Move toward the safest system, clear vulnerability privacy

Source: Internet
Author: User

Have you ever encountered a system that has been compromised by someone else and has no privacy? Have you ever heard of your password being snooped into by someone else deleting a Sam file or using a brute force cracking tool? Have you ever seen someone else occupy the right to use the computer after you temporarily leave the computer for a few minutes? All of the above situations are due to the poor confidentiality measures of the system. So what is the most effective way to prevent malicious system access?

I. Security Assurance

If we need to temporarily leave the computer for a few minutes, the quickest and best way to use it is to press the "Win logo + R" key combination. This method not only keeps the program running, in addition, it can ensure system security. The only requirement is that the password is not a weak password!

2. Self-made dongle

Some may think of dongle because it is implemented based on hardware and cannot be skipped through simple software cracking. Of course, some people have simulated the dongle through software, but the method is very complicated and is not what the average person can grasp.

Today, I would like to recommend a software. We can use this tool to create our own hardware dongle, which can be a general mobile hard drive or a general USB flash drive. When a good hardware dongle is not inserted into our computer, the system cannot log on, even if the Sam file is deleted or the administrator user and password are obtained in advance. In addition, when we remove the hardware dongle from the computer, the system immediately enters the locked state. The only way to unlock the dongle is to re-plug it into the computer.

Step 1:Download and install Dekart Logon. Next, click "Next" to enter the user information. Here, we need to enter the registration code. Because the trial user does not have a registration code, this item is not required, after the installation is complete, the corresponding Dekart Logon icon is generated on the desktop and the Start Menu.

Step 2:Plug the USB flash drive used as a dongle in the USB Plug-in of the computer and start Dekart Logon. The software detects the type, available capacity, write protection, and other information of the currently inserted USB flash drive. If you click the left mouse button on the displayed USB flash drive information, you will be prompted to enter the password for Windows. This password is the password we just used to log on to the system. After you enter the correct password, it indicates that the hardware dongle is successfully created. You need to restart the computer to make it take effect.

498) this. style. width = 498; "align = no>

Step 3:The computer cannot be automatically locked if the dongle has not been configured with Dekart Logon. We need to further configure: Start Dekart Logon and select the "Settings" tab, select "lock workstation" in "key removal behavior" to implement the function of automatically locking when the dongle is pulled out or stopped. In addition, if you check "allow logon only with key" in "additional security", you cannot access the system even if you know the administrator password, the dongle must be inserted to automatically log on to the system.

Step 4: If the dongle is taken to the system, it will still be illegally logged on. In this case, we need to further encrypt our dongle. Start Dekart Logon, select the Settings tab, and click "change pin" at "Key Settings. In the pop-up window, enter the password we set. In this way, when someone else obtains our dongle and logs on to the system, there will also be a prompt asking for a password. Further encryption is achieved.

498) this. style. width = 498; "align = no>

If you want to delete the software, you can directly execute the uninstall program, or enter the registry, find the hkey_local_machinesoftwaremicrosoftwindowscurrentversionun key value, and delete the runlogonutility value to cancel the Automatic startup of Dekart Logon.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.