Don't be afraid to teach you to guard your own computer

Source: Internet
Author: User
Keywords Rookie don't yourself can
Everything I say today is about personal computer security, and it's all I know. I think we all have such experience, we are studying hack technology, often there will be a small number of people will give us a Trojan virus (harmful to others)! Many people will black some web hosts, attack/invade each other's computers. But do the same thing, there are others, when we attack others, there will be attacks on our computer, I think those people are not vegetarian, general anti-virus software, firewalls, I think they can easily break through. After all, there is no absolute perfect defense in the world. There is no computer that can be a bit of a loophole. So we all will invade So-and-so website, personal computer. But compared with our technology, the lack of defense of their own computer methods and awareness. Today, I write out some methods and knowledge that I personally know and share with you. Security software: Antivirus software, firewall, virus Trojan kill software, rogue software cleaning class. (It is best to install these security products on Windows systems) system updates for Windows are important for computer security, and system updates must be turned on to fix computer vulnerabilities in a timely manner. Necessary computer settings, such as: Turn off potentially dangerous services Telnet, FTP, 3389, NetBIOS, etc. to the Administrator user to set a strength password, do not use weak passwords; Delete Other unwanted user accounts, disable guest users, delete default share $admin $c \d\e\ F $IPC. There are some safety common sense, to know: Some Trojan virus hidden very well, and must have done a virus in advance to avoid killing, so do not put the security of the system all on the anti-virus software, also do not rely too much on the software, to learn to manually kill computer Trojan. Generally speaking, computer virus trojan program is divided into: Keyboard records, remote control, backdoor category. Because the anti-virus software is very good hiding, is usually loaded into the boot, so the system in the next time you start the virus can secretly start the Trojan horse program. Now I'm going to talk about the virus. Several startup ways of Trojans: loading to Win.ini, registry startup, boot sector, in general, even if the virus Trojan through the kill process is: Change the entry point of the program, insert process technology. Use virus Trojan Kill tool can be very effective removal of virus Trojan program. But if the above way can not clear the virus Trojan program, you may try to manually clean the way, often heard everyone said manual cleaning virus Trojan program, but a lot of friends still do not know how to clean. Today I will show you how to achieve manual cleaning virus trojan program. There are several viruses Trojan program hidden place I first tell you: the registry, boot sector, Win.ini, System32 directory, etc., are viruses trojan program hidden place. In general, first of all to remove the virus Trojan Start program, and then remove the virus trojan program sourceFile, clean the boot sector, memory. Intrusion is usually directed at important data in your computer, or extensive intrusion (wide scan). So it's best to encrypt the data on your computer before you can effectively protect your data from being downloaded and read by others. There is also the best people have a sense of security. For example, your computer infected with Trojan horse program (here refers to the Keylogger program), first you run some programs after about a few minutes after your program suddenly dropped, then do not login account, because it is possible that your computer has infected with the virus trojan, Infection this kind of trojan you also don't need too worry as long as you do not login account you are not afraid of what, some Trojan program is global scope, as long as you are on the Windows text box input word Fumma program will be recorded and sent out. While some Trojans are records designated program, you do not run the specified program when the Trojan is not working. When you suspect that your computer is infected with the Trojan horse program, first you can use the Kill tool first, you can also see if there is any suspicious process in operation, there is no open suspicious port. Generally hidden good Trojan these two points are not exposed. Found a suspicious Trojan virus program you can search the registry and the computer system disk, the registry startup items to delete, and then delete the source files within the partition. Then check the memory, boot sector, should be no problem. And some are for hacking, and we all know what to do before the hack technology invasion. Before we scan our computer for vulnerabilities, we can use security tools to check if there are security vulnerabilities on our computers. For example, the default share is shutdown, IPC share, admin share. There is also file and printer sharing. A remote buffer overflow vulnerability exists for this vulnerability. The system administrator password is best high strength password, do not use weak password. Remote Connection services do not need to shut down: Telnet, FTP, 3389 and so on. Because I don't often use those software, my hobby is computer programming. Although I am still in the study stage, and do not often use software. I suggest that you do not rely too much on software. Some people use the software for several years and finally do not know the principle of software implementation. If you learn a computer language that will help you learn hack technology in the future, but it will use tools, hackers will have a lot of limitations, doing is very limited. Back to the computer defense, it's not easy to defend your computer, and I'm talking about a general intrusion. But for the real hackers I think may also be useless, I believe that the real hackers must have mastered more than one of the uncovered loopholes. Few people knew about the flaw because he didn't publish it. Ms doesn't know? The following introduces the common virus Trojan trick method, in order to improve the safety awareness of everyone. Web Hanging Horse, I think we all know that some sites have been hacked intoAfter the invasion of the home page was hanged Trojan program. As long as the user opens the corresponding page, the Trojan will use the browser's vulnerability to automatically download and execute. (So the local computer is best to turn on the anti-virus Software web monitoring function). Do not easily accept the transfer of unfamiliar users of the files and pictures, software may be malicious bundled Trojan virus program. Try to go to some large, professional website download software, before opening the software to first check the poison. The temptation must be forbidden! To know that there is no pie in the sky, do not easily to point to someone else sent to your connection address (the address is likely to have been linked to the Trojan virus program). Because now most of the vulnerabilities are also for IE, if it is not necessary to do not use IE, the individual recommended use of Firefox browser. The anti-virus software download update open, or regularly download anti-virus software update patches, to maintain anti-virus software of the latest virus library. Otherwise, your anti-virus software will be a fake. Some viruses Trojan in registry the Startup key value: 1, heky_local_machine\softwaer\microsoft\windows\currentversion\run2, hkey_current_user\ Softwaer\microsoft\windows\currentversion\run3, Hkey_users\. Default\softwaer\microsoft\windows\currentversion\run Editor Zhao Zhaoyi#51cto.com TEL: (010) 68476636-8001 to force (0 Votes) Tempted (0 votes) Nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passing (0 Votes) Original: Rookie Don't be afraid to teach you to guard your own computer back to the column Recycle Bin Home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.