1. What are system vulnerabilities:
System vulnerabilities, that is, the operating system is not fully considered during design. When a program encounters a seemingly reasonable problem that cannot be actually handled, unexpected errors are caused. System vulnerabilities are also known as security defects.
The adverse consequences for users are described as follows:
1. The vulnerability is exploited by malicious users and may cause information leakage. If a hacker attacks a website, the vulnerability may be exploited by the operating system of the network server.
2. inconvenience caused to user operations, such as unknown crashes and file loss.
3. Blue Screen crashes
If a vulnerability exists in the system, viruses and Trojans may frequently occur. For example, many users have been tortured by the previous ANI vulnerability before being patched.
Ii. system vulnerability check
System Vulnerability Detection allows you to perform routine System Vulnerability Detection and weak password detection on your operating system, and provides you with suggestions and solutions to fix these vulnerabilities. Jiang Min will add the latest patch to the system vulnerability patch library in the shortest time. Users can update the latest patch library after upgrading, this ensures timely detection and repair of all system security vulnerabilities. The usage is as follows:
1. Start anti-virus software for Jiangmin (there are many methods, such as from the program, or right-click the monitoring center in the lower right corner of the menu, and do not detail it ).
2. Click the tool-system vulnerability check menu to start the system vulnerability check program.
If no system vulnerability check item exists in the tool menu, perform the following operations:
(1) Click smart upgrade
(2) Select the plus sign (+) before the Jiangmin public component in the module to be upgraded,
(3) Click the box before the security center/system check to confirm that this option is selected,
(4) Click Start upgrade. After the upgrade is complete, check again. OK. The system vulnerability check item appears.
3. Start the system vulnerability check program, select system vulnerability check, and click check,
Scan the system. After scanning, vulnerabilities in your computer are displayed on a webpage, you can click the download link on the webpage to download the corresponding vulnerability patch, or download and install all the patches. If no system vulnerability is detected through the system vulnerability check, you will be prompted: Your computer is currently secure. Please use the system vulnerability check frequently to ensure the security of your computer.
We recommend that you check system vulnerabilities at least once a month.
Iii. Weak Password check
After the system vulnerability check program is started, select "weak password check" and click the check button. KV2007 starts scanning weak password users in the system. After scanning, the weak password user is displayed on the webpage, reminding the user to change the password. (It is basically the same as the system vulnerability check operation.
Note: Only the password of the operating system user is checked, and the email account and QQ password are not checked.
Appendix: What is a weak password?
Weak passwords refer to passwords that only contain simple numbers and letters, such as "123" and "abc", because such passwords are easily cracked by others, in this way, users' computers are at risk and therefore are not recommended to users. A user's password must contain at least eight characters, including letters, numbers, and symbols.