System protection skills in the early stages of security protection

Source: Internet
Author: User
Tags strong password

Hackers intrude into and steal their own private documents, lurking in the computer, hacking Trojans steal their QQ, and various viruses start by themselves. I believe everyone has encountered the above harassment. However, most of my friends only remember to block system security vulnerabilities after being recruited. Why is it necessary to provide appropriate protection? Preparing for the rain is the best way to protect system security. The following describes some common preventive measures.

I. Make good use of the built-in protection components of the system

Windows XP itself comes with a lot of protection components and settings, but most of them did not attract everyone's attention. Let's proceed with system security settings.

Blocking vulnerabilities-manage Administrator accounts

Administrator is a super Administrator Account built in the system. It has the highest permissions, and Windows XP does not set a password for it by default. In this way, if hackers intrude into the system, they can use Administrator to do whatever they want. We should set a strong password for it.

Step 1: Right-click "my computer" on the desktop and select "manage". In the displayed window, expand "Computer Management (local) /system tools/local users and groups/users, right-click Administrator in the right pane and select "set password". Add a complex password for Administrator as prompted.



Step 2: to better protect the Administrator, you can also right-click the Administrator in the account list and select "RENAME" to change the account to another name, such as "ADM ", create a new restricted account named Administrator. In this way, even if the hacker cracks the Administrator password, all he has is limited account permissions.

Step 3: to completely remove the Administrator threat, you can also start the Registry Editor, expand [HKEY_LOCAL_MACHINESAMSAMDomainsAccountUsers], and then delete the [000001F4] and [secret] key values under it. After the restart, the Administrator account is permanently deleted.

Unremitting backup-List of self-starting and initial processes

Both viruses and Trojans are done by self-starting and active processes. However, when detecting viruses, it is difficult to find suspicious self-starting and processes. Now you can back up these items when the system is normal. If you suspect that you want to compare the data before and after the attack, you can quickly find the virus.

1. Backup self-start

Step 1: Click Start> Run and enter msconfig to start the System Configuration Utility. Click the "Start" tab and press Alt + Printscreen. If many programs are started, pull the scroll bar to take two pictures.

Step 2: Start the graphic program, click "edit", click "Paste", and save the image as "auto-start .bmp ".

Step 3: If you suspect that you are using a computer, take a picture of the System Configuration Utility, and then compare the two pictures to quickly find out the virus.

2. Back up the current active process

Step 1: Do not run any program after the system is started, and click Start> Run and Enter CMD to start the command prompt.

Step 2: Enter "Tasklist/fo: csv> g: jinchen.csv" at the command prompt to output the current process list to g: jinchen.csv in CSV format.

Step 3: If you suspect that your computer is suspicious, you can export jingcheng1.csv and then open the two files in Excel to compare them.

2. Professional tools to help

All of the above are system tools to implement security prevention settings. However, some protection may be omitted. After completing the above protection, we can use professional security software and websites to detect systems, which can effectively protect computer security.

Easy identification of professional System Vulnerabilities

Many anti-virus software provides system security vulnerability scanning, which allows you to quickly discover vulnerabilities hidden in the system. For example, "Rising vulnerability scan.

After running the vulnerability scan tool, click Start scan. The program lists all current security risks of the system. Now, based on the scan results, click View Details ", next, perform one-to-one patching.

  

Online Security Test Leakage Detection

Websites of many security vendors provide free online scanning. As long as you log on to the website, you can quickly perform security tests on the system. The following uses the "Skynet" security test as an example.



Log on to the terminal.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.