System registry Security Settings

Source: Internet
Author: User

While the network brings great convenience to our work and study, viruses, Trojans, backdoors, and hacker programs also seriously affect information security. One common characteristic of computer infection is that these programs write information in the Registry to achieve such purposes as automatic operation, destruction, and dissemination. The following are collected by the author on the Internet. By modifying the registry, we can deal with viruses, Trojans, backdoors, and hacker programs to ensure the security of personal computers.

1. Clear the words left after accessing "Network neighbors"

Delete the following primary key under heky_current_user/Network/recent.

2. automatic dialing upon cancellation of login

In HKEY_LOCAL_MACHINE/software/microsof/twindows/CurrentVersion/Network/realmodenet, change "autologon" to "01 00 00 00" in the right window ".

3. Select a user when canceling Logon

All users have been deleted, but users have to be selected during logon. To cancel logon, select a user in the window on the right under hkey_local_machinenetworklogon, modify "userprofiles" to "0 ".

4. Hide the login name of the computer user

Create a new string "DontDisplayLastUsername" in the window on the right under HKEY_LOCAL_MACHINE/software/Microsoft/Windows/CurrentVersion/Winlogon and set the value to "1 ".

5. prevent the destruction of Acid Battery V1.0 Trojans

If the "Explorer" key value is found in the right window under HKEY_LOCAL_MACHINE // software/Microsoft/Windows/currentversionrunservices, The Yai Trojan is in use and deleted.

6. prevent the destruction of Yai Trojans

In HKEY_LOCAL_MACHINE/software/Microsoft/Windows/currentversionrunservices, if the "batterieanzeige" key value is found in the right window, the Yai Trojan is included and deleted.

7. prevent the destruction of the eclipse 2000 Trojan

In HKEY_LOCAL_MACHINE/software/Microsoft/Windows/currentversionrunservices, if the "bybt" key value is found in the right window, delete it.

Then, delete the key value cksys on the right under HKEY_LOCAL_MACHINE/software/Microsoft/Windows/currentversionrunservices and restart the computer.

8. Prevent bo2000 damage

If you find the parameter umgr32.exe in the right window of HKEY_LOCAL_MACHINE/software/Microsoft/Windows/CurrentVersion/runservices, bo2000 is in the description and deleted.

9. prevent the destruction of insects

In HKEY_LOCAL_MACHINE/software/Microsoft/Windows/CurrentVersion/run, if the "mskernel32" key value is found in the right window, delete it.

10. Disable the "interner option" in the "Tools" column of the IE menu"

Change inetcpl. Cpl under C: Windowssystem to inetcpl. Old or another name, and then change the name if it is disabled.

11. prevent the destruction of Backdoor

In HKEY_LOCAL_MACHINE/software/Microsoft/Windows/CurrentVersion/run, if the "Notepad" key value is found in the right window, delete it.

12. prevent damage to winnuke

In the window on the right under hkey_local_machinesystemcurrentcontrolsetservicesvxdmstcp, create or modify the string "bsdurgent" and set its value to 0.

13. prevent the destruction of keyboardghost

If you find the kg.exekey value in HKEY_LOCAL_MACHINE/software/Microsoft/Windows/CurrentVersion/runservices, delete the values and find the kg.exe and kg. DAT files to delete them.

14. Search for NetSpy hacker programs

Find the "NetSpy" key in the window on the right under HKEY_LOCAL_MACHINE/software/Microsoft/Windows/CurrentVersion/run. If yes, it indicates that the NetSpy hacker program has been installed and deleted.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.