We recently introduced the commercial value of bots and how to check whether computers are Bots. I believe you will have a clearer understanding of bots. The previous article mentioned more than once that "zombie" computers are very easy to get. It is easy for people who want to capture chickens.
This article is intended to tell normal computer users that it is as simple and effective as an attacker's "BOT" to prevent computers from becoming "bots" of others. As long as you realize that if you become a "zombie", you will be very hurt and you will definitely refuse to be controlled by anyone. When we do this, attackers will not try to catch you.
To avoid being a zombie, pay attention to the following points:
Key Aspect 1: piracy of Windows XP poses a huge risk and requires immediate security changes.
If your operating system is installed by other technical personnel or may be pirated XP, such as the ** version of the computer installer, tomato garden XP, rain wood wind XP, and Dragon Wind XP. Many of these systems are installed unattended. The installation process is very simple. If you put the CD on your computer and go out for tea, you may find that the system has been installed.
Where are the biggest defects of such a system? However, the administrator password of the system is empty and is automatically logged on. That is to say, anyone can try to use an empty password to log on to your system, which is no obstacle to the Internet.
Transformation Method:
Modify the administrator user password immediately. The password must be a combination of letters and other special characters and cannot be less than 8 characters long.
To change the logon mode, press ctrl + alt + del to log on.
Point 2: If you leave your computer at any time, we recommend that you unplug the network cable from the computer that cannot be disconnected. We recommend that you lock the computer immediately. Do not allow strangers to physically access your computer.
You can find a windows pe cd, such as a tool disk, which can be used to boot. You can easily modify your Administrator Logon password and your registry information, including writing viruses, then start the virus program.
In the past, a white-collar online bank in Shanghai was transferred by hackers in Yunnan for several hundred thousand yuan at a time. For general online banks, the public version usually limits the withdrawal of about 1000 yuan a day. It is a small payment, and once the account is lost, the loss will not be extremely huge. For professional online banking, if a digital certificate is stored on a local computer, attackers can remotely control your brain when you leave your computer for a long time, transfer property on your computer. This is no different from your local online banking business. For online banking users who use mobile digital certificates, do not give attackers any chance to unplug the digital certificates when they are used up.
Solution:
When you need to leave the computer for a long time, lock the computer or unplug the network cable.
Key 3: ensure that the network firewall is enabled
For Internet users, network firewall (which refers to firewall, not real-time virus monitoring in many people think) is a gateway that isolates you from the outside and correctly enables and configures the firewall, this will reduce your chances of directly facing attacks. When your system has vulnerabilities that have not been repaired, the firewall may be the only solution that can protect your computer security.
However, you don't have to worry about enabling the firewall. The firewall basically only intercepts external-to-internal (from the Internet to the local machine) Communication and internal-to-external access, it is easy to use a variety of methods to cheat, so Trojan horses can escape the firewall to complete the theft task.
Although the firewall is not always effective, it must be enabled if there are more powerful firewalls than none.
Key Aspect 4: pay close attention to security vulnerability information and promptly use various patch repair tools to improve system security
System vulnerabilities are usually exploited by hackers for a long time before they are officially announced. This is generally referred to as 0-day attacks, and such attacks are becoming more and more common. The vulnerability involves windows operating system files and other applications, but the most risky is windows system vulnerabilities. The use of application software vulnerabilities is subject to a large number of environmental constraints, usually with relatively low risks.
Recently, the flash player vulnerability has aroused widespread concern. Attackers can exploit this vulnerability to run arbitrary specified code.
Solution:
If you can use windows update, you must use it to make windows update automatically. See the icon that windows update is working in the lower right corner. Do not stop it.
Some pirated users cannot use windows update or microsoft update normally. We recommend that you use a third-party vulnerability Repair Tool, such as the vulnerability scan and repair module of Kingsoft cleaning experts.
Key Aspect 5: install and use anti-virus software, and regularly check whether the software works properly and whether the virus features can be updated.
Do not assign security questions to anti-virus software. Security is a system engineering, and anti-virus software is only one of them. Anti-virus software is updated only when there is a virus first. In many cases, anti-virus software is installed with various viruses. But this does not mean that anti-virus software is unnecessary. On the contrary, anti-virus software is very important. Without anti-virus software, your system may be worse.
More and more viruses first try to destroy anti-virus software to intrude into your system. Destroying anti-virus software functions may be easier than anti-virus software to combat viruses. Because the target of the destroyer is very clear, that is, the most popular software in the market, it is very easy to work with these security software. In addition, unlike anti-virus software, virus makers must consider the compatibility issues caused by each update. Attackers only pay attention to the tasks that Trojan horses need to complete, with other consequences, virus makers don't have to spend a lot of time thinking about it.
Trojan virus makers hate anti-virus software so that after a considerable number of Trojans intrude into the system, they will first destroy anti-virus software. As long as they are willing to, targeted destruction of anti-virus software can always be achieved, do not expect anti-virus software to be built into a copper wall. Even the operating system can be damaged, not to mention anti-virus software.
We can also regard the working status of anti-virus software as another testing tool: as long as you observe that anti-virus software suddenly does not work, you should first consider whether it is damaged by Trojans.
Solution:
Install an anti-virus software that is suitable for you. During the validity period, always check its functions, such as whether it can be started normally or upgraded normally.
Key 6: Be careful when using mobile storage devices
Prior to the development of the Internet, the spread of viruses was dependent on soft disks, which were then placed on the network. Nowadays, the public is increasingly using mobile storage devices (mobile hard drives, USB flash drives, and digital memory cards) to transfer files. These Mobile storage devices have become an important channel for Trojan Horse propagation. Computer users usually call this virus a USB flash drive or an AUTO virus. This means that you can insert a USB flash drive to spread the virus from a USB flash drive to another computer.
Solution:
Immediately do not hesitate to disable the automatic playback function of the USB flash drive. The convenience of this function is negligible, but the risk of exposure is very important.
You can modify the disabled method in the settings of the overlord.
498) this. style. width = 498; ">
Key Aspect 7: secure Internet access
One of the important reasons for becoming a zombie is browsing insecure websites and distinguishing what websites are secure and what websites are insecure. This is very difficult for common users. In addition, there is a possibility that the original normal website may be intruded into and implanted with Trojans, and there is also the risk of downloading trojans when accessing any web page after being attacked by ARP.
There are always opportunities for downloading Trojans online, which cannot be avoided by anyone. This risk can only be mitigated.
Browser security needs to be paid special attention. browser and browser plug-in vulnerabilities are the favorite of hackers. flash player vulnerabilities are plug-in vulnerabilities, which are cross-browser platforms, this risk may occur in any use of flash player.
Solution:
Fix browser vulnerabilities in a timely manner, upgrade the browser to the latest version in a timely manner, and reduce the time it takes to expose risky systems to attackers.
Avoid browsing gray websites. Generally, the traffic of such sites is relatively large, such as a large number of living communities, online video communities, chat and dating communities, pornographic websites, gambling websites, and so on. If you find any system exception, you should immediately use the method described in "how to check whether your computer is a" zombie.
The above is by no means the whole of security protection. It can be said that it is the most important risk-critical link. Pay attention to the above points for security protection. At least hackers of triangle cats cannot help you.
Security Protection is dynamic. Always Be vigilant. For the internet, you must have a view that regards everything as a threat. For a surgeon, in his eyes, all objects are contaminated by bacteria and viruses, and disinfection is the most basic principle.