Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
Since the 1990s, human society has entered the network era, information sharing has become the most basic feature of the network era. Information security is mainly embodied in network-oriented information security. So what do we do to protect our computers, and here are a few simple, effective ways to set this up:
First, close unnecessary ports
Hackers often scan your computer port at the time of intrusion, and if you have a port monitor installed, the monitor will have warning prompts (such as Netwatch). If you encounter this intrusion, the tool software can be used to shut down ports that are not in use, for example, by using "Norton Internet security" to turn off the 80 and 443 ports used to provide Web services, and some other infrequently used ports may be closed.
Second, change the administrator account
The Administrator account has the highest system privileges, and once the account is exploited, the consequences are disastrous. One of the common means of hacking is to try to get the password of the administrator account, so we have to reconfigure the administrator account.
The first is to set up a powerful and complex password for the administrator account, and then we rename the Administrator account and create an administrator account that does not have admin privileges to deceive the intruder. In this way, it is difficult for intruders to figure out which account really has administrator rights, and to some extent reduce the risk.
Iii. eliminating the intrusion of the Guest account
The Guest account, the so-called Guest account, has access to the computer, but is restricted. Unfortunately, the guest also opened the door for hacking! There are many articles on the web that have introduced how to use guest users to get administrator privileges, so avoid system intrusions based on the guest account.
Disabling or removing the Guest account is the best way to do it, but in some cases you have to use the Guest account, there are other ways to do the defensive work. First, set a strong password for the guest, and then set the Guest account's access to the physical path in detail. For example, if you want to prevent guest users from having access to the tool folder, you can right-click the folder and select the Security tab in the pop-up menu to see all users who have access to the folder. Remove all users except administrators. Or you can set permissions for the appropriate user, such as "List Folder Directory" and "read", and so on, which is much more secure. This article originates from the http://www.516c.cn blue Collection and collation. Reprint please specify the source!