When it comes to the safety of personal Internet access, let's start with a class of problems that you might encounter. The types of intrusions we encounter probably include the following:
(1) Stolen passwords by others;
(2) The system is attacked by Trojan Horse;
(3) The malicious Java Scrpit Program attacks when browsing Web pages;
(4) QQ is attacked or leaked information;
(5) Virus infection;
(6) There are loopholes in the system to enable others to attack themselves.
(7) Malicious attacks by hackers.
Let's take a look at what means to be more effective in guarding against attacks.
1. View local shared resources
Run cmd input net share, if you see an unusual share, it should be closed. But sometimes when you turn off the shares and then appear again the next time you boot up, you should consider whether your machine has been controlled by hackers or infected with the virus.
2. Delete Share (one at a time)
net share admin$ /delete
net share c$ /delete
net share d$ /delete(如果有e,f,……可以继续删除)
3. Delete ipc$ NULL connection
Enter regedit in the registry and find the numeric data in the Hkey-local_machinesystemcurrentcontrosetcontrollsa entry in the RestrictAnonymous from 0 to 1.
4. Close their own 139 ports, IPC and RPC vulnerabilities exist in this
The 139 port is closed by selecting the Internet Protocol (TCP/IP) attribute in local Area Connection in network and dial-up connections, and entering advanced TCP/IP settings, WINS settings, which has "Disable TCP/IP NetBIOS". The 139 port is closed when the check is made.
5. Preventing RPC Vulnerabilities
Open Administrative Tools-services-Find the RPC (Remote Procedure call (RPC) Locator) service-the first failure in recovery, the second failure, and subsequent failures, all set to no action.