The security problem of preventing ADSL from being invaded

Source: Internet
Author: User
Tags administrator password strong password

since entering the 21st century, ADSL network has been like an arrow, the rapid development of ADSL broadband also spread to every family, at the same time also brought many new problems, such as stolen number. Just like why Windows has more viruses than Linux, because of the huge number of users, the economic benefits of which led to the birth of illegal acts.

Many netizens have had ADSL account stolen experience, especially your broadband business limited time, limited, the end of the loss of a lot of money, and sometimes even at the end of the month to pay the high cost of the Internet.

Many ADSL users often use the way of routing to share broadband resources, for most ordinary users, as long as the routing is completed, the local area network machine can surf the internet, think everything OK, in fact, far from it.

With simple tools, hackers can easily break through your router, invade your local area network, steal your account password, and bring you immeasurable loss.

So how should you protect your account so that others can not easily steal it? We have developed a defensive strategy from hacking methods.

Usually hackers use the IP Scanning Tool to scan an ADSL network segment, from the results of which IP address can be connected, and then scan 80 port, you can get the 80 port has been opened computer. The 80 port information can be obtained by what program is open to the 80 port. Hackers can use the experience to determine which is the asdl router, through IE browser can log on to the router.

Then there is another problem, the login router needs to provide user name and password, how hackers know. In fact, here is a very important step, many users in the purchase of routers directly connected to the network cable on the use, does not mean to login username and password. Hackers can then use the router's default username password to log on to the router entirely.

So far the hacker has been completely control of the router, and then entered the ADSL account settings interface, by viewing the source code of this page can easily get ADSL account username and password.

Therefore, the key to the success of the stolen number is the router's login username and password. Users must modify the username and password after purchasing the router, at least to modify the user name. So that means it's safe to change the password? Hackers can also use password cracking device to brute force to break your password, so when you modify the password must be set a more complex combination of passwords, such as the English plus number plus commas, dots, bars and other special symbols. As long as you do not allow hackers to log on to your router, he will not be able to easily access your ADSL account.

In addition, hackers can use the router to invade your computer, as long as the control of the router, your computer is basically equal to exposure to him.

Then we have to do some corresponding security measures on the computer to prevent personal data into the hands of hackers.

1. Remove folder hidden share

By default, Windows 2000/xp opens a hidden share of all partitions, and you can see a "$" appended to each partition name on the hard disk by selecting System Tools/Shared Folders/shares from the Control Panel/Administrative Tools/Computer Management window. But as long as you type "computer name or ipc$", the system will ask the user name and password, unfortunately, most of the personal User system administrator password is empty, the intruder can easily see the content of C disk, which gives the network security has brought great hidden dangers.

How do you eliminate default sharing? The method is simple, open Registry Editor, and enter the "hkey_local_machine/system/currentcontrolset/sevices/

Lanmanworkstation/parameters, create a new two-byte value named "AutoShareWks" and set its value to "0" and restart the computer so that the share is canceled.

2. Close unnecessary ports

Hackers often scan your computer port at the time of intrusion, and if you have a port monitor installed, the monitor will have warning prompts. If this intrusion is encountered, the available tool software shuts down ports that are not used, and other infrequently used ports can be closed.

3. Change the Administrator account

The same as the router log on users, hackers want to control your computer, you must get administrator rights account. Usually when the user is using the computer to log in with the administrator, if the administrator disabled, and set up a other name of the administrator account, the hacker is not so easy to invade your computer, because hackers can not be ordinary means to get the name of the administrator account.

Intrusion of the 4.Guest account

The Guest account, the so-called Guest account, has access to the computer, but is restricted. Unfortunately, the guest also opened the door for hacking! There are many articles on the web that have introduced how to use guest users to get administrator privileges, so avoid system intrusions based on the guest account.

Disabling or removing the Guest account is the best way to do it, but in some cases you must use the Guest account, there are other ways to do the defensive work. First, set a strong password for the guest, and then set the Guest account's access to the physical path in detail. For example, if you want to prevent guest users from having access to the tool folder, you can right-click the folder and select the Security tab in the pop-up menu to see all users who have access to the folder. Remove all users except administrators. Or you can set permissions for the appropriate user, such as "List Folder Directory" and "read", and so on, which is much more secure.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.