Win XP uses data encryption to improve system security

Source: Internet
Author: User
Tags switches ssh malware protection

Using data encryption in Windows XP systems can increase the safety factor of your computer and better save and keep confidential files. So when you want to strengthen your system to prevent unauthorized access and unfortunate disasters, then for data encryption can be very good when your amulet Oh! So now let's take a look at the precautionary measures!

  1, the use of high safety password

One of the simplest and most effective ways to improve security is to use a password that is not easily guessed by brute force attacks.

What is a violent attack? The attacker uses an automated system to guess the password as quickly as possible, in the hope that the correct password will soon be discovered. Use uppercase and lowercase letters with special characters and spaces, avoid using words that can be found in a dictionary, and do not use a password that is more difficult to crack than using your mother's name or your birthday as a password.

Also, keep in mind that each increase in the length of your password will add up to the combination of your password characters in multiple levels. In half, passwords that are less than 8 characters are considered to be easily cracked. can use 10, 12 characters as the password, 16 of course better. It's safer to keep your password as long as possible without being too long and difficult to type.

  2, do the Border protection

Not all security issues occur on the system desktop. Using an external firewall/router to help protect your computer is a good idea, even if you have only one computer.

If you're looking at the low end, you can buy a broadband router device, such as Linksys, D-Link, and Netgear routers that you can buy from the Internet. With high-end considerations, you can use security devices such as managed switches, routers, and firewalls from enterprise-class vendors such as Cisco, Foundry, and more. Of course, you can also use the pre-packaged firewall/router installer to build your own protection devices, such as using M0n0wall and IPCop. Proxy servers, antivirus gateways, and spam filtering gateways also help to achieve very strong border security.

Keep in mind that in general, in terms of security, managed switches are stronger than hubs, whereas routers with address translation are stronger than switches, and hardware firewalls are the first choice.

  3. Upgrade your Software

In many cases, it is critical that the system be patched before installing the production application, and the final security patches must be installed on your system. If you haven't done a security upgrade for a long time, you may be able to use a computer that's very easy to become an unethical hacker's target. Therefore, do not install the software on a computer that has not been updated for security patches for a long time.

The same applies to any signature-based malware protection tool, such as an anti-virus application, which can be compromised if it is not updated in a timely manner and thus cannot be defined by the current malware signature.

  4. Close Unused Services

In most cases, many computer users do not even know what services are running on their systems that can be accessed over the network, which is a very dangerous situation.

Telnet and FTP are two common problem services, and if your computer does not need to run them, please close them immediately. Make sure you understand what each of the services running on your computer are doing and know why it runs.

In some cases, this may require you to know which services are important to you so that you do not commit errors such as shutting down the RPC service on a Microsoft Windows computer. However, it's always a good idea to turn off services you don't actually use.

  5. Using Data encryption

For those computer users or system administrators with security awareness, there are different levels of data encryption that can be used, and choosing the right level of encryption as needed is usually determined by the situation.

Data encryption ranges from using the Password tool to encrypting files to file system encryption and finally to entire disk encryption. Typically, these encryption levels do not include encrypting the boot partition because it requires decryption help from specialized hardware, but if your secret is important enough to be worth the money, you can also implement this encryption of the entire system. In addition to boot partition encryption, there are a number of solutions to meet the needs of each encryption level, including both commercial proprietary systems and open source systems that can be encrypted on every major desktop operating system.

  6. Protect your data with backup

Backing up your data is one of the important ways you can protect yourself from minimizing your losses in the face of disaster. The data redundancy strategy can include both simple, basic, and regular copy data to the CD, as well as complex periodic automatic backups to a server.

For systems that must maintain continuous online service without downtime, RAID can provide automatic error redundancy in case one of the disks fails.

Free backup tools such as Rsync and Bacula can integrate automated backup solutions of any complexity level. Versioning tools such as subversion provide flexible data management, so you can not only perform backup work on another computer, but you can also keep multiple computers in sync with the same data without having to bother. Using subversion in this way allows me to survive the hard disk damage of my work notebook in 2004, which also illustrates the importance of regular backup of critical data.

  7. Encrypt sensitive communication

The password system used to protect communications from eavesdropping is very common. Software that supports the OPENPGP protocol for e-mail, the off the record plugin for instant messaging clients, and encrypted channel software that maintains communications using security protocols such as SSH and SSL, as well as many other tools, can be used to easily ensure that data is not compromised during transmission.

Of course, in personal communication with individuals, it is sometimes difficult to persuade the other side to use encryption software to protect communications, but sometimes this protection is very important.

  8. Do not trust the external network

This concept is important in an open wireless network, such as in a coffee shop where you have a wireless network locally. If you are very cautious and vigilant about security, there is no reason to say that you cannot use this wireless network in a coffee shop or some other untrusted external network. But the point is that you have to be safe with your own system, and don't trust that the external network is as secure as your own private network.

For example, in an open wireless network, it is necessary to use encryption to protect your sensitive communications, including when connecting to a Web site, you may use a login session cookie to authenticate automatically, or enter a username and password to authenticate. Also, be sure not to run network services that are not required, because if there are unpatched vulnerabilities, they can be exploited to threaten your system. This principle applies to network file system software such as NFS or Microsoft CIFS, SSH servers, Active Directory services, and many other possible services.

Check your system both internally and externally to see if there is a chance that a malicious security attacker can use it to threaten your computer's security and ensure that these pointcuts are shut down as much as possible. In some ways, this is just an extension of the two security recommendations for shutting down unwanted services and encrypting sensitive traffic, and you need to be more cautious when using external networks. Many times, in order to protect yourself in an external untrusted network, you will actually be asked to reset your system's security configuration.

  9, using uninterruptible power supply support

If you are only trying to avoid losing files during a power outage, you may not want to choose to buy ups. In fact, it is recommended that you use UPS for more important reasons, such as power regulation and the avoidance of file system corruption. For this reason, make sure that your operating system is able to remind you when it will shut down so that you are not at home when the power is exhausted, and make sure that a UPS that provides power conditioning and battery backup is ensured.

A simple surge protector is not enough to protect your system from "dirty electricity" damage. Keep in mind that UPS plays a critical role in protecting your hardware and your data.

  10. Whether the security of monitoring system is threatened and invaded

Never think: Because you have taken a series of security measures, your system will not be compromised by security breaches. You should build some type of monitoring program to ensure that suspicious events can quickly catch your attention and allow you to track whether a security breach or a security threat is being detected. We need to monitor not only the local network, but also the integrity audits, as well as the use of some other local system security monitoring technology.

There are many other security precautions depending on the operating system you are using. Some operating systems because of the design reasons, there is a greater security problems. Some operating systems can allow experienced system administrators to greatly improve system security. However, whether you are using Windows like Microsoft and Apple's Mac OSX, or using open-source operating systems like Linux and FreeBSD, the above recommendations must be kept in mind when you are reinforcing their security.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.