[Strongly recommended] [Operating System] Seven methods can make your computer safer

Source: Internet
Author: User
1. Turn off dangerous Processes

First of all, we certainly need to go into the service to see if any dangerous system process is on. Do you see comments? "Allow Remote registry operation", disable it (Remote Registry). I ordered the AT command and also disable Task Scheduler to prevent intruders from using it to start Trojans.

Open the registry and enter HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ WindowsNT \ current _

Version \ Winlogon finds a key value DontDisplayLastUsername on the right and changes it to 1. If it does not exist, create a new one!

2. It is necessary to prevent empty IPC connections!

Okay. Let's go to HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ LSA and find this primary key restrictanonymous and change it to 1.

If it is changed to 2, some Program It may not work, so it is generally changed to 1.

3. Modify the default port 3389.

HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Terminal Server \ winstations \ RDP-TCP is here. Find portnumber, Which is 3389 in decimal format. You can change it to four other numbers at will, I changed it to 1314, so that the intruders could not intrude into your computer by 3389.

4. Go to CMD and run net share and net user.

See what other shared and suspicious user names are available. The Administrator and guest are the default ones in the system and do not need to be deleted. How can I add more ×××? Ignore it. Delete it. (Net user ×××/del), disable useless sharing. (Net share C $/Del ,...).

5. Input Method Vulnerability

Solution: 1. delete or rename these vulnerability help files.

It is best to delete the winime. CHM, winpy. CHM, and winzm. chm help files. Will you delete others?

6. It is the most important and easy to use and generally invincible.

Under cmd, enter the c: \ winnt \ system32 write command Ren net.exe netwei.exe (Press ENTER ). Now, even if someone else enters your computer, you cannot use net user username pass/Add to add users, or use net localgroup administrators username/Add to join the administrators! This command is used to create a user and improve the administrator. Change to netwei user.

7. The last step is also critical. This can prevent formatting!

Write the command in cmd: C: \> doskey format = bad command or file name! (Press ENTER) This is the lock command. You can also lock del. When someone maliciously formats your hard disk, the system will display: "Bad command or file name !, The formatting command is denied. In some special circumstances, if you need to format the hard disk yourself, what should you do? You can enter the following command:

C: \> doskey format = (Press ENTER) so that you can format it as before.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.