Windows 7 Security Guide

Source: Internet
Author: User
Tags firewall security essentials

After Windows7 out, many computer and notebook users may feel that the new system is more secure than the original Microsoft system. The new operating system adds more security features, provides many good security settings, and fixes a number of legacy security vulnerabilities. In Windows 7, for example, it changes the default user Account Control level, which increases the difficulty of running a suspect program.

Although the user feels good, the crisis lurks among them. Here's a list of ten Commandments for using Windows 7 to make sure your desktop or laptop is running safely. Many of the tools recommended in this article are free and cost a lot more than an insecure computer. These recommendations are ideal for Windows 7, many of which are also available for Vista or XP computers.

1. Using New hardware

Today's new hardware-motherboards, BIOS,CPU, hard drives, and systems-includes more security features, some even before the OS is installed. For example, the TPM (Trusted Platform Modules) writes passwords securely directly to the hard disk or other components, unifying the extensible Hardware Interface (UEFI) firmware rather than the traditional Bios,intel vpro security and management technology. For example, a computer with UEFI and TPM detects the firmware of the computer every time it is started, and initiates a binary confirmation that the malware is not infected.

If you are operating on an existing computer, consider a full backup and then install the latest operating system.

Even if you are using the original computer, you can switch to a new hard drive that adds encryption technology. Hard drives that support Opal storage specifications allow companies to manage a vendor's encryption disk-and reduce the cost of purchasing additional encrypted hard drives. An afternoon drive typically uses the conversion tool to accelerate or simplify hard disk replacement.

If you do not have a self encrypted hard drive, you can use full encryption software, such as Windows BitLocker or Third-party tools.

2. Use the latest OS version and automatically update the OS and apps

If you are not using the latest version of the operating system, you should upgrade to the latest version. Also, make sure the software is set to be automatically updated and shut down after many updates are automatically applied. Frequent security leaks are also because applications do not use important security patches that have been released for a long time.

The computer vendor may have some built-in update tools. For example, Lenovo has a built-in upgrade process designed to showcase all BIOS and driver updates. You can also manually detect application updates, just a little bit more cumbersome.

"Third-party software is usually a safe intrusion vector. "Flash,adobe Reader and Java are the three biggest goals," said Windows expert and ZDNet, Ed Bott. Although many programs have automatic update detectors, Bott thinks it is necessary to use Ninite or Secunia Personal Software Inspector Tools as quickly as possible, because these tools automatically update the application on the computer for automatic detection.

3. Use Windows to provide new security tools (or Third-party software)

Windows 7 provides a number of security controls and tools through the actions center, as well as other tools through Control Panel, including:

Windows Firewall: These basic settings can prevent some simple attacks, you can use the Advanced settings for special settings. There are also third-party firewall programs available.

Microsoft Security Essentials and Windows Defender. These tools help protect your computer from viruses, spyware and other malware.

Obviously, another option is to invest in third-party security software, such as individual anti-virus software, turn spam and other programs, or security kits, such as Symantec's products.

4. Install user account

In the past, the default account has administrator privileges in Windows-This means that the program may be unsafe and does not need to ask the user if they agree. Starting with Vista, Microsoft added user Account Control (UAC), which requires non-administrator users to get permission to run specific software or specific operations. In Windows 7, UAC still protects the system, but it doesn't get in the way.

Even so, this functionality contributes to securing user security in several ways:

Create a Non-administrator account for each user.

Disable or remove user accounts that are not being used or should not be present.

Unless necessary, the "guest" account is generally disabled. If necessary, you need to use a password to raise the priority level to prevent unauthorized changes to the system.

Consider renaming the administrator account so that it is not easy to see by intruders.

More Wonderful content: http://www.bianceng.cnhttp://www.bianceng.cn/OS/home/

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.