Windows user Security Tips

Source: Internet
Author: User
Tags old windows

This article applies to all Windows systems that have administrator users and standard users, such as Windows 2000 above the operating system, and UAC is feature-capable over Windows Vista versions.

A newly installed Windows system or a newly purchased computer containing a Windows system will need to install many software at the outset and require more features or actions that contain Windows security or user control settings. At this point it is very convenient to use an administrator account to do these things. Windows is not like Linux, where every feature or operation that involves Windows security or user-controlled settings requires administrator authorization, requiring an administrator's user name and password. Under Linux, once you have access to Administrator (sudo) permissions (with a permission ring), you will have administrator privileges for a period of time until the permissions expire. It is therefore cumbersome and unreasonable to start with a non-administrator standard user to initialize the Windows system and its own working environment.

However, when the system is initialized and your working environment is set up so that there are no more operations that contain Windows security or user control settings, you should use standard users instead of an administrator account for security purposes. Because an administrator account runs an application that runs with administrator privileges, this poses a great security risk. For example, a malicious application can use administrator privileges to obtain malicious behavior that Windows users do not want to be possessed by this application, which may include collecting user personal information, user behavior data, user keyboard input, and so on.

So I thought about a good measure on my laptop, the steps are as follows:

    1. To start building a Windows user you like to use, the first Windows must be an administrator, using this user to complete system initialization and set up their own working environment.

    2. When the previous step is complete, create a new administrator account with this administrator user and set it to password protected, but do not need to log on to this new administrator user, the first administrator account established will usually automatically become a standard user.

    3. When a new administrator account is established, although the first administrator account is automatically changed to a standard user, the current session is still a session with an administrator due to the security policy of windows, so you need to log off the current user or restart the computer.

    4. Log in with the old Windows user, at which point the user is logged on to run his application with the privileges of a standard user and no longer has administrator privileges for the purpose of user security.

    5. Check the User Account Control (UAC) settings, and User Account Control (UAC) notifies you before changes are made to the computer that require administrator-level permissions. Increase the security level to the highest (always notify), and your windows will become more secure. When you need administrator privileges, enter the administrator's user name and password.

The flowchart is represented as follows:

650) this.width=650; "title=" image "style=" border-top:0px;border-right:0px;border-bottom:0px;border-left:0px; " Border= "0" alt= "image" Src= "http://s3.51cto.com/wyfs02/M02/5D/DE/wKiom1Ul5ZSyoMEAAAHwCCvksxY206.jpg" height= "320" />

Advantages:

    1. Implement user security, all administrative actions are fully known by UAC users and decide whether to give administrator privileges

    2. Save the Administrator user's disk space, as long as the administrator account is not logged in, it will not occupy more system disk space.

Disadvantages:

    1. If you have more administrative operations, you will receive more UAC notifications and require a greater number of administrator rights authorizations.

--end--

This article is from "Communication, My Favorites" blog, please make sure to keep this source http://dgd2010.blog.51cto.com/1539422/1630289

Windows user Security Tips

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.