First of all, we certainly need to go into the service to see if any dangerous system process is on. Do you see comments? "Allow Remote Registry operation", disable it (Remote Registry). I ordered the AT command and also disable Task Scheduler to prevent intruders from using it to start Trojans.
1. Open the registry and enter
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon
Find a key value DontDisplayLastUserName on the right and change it to 1. If it does not exist, create a new one!
2. It is necessary to prevent empty IPC connections!
Okay. Let's go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa and find this primary key restrictanonymous and change it to 1.
If it is changed to 2, some programs may not run, so it is generally changed to 1.
3. Modify the default port 3389.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlTerminal ServerWinStationsRDP-Tcp
Here, we can find PortNumber, Which is 3389 in decimal format. You can change it to the other four numbers at will. I changed it to 1314.
In this way, intruders cannot intrude into your computer by 3389.
4. Go to cmd and run net share and net user.
See what other shared and suspicious user names are available. The Administrator and Guest are the default ones in the system and do not need to be deleted. How can I add more ×××?
Ignore it. Delete it. (Net user ×××/del)
Disable useless sharing. (Net share C$/Del ,...)
5 Input Method Vulnerabilities
Solution: 1. delete or rename these vulnerability help files.
It is best to delete the WINIME. CHM, WINPY. CHM, and WINZM. CHM help files. Will you delete others?
6 is the most important and useful. It is generally invincible, ^ _ ^.
Under cmd, enter the c: winntsystem32 write command ren net.exe netwei.exe (Press ENTER)
Now, even if someone else enters your computer, they cannot use net user username pass/add to add users.
Net localgroup administrators username/add cannot be used to join administrators ~
This command is used to create a user and improve the administrator. Change to netwei user ..............
7. The last step is also critical. This can prevent formatting!
Write the command in CMD: C:> doskey format = Bad command or file name! (Press ENTER) This is the lock command, you can also lock DEL
When someone maliciously formats your hard disk, the system will display: "Bad command or file name !, Refuse to execute the formatting command
In some special circumstances, if you need to format the hard disk yourself, what should you do? You can enter the following command:
C:> doskey format = (Press ENTER) so that you can FORMAT it as before.