Thoroughly clean up traces of application software running

Source: Internet
Author: User

Source: PConline

When talking about the term "System Security", I believe that most people think of various firewall tools and anti-virus software as a condition reflection, and believe that as long as they exist in the system, system Security will be carefree. In fact, the system's security is simply "defense", and you still need to have enough security awareness. Every attempt you make to operate the system may cause access traces in the system's "dark corners". If these traces are not promptly cleared, they may bring security risks; to ensure the absolute security of the system, you should focus on the details and promptly clean up the various traces of the system's "dark corners" to prevent these privacy threats to your security.

  Clear the marks in the running box  

When you click the drop-down button in the system running box, you will clearly "peek" at what commands have been executed by the system master in Figure 1, in this way, you can monitor the habits of the system owner and take targeted damage measures. To prevent others from looking at their "running" privacy, you 'd better clean up the use marks in the running box as follows:

Screen. width-500) this. style. width = screen. width-500; "border = 0>

  

Click the "Start" and "run" command. In the displayed window, run the Registry Editing Command "Regedit". On the Edit page that appears, move the cursor to the hkey_current_usersoftwaremicrosoftwindowscurrentversionpolicerrunmru branch.

In the subwindow on the right of the corresponding RunMRU branch, you will see the most recent execution records, select each record in sequence, and execute the "edit" and "delete" command to delete all the records; after restarting the computer system, you will find that the use marks in the running box have been cleared.

Clear traces of network ant financial

The system automatically retains the corresponding information in the download list of the program every time you use the network ant to download a program or information, illegal users can steal important files or programs based on these addresses, thus causing security losses to you. To avoid this phenomenon, you must firmly establish security awareness. After downloading important information, you must promptly clear the address traces in the network ant financial system:

First open the network ant download list interface (2), select the important address records in the list box, and then click the "delete" command in the "edit" menu, in this way, the corresponding address records are cleared. Similarly, other important address records are selected in turn, and the deletion commands are executed to clean them one by one from the list box.



  

Screen. width-500) this. style. width = screen. width-500; "border = 0>

Clear Office traces  

When you use any program in the Office to edit or access a document, the latest access trace is left under the "file" menu of the corresponding program. Click these access traces, other people will be able to peek at your privacy information. To this end, it is necessary to clear these traces in a timely manner:

Click the "Tools" and "options" items on the Office program interface, click the "General" tab in the option settings window that appears, and on the page shown in figure 3, select "list recently used Files", set the number in the "number setting" box to "0", and click "OK, the access trace under the "file" menu item can be cleared.

  
  

Screen. width-500) this. style. width = screen. width-500; "border = 0>

  

In addition to the "file" menu item, the file storage dialog box of the Office program, or the file opening dialog box, can automatically remember the files that you previously opened or saved, for this reason, you need to find a way to clear the access trace here. When cleaning up the privacy, you can open the system resource manager window, enter the "WINDOWSApplicationDataMicrosoftOfficeRecent" folder, and clear all the content in "Recent.

Clear clipboard traces  

As you know, after the cut or copy operation is executed, the system will "free up" a small amount of space to temporarily "save" the content currently cut or copied, in some applications, the clipboard can even save dozens of cut and copy content automatically. While enjoying the convenience of the clipboard, it will also "leak" the previously copied or cut content. To avoid privacy information leakage, you must delete important content from the clipboard in time. There are multiple methods to clear the trace in the clipboard. For example, you can duplicate the copy operation and overwrite the important content in the clipboard with invalid content, you can also clear important content in the clipboard by logging out or disabling the system, or even clearing the clipboard by using a professional clearing tool.

  Clear traces in the search box  

Each time you use the system's "Search" dialog box to find important information, the most recent target keywords will be automatically remembered in the "Search" dialog box. When others use the "Search" dialog box next time, you can easily know the privacy of your recent searches. To ensure the absolute security of your privacy, follow these steps to clear the privacy records in the system "Search" box:
 
If you are using a Windows 98 operating system, you can first open the system registry editing window, move the cursor to hkey_current_usersoftwaremicrosoftwindowscurrentversionpolicerdoc Find Spec MRU branch, and then select all the record items under the branch, then execute the "edit" and "delete" command in the menu bar, and refresh the Registry to clean up the privacy records in the search box.

If your workstation is installed with a Windows 2000 operating system, you can move your mouse over the registry branch HKEY_CURRENT_USERSoftwareMicrosoftInternet assumerjavaserbars {C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1} on the registry editing page (4 ); expand the "FilesNamedMRU" option and "ContainingTextMRU" option under the Branch, and then delete all the records under the options.
  

Screen. width-500) this. style. width = screen. width-500; "border = 0>


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.