Understand four new security policies to effectively prevent hacker intrusion

Source: Internet
Author: User

In the age when viruses run rampant and horses graze at will, the most talked about by netizens is system damage and viruses invade into the system. So what measures should most people take to prevent hackers, viruses, and malware?

1. Delete junk files and eliminate Trojans and viruses in the breeding ground

Generally, when you browse website information, some files are left on the local machine, and viruses are often lurking in it, especially some advertisement code, malicious scripts, and trojan programs. These files are concentrated in subfolders in the DocumentsandSettings folder of drive C (you often use logon accounts, such as admin, which is the name of the login account you entered when installing the machine) the temp folder in localsetting below. We only need to press Ctrl + A to select all and then delete it.

Note: The localsetting folder is a hidden property by default. Therefore, you must make the system display all hidden files.

Ii. Disable automatic playback to avoid indirect infection

While DC, DV, MP3, MP4, and other entertainment and leisure devices are booming, they have also added a threat to our already fragile system. Many people habitually connect these mobile storage devices to their computers and directly transfer files, images, and videos. In fact, this habit is easy for you to trick. Some netizens found that they could not open the hard drive by double-clicking on the computer. A dialog box "select Open Mode" is displayed, which in fact contains the autoruan virus. These viruses are mainly transmitted by mobile storage devices. Because data is frequently exchanged on disks, they are likely to be infected with viruses. Many people know that hard disks have encryption areas and mobile storage devices are also used to store device and manufacturer identification information, which is not big, dozens of K, and the maximum is not more than several hundred K. Some viruses and malicious code programs are written specifically for the encryption zone of Mobile storage devices. Even if you format a USB flash drive, they still exist. This poses a certain threat to individuals and enterprises. Some large companies and enterprises have formulated rules that prohibit the use of USB flash drives to copy files within the company in order to prevent their confidential information from being transmitted through USB flash drives. For the convenience of reading data files, individual users still need to use mobile storage devices. How can we minimize security risks?

To disable the automatic playback service for Windows, enter gpedit during running. msc, open the Group Policy, open the "System" option in the management template under the user configuration, double-click "Disable automatic playback" in it, and select "enabled ", select "All Drives" to disable the automatic playback service. For some novice users, it is also a good choice to use Dacheng's USB flash drive immune system if they want to save trouble.

3. Security Risks of camera headers at home

Personal privacy is even more important for anyone, but today's hackers, for Money, can be said to be cool. If you happen to have a camera, and you happen to be installed with Trojans, keyboard recorders, and other gadgets, congratulations! Your machine has become a zombie in your hands, it is also possible that your camera will take control of all your activities, or even some abnormal people may install a pinhole camera in the bathroom and dressing room to capture some information for sale.

The cost of cameras is low. When "Vampires" such as China Telecom, China Mobile, and China Netcom are drinking the blood of our taxpayers, the wide application of network communication software saves us a lot of Money. However, it also causes some security risks. When you video videos with others, if the other party has a targeted Trojan Horse on your machine, then all your activities will be visible to others. Some time ago, the fierce video leakage on the Internet exists. You only need to add a small piece of code to the Trojan horse to remotely control your camera. Hackers using tools can capture the conversation information between you and the other party, capture your screen, and even use your camera header to monitor you. This is absolutely feasible, and you still don't know. Then you may ask, shut down the camera, isn't it enough? The answer is no. By adding a short script to a Trojan or virus, you can remotely switch your camera. Everything you do in the room is clear.

There is a saying that you are afraid of stealing thieves, and you are afraid of thieves thinking. There is no special solution to the security risks brought by home cameras. Usually, after chatting is completed, immediately unplug the camera to avoid such a situation. But for a lazy who does not shut down during the night, they need to cover the camera with a cloth or a pot of flowers while sleeping.

4. How to prevent personal information leakage

Generally, password leaks in personal computers, game account leaks, and other events are caused by viruses, Trojans, and malicious programs. These programs are embedded into your computer with a small keyboard recorder, to record your personal information.

Some personal suggestions for dealing with the keyboard RECORDER: when you enter the password, make several more mistakes first. When selecting the input box, use the mouse to constantly change the position. Try not to enter the first position first. Now the network bank and QQ login account have enabled the soft keyboard function, after the previous soft keyboard input, the cursor position remains unchanged, but now it is good, each time you open the input once, the letters and numbers on the keyboard will be changed once again, which leads to the failure of the Hook. Are these hackers unable to crack the Hook? The answer must be no, but it is sufficient for individual users.

Summary:

When updating system patches, individual users must upgrade the antivirus software in time. Do not think that the antivirus software can automatically complete detection and removal. It can only detect known viruses in the virus feature library, viruses that have not been written by hackers are ineffective. The best preventive measure is to be less curious. Do not browse unknown websites or download Unknown programs, especially the URLs that look weird. You really want to browse the snapshots in the search engine. Be careful with P2P software such as eMule and VaGaa, because these software is also a breeding ground for more viruses. The most important thing is to increase your awareness of network security and prevent network security. Instead of protecting others, you must protect yourself from curiosity, ignorance, and greed, this is your best precaution. It is not that easy for hackers to enter the door.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.