Intermediary trading http://www.aliyun.com/zixun/aggregation/6858.html"> SEO diagnostic Taobao customer hosting technology hall
Hide IP address
Hackers want to attack us, we must first find our IP address, or can not start. Hidden IP address commonly used in the following three methods:
1, the use of proxy server (Proxy Server): If we browse the site, chat, BBS, etc., then leave the URL is the proxy server, rather than our website.
2, the use of tools: Norton Internet Security has a hidden IP function, if your computer front-end router, IP sharing hub function, this method is invalid, because NIS can only hide your computer's IP address.
3, for the LAN computer, the browser's Proxy address should be set to connect with the Internet that computer's address.
The above measures to some extent to prevent the invasion, but there are still omissions, hackers can still use the port scan to find your IP address, a further measure is "port defense."
Port guard
When a hacker or virus attacks you, you should constantly scan your computer's port. If you install a port monitor (such as Netwatch), the monitor will warn you. Intruders are likely to frequently scan the port in order to find the timing, the monitoring program will continue to prompt you, upset you, if you encounter this invasion, you can use tools to shut down unused ports, for example, with "Norton Internet Security "Turn off unused ports 80 and 443, which provide HTTP services, if you do not provide web browsing services
Close; close 25 and 110 ports, both provide SMTP and POP3 services, should also be closed when not in use, and some can also be closed without the port. Close these ports, is tampered with intruders outside the gate.
In the TCP / IP protocol, Windows is connected to other Windows-based computers via port 139 to shut down this port, preventing the most attacks. Close steps: [Network] → [Configuration] → [TCP / IP] → [Properties] → [Binding] → [Microsoft Network Client] (Remove the "√" in front of this item, without this can not be changed ).
Turn off sharing and setting passwords
If your computer is not a local area network (LAN) computer with hard disk access, you can turn off all hard disk and folder sharing by going to [Network] → [File and Printer Sharing] → [Allow Other Users to Access My Files] √ "can be removed; If you can not close all the hard disk or folder sharing, the shared part of the need to set read-only and password, the steps are: Right-click a [folder] [share ...], be aware that due to Windows 9x and Windows Me shared passwords can easily be cracked, and Windows 2K and Windows XP passwords more secure, your operating system is a wise move.
ActiveX controls and Java protection
Web pages ActiveX controls and Java Applets have a strong function, but its function is often unknown, once malicious, destruction is quite large, had to prevent. IE has also taken a cautious attitude, offers a wide range of options, the specific steps are: [Tools] → [Internet Options] → [Security] → [Custom Level], it is recommended that you do not understand the ActiveX controls and Web pages Java programs take a precautionary approach.
This article comes from free network resources (www.free513.cn) reproduced please indicate the source