open the Registry "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa", the DWORD value "RestrictAnonymous" To change the key value of "1" can be.

Finally, we recommend that you put a patch on your system, Microsoft's endless patches are still very useful!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.