Ultimate skills for Internet cafe Maintenance

Source: Internet
Author: User

In Internet cafe management, due to the complexity of Internet users, it is often necessary to use some related management software to restrict the user's permission to use, in order to prevent the system from being damaged. There are many related software, so I will not give them one by one. However, they generally implement system protection in the following ways:
1. The management software is automatically started after the instance is started. A Virtual Interface is used to replace the Windows operation interface.
2. Disable Registry Editor.
3. Disable Internet Explorer.
4. Do not enter C or D in the address bar of IE to access the system and backup disk.
5. Disable Control Panel operation.
6. Disable the display attribute adjustment.
7. Only applications specified by Internet cafe management software can be run.
8. Disable the F8 key and Windows security mode when logging on to or logging out of the system.
Through the above settings, the system security can be well protected, but these Internet cafe management software is not perfect, many of which have some obvious vulnerabilities. These vulnerabilities can maliciously damage computer systems. Next we will take a look at the common vulnerabilities of these management software and their remedies.
Vulnerability Analysis
1. Create a file with the suffix reg. Its content is as follows:
REGEDIT4
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System]
"DisableRegistryTools" = dword: 00000000
Double-click the file, and the system prompts whether to add it to the Registry. Select "yes ". After adding the registry, you can perform various operations on the system registry.
2. Double-click an unassociated file. The file opening mode dialog box is displayed. 1 ),


Click other options. The operation mode panel is displayed. Enter C: \ 2 in the file name ),

You can access disk C.
3. After you download the file in IE, you can enter the C: \ file name to save the downloaded file, even though you cannot see drive C in the Save As panel. Next time you download the file storage disk, You can see disk C. Of course, you can operate the work in it at will.
4. Download Winrar and run it after installation. On the Winrar main menu, select change drive and enter C: 3)

In this way, you can also download the Opera Browser to run the program, and enter C: in the address bar to enter the system disk ). Next, go to the C: \ WINDOWS \ SYSTEM directory and find "display desktop. this file is run and the entire desktop will return to the original Windows desktop. Right-click and click "properties" to go to the "Display Properties" panel, here we can easily modify the resolution and refresh rate of the display. By the way, when you change the monitor, the mouse stops at a certain position and cannot be moved, probably because of the internet cafe management software. But it doesn't matter. You can use the TAB key to perform normal operations. After the final adjustment, the mouse will return to normal.
5. locate Inetcpl in the C: \ WINDOWS \ SYSTEM directory. cpp file and renamed it Inetcpl. cpl, so that you can run Internet Options in IE browser. Similarly, find the msinfo32.exe file under the C: \ Program Files \ Common Files \ Microsoft Shared \ msinfodirectory and double-click it. 4 ),

This is a Windows system information program. Click the System Configuration Utility in the tool menu to run this tool. Here you can modify the system startup file and configuration file as you like, or disable the running of some startup programs, you can even cancel the operation of the Internet cafe management software. In this tool, you can run the control panel and use all the functions in the control panel.
Solution
Through the above vulnerability analysis, we can use the following methods to prevent the vulnerability:
1. The system prohibits the import of reg files.
2. Prohibit the system from displaying hidden files. This prevents modification and deletion of boot files and system files.
3. prohibit the direct running of EXE files downloaded from the Internet, which is the biggest risk.
4. Disable various compression software from entering C: In the toolbar to enter the system disk for modification. Because many Internet cafe computers install WinZip and other compression tool software.
5. prohibit other browsers from entering C: in the address bar to enter the system disk for modification.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.