Network security policies recommended by hackers

Source: Internet
Author: User

In the age when viruses run rampant and horses graze at will, the most talked about by netizens is system damage and viruses invade into the system. To be honest, you have to check the computer of your family and neighbors before every business trip. You might say, isn't it enough! Yes, I'm full, but it's definitely not something to do. Because I often go on a business trip and receive calls from my home, there are usually three sentences: "I can't drive my computer!" "The computer is so slow now! What should I do ?" The fourth sentence is to ask me when I will return. People who can use computers may not be able to use them well. Can they install anti-virus software to prevent all viruses? Can firewall software be used to defend against hacker attacks? As a hacker, I have to say that it is not that simple. What measures should most people take to prevent hackers, viruses, and malware?

1. Delete junk files and eliminate Trojans and viruses in the breeding ground. When you are browsing website information, some files are left on the local machine, and viruses are often lurking in it, in particular, some advertisement code, malicious scripts, and trojan programs. These files are concentrated in subfolders under the Documents and Settings folder of drive C (you often use logon accounts, such as admin, that is, when you install the machine, enter the login account name) the temp folder in local setting. We only need to press Ctrl + A to select all and then delete it. Note: The local setting folder is a hidden property by default. Therefore, you must make the system display all the hidden files. I don't know how to do this. I think everyone should.

Ii. Disable automatic playback to avoid indirect infection with DC, DV, Mp3, Mp4, and other entertainment and leisure devices. At the same time, it also adds a threat to our already fragile system. Many people habitually connect these mobile storage devices to their computers and directly transfer files, images, and videos. In fact, this habit is easy for you to trick. Once upon a time, the neighbor's computer discovered that the hard drive could not be opened by double-clicking. A dialog box "select Open Mode" was displayed, in fact, being infected with the autoruan virus. These viruses are mainly transmitted by mobile storage devices. Because data is frequently exchanged on disks, they are likely to be infected with viruses. Many people know that hard disks have encryption areas and mobile storage devices are also used to store device and manufacturer identification information, which is not big, dozens of K, and the maximum is not more than several hundred K. Some viruses and malicious code programs are written specifically for the encryption zone of Mobile storage devices. Even if you format a USB flash drive, they still exist. This poses a certain threat to individuals and enterprises. As far as I know, some large companies and enterprises have formulated rules that prohibit the use of USB flash drives to copy files within the company in order to prevent their confidential information from being transmitted through USB flash drives. For the convenience of reading data files, individual users still need to use mobile storage devices. How can we minimize security risks? To disable the automatic playback service for Windows, enter gpedit during running. msc, open the Group Policy, open the "System" option in the management template under the user configuration, double-click "Disable automatic playback" in it, and select "enabled ", select "All Drives" to disable the automatic playback service. For some novice users, it is also a good choice to use Dacheng's USB flash drive immune system if they want to save trouble.

3. Security Risks of household photo headers personal privacy is no more important for anyone. However, today's hackers, for the sake of Money, are cool. If you happen to have a camera, and you happen to be installed with Trojans, keyboard recorders, and other gadgets, congratulations! Your machine has become a zombie in your hands, it is also possible that your camera will take control of all your activities, or even some abnormal people may install a pinhole camera in the bathroom and dressing room to capture some information for sale. Camera head costs are low. When "Vampires" such as China Telecom, China Mobile, and China Netcom are drinking the blood of our taxpayers, the birth of Voip and the wide application of network communication software have saved us a lot of Money. However, it also causes some security risks. When you video videos with others, if the other party has a targeted Trojan Horse on your machine, then all your activities will be visible to others. Some time ago, the fierce video leakage on the Internet exists. You only need to add a small piece of code to the Trojan horse to remotely control your camera. Hackers using tools can capture the conversation information between you and the other party, capture your screen, and even use your camera header to monitor you. This is absolutely feasible, and you still don't know. Then you may ask, shut down the camera, isn't it enough? The answer is no. By adding a short script to a Trojan or virus, you can remotely switch your camera. Everything you do in the room is clear. There is a saying that you are afraid of stealing thieves, and you are afraid of thieves thinking. There is no special solution to the security risks brought by home cameras. Usually, after chatting is completed, immediately unplug the camera to avoid such a situation. But for a lazy who does not shut down during the night, they need to cover the camera with a cloth or a pot of flowers while sleeping.

4. How to Prevent the leakage of personal information, usually password leaks in personal computers, game account leaks, and other events are caused by viruses, Trojans, and malicious programs, these programs implant a tiny keyboard recorder in your computer to record your personal information. In the third part of ziming's hacker story series, hackers steal banks and give a detailed introduction to the keyboard recorder. Some personal suggestions for dealing with the keyboard RECORDER: when you enter the password, make several more mistakes first. When selecting the input box, use the mouse to constantly change the position. Try not to enter the first position first. Now the network bank and QQ login account have enabled the soft keyboard function, after the previous soft keyboard input, the cursor position remains unchanged, but now it is good, each time you open the input once, the letters and numbers on the keyboard will be changed once again, which leads to the failure of the Hook. Are these hackers unable to crack the Hook? The answer must be no, but it is sufficient for individual users.

Summary: when updating system patches, individual users must upgrade anti-virus software in a timely manner. Do not think that the anti-virus software can automatically scan and kill viruses. It can only scan known viruses in the virus feature library, viruses that have not been written by hackers are ineffective. The best preventive measure is to be less curious. Do not browse unknown websites or download Unknown programs, especially the URLs that look weird. You really want to browse the snapshots in the search engine. Be careful with P2P software such as Emule and vagaa, because these software is also a breeding ground for more viruses. The most important thing is to increase your awareness of network security and prevent network security. Instead of protecting others, you must protect yourself from curiosity, ignorance, and greed, this is your best precaution. It is not that easy for hackers to enter the door.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.