Techniques to prevent malicious attacks on computers

Source: Internet
Author: User

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

Since the 1990s, human society has entered the network era, information sharing has become the most basic feature of the network era. Information security is mainly embodied in network-oriented information security. So what do we do to protect our computers, and here are a few simple, effective ways to set this up:

First, close unnecessary ports

Hackers often scan your computer port at the time of intrusion, and if you have a port monitor installed, the monitor will have warning prompts (such as Netwatch). If you encounter this intrusion, the tool software can be used to shut down ports that are not in use, for example, by using "Norton Internet security" to turn off the 80 and 443 ports used to provide Web services, and some other infrequently used ports may be closed.

Second, change the administrator account

The Administrator account has the highest system privileges, and once the account is exploited, the consequences are disastrous. One of the common means of hacking is to try to get the password of the administrator account, so we have to reconfigure the administrator account.

The first is to set up a powerful and complex password for the administrator account, and then we rename the Administrator account and create an administrator account that does not have admin privileges to deceive the intruder. In this way, it is difficult for intruders to figure out which account really has administrator rights, and to some extent reduce the risk.

Iii. eliminating the intrusion of the Guest account

The Guest account, the so-called Guest account, has access to the computer, but is restricted. Unfortunately, the guest also opened the door for hacking! There are many articles on the web that have introduced how to use guest users to get administrator privileges, so avoid system intrusions based on the guest account.

Disabling or removing the Guest account is the best way to do it, but in some cases you have to use the Guest account, there are other ways to do the defensive work. First, set a strong password for the guest, and then set the Guest account's access to the physical path in detail. For example, if you want to prevent guest users from having access to the tool folder, you can right-click the folder and select the Security tab in the pop-up menu to see all users who have access to the folder. Remove all users except administrators.                      Or you can set permissions for the appropriate user, such as "List Folder Directory" and "read", and so on, which is much more secure. This article originates from the http://www.516c.cn blue Collection and collation. Reprint please specify the source!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.