Six tactics in the system: Creating a system with no installation

Source: Internet
Author: User

Editor: this is an old article.

When talking about hackers, you may think of the unpredictable masters in The Matrix. In fact, there are countless powerful and easy-to-use hacker software, even the novice online worms can use these ready-made attack software to become the most lethal hacker hero. However, we do not want to be overly afraid of hackers. We can do a good job to prevent hackers from getting started.
Step 1: select the Operating System

Because Windows 98 is easy to use, it is the preferred operating system for many friends to access the Internet. However, Windows 98 has many system defects that are widely known. Through DDoS, WinNuke, UDP Flood, and other attack software, Windows 98 can easily give you a blue dead face. At present, Microsoft has stopped updating and upgrading the Windows 98 defect. Therefore, this operating system can be said to have been abandoned by the times. If you do not want to frequently encounter various malicious bomb attacks, you 'd better switch to the court, use Windows 2000/XP.

Step 2: patch upgrade

There is no impervious wall, even if you use the latest operating system, it does not mean that your computer has been put into a safe, therefore, we should always pay attention to the patches released by Microsoft official site. After Microsoft discovers some vulnerabilities that may affect system security, it will release system patches on its official website. At this time, it is necessary to download and install the latest patches immediately, immediately block system vulnerabilities. For example, if SP1 is installed on Windows XP, the system security can be greatly improved.

In addition, you need to frequently view system log files when using Windows 2000/XP, because this file will fully record all network activity conditions within a period of time, by checking system logs, we can find out whether someone has attempted or attacked the system, so that we can make targeted compensation.

Step 3: Disable useless services

Hackers must open corresponding ports to launch attacks on computers. If we disable useless ports, this will greatly reduce the risk of attacks. For Windows, the NWLink, IPX, and SPX transmission protocols in the system can be removed, and the security mechanism can be enabled in TCP/IP Protocol attributes. If you do not have special requirements such as ICQ and Real online playback, we recommend that you disable all UDP ports. Similarly, in Windows 2000/XP, printing, sharing, Web services, and other unused services can also be disabled, which not only saves more system resources, but also reduces the chance of hacker intrusion.

Step 4: Hide your IP address

Before hackers initiate an attack on your computer, they must first confirm the IP address of the computer. Therefore, we can prevent others from detecting the server through ping, or use the proxy server to hide their real IP addresses. For example, if we select "prevent others from using the ping command to test" in the Settings section of Skynet firewall, no matter whether the server is enabled or not by using the domain name or IP address for ping testing, this reduces the chances of hacker attacks.

Step 5: search for local vulnerabilities

However, after a long period of time hanging on the internet, how can we effectively protect others from scanning your computer? First, we must know the security risks in the computer. Therefore, we can use system scanning software to identify these vulnerabilities. Taking XScan as an example, XScan can detect security vulnerabilities on all ports of the Local Machine in multiple threads and save the scan results as files, in this way, we can easily find computer vulnerabilities and provide detailed descriptions of known vulnerabilities, exploitation programs and solutions, we can directly fix vulnerabilities to enhance system security.

Step 6: firewall software security

Even if we have completed the above operations, this is only part of the protection measures. The most effective network security protection means is to install a firewall software. Currently, there are many such Firewall software, such as Skynet Firewall, Norton Internet Firewall, and ZoneAlarm. They not only prevent Ping attacks, but also prevent malicious connections, in addition, when you encounter a malicious attack, there will be a unique warning message to attract your attention, and all the intrusion information will be recorded for you to find a case. Therefore, in order to completely prevent external intrusion during surfing, you should choose a suitable network firewall software to have a good mood when chatting with MM. However, you must note that installing firewall software does not mean everything is fine. To avoid firewall software becoming a fake line of defense, it is best to upgrade and update it online at intervals, in this way, the network firewall software can better defend against the latest network attacks.

After achieving the above steps, experts suggest that we install a computer protection system that has been installed on the computer. Even if hackers put your computer into the computer, they will not be able to eliminate the trojan virus, you can also use the computer protection system to quickly restore the computer to normal working. With the protection of the Computer Protection System, your computer is as safe as wearing a bullet-proof clothing, allowing you to freely swim on the Internet.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.