Top ten tips for ADSL routers to prevent hacker attacks

Source: Internet
Author: User
Keywords Attacks hackers routers ADSL
At present, the use of ADSL users more and more, because ADSL users online long, fast, so hackers are targeted. Now there are a variety of more and more detailed "IP address library", to know some ADSL users of the IP is very easy things. How to defend your network security? Consider the following methods. One, remove folder hidden share if you use Windows 2000/XP System, if you right-click on C or another disk and choose Share, you'll be surprised to find that it's been set to "Share this folder" and not see it in your "Network Neighborhood". Originally, by default, Windows 2000/xp opens hidden shares for all partitions, and you can see a "$" appended to each partition name on the hard disk by selecting System Tools/Shared Folders/shares under the Control Panel/Administrative Tools/Computer Management window. But as long as you type "computer name or IPC", the system will ask the user name and password, unfortunately, most of the personal User system administrator's password is empty, intruders can easily see the content of C disk, which gives network security has brought great hidden dangers. How do you eliminate default sharing? The method is simple, open Registry Editor, go to "hkey_local_machinesystemcurrentcontrolsetseviceslanmanworkstationparameters", and create a new name called " AutoShareWks, and set its value to "0" and then restart the computer so that the share is canceled. Second, the rejection of malicious code malicious Web page has become one of the biggest threats to broadband. Before using the modem, because the speed of opening the Web page is slow, before the full opening of the malicious Web page to avoid the possibility of recruitment. Broadband is now so fast that it can easily be attacked by malicious Web pages. Common malicious Web pages are because of the addition of malicious code written to be destructive. These malicious code is equivalent to some small program, as long as the page is opened to be run. So to avoid malicious Web page attacks as long as the prohibition of these malicious code to run it. Run IE browser, click "Tools/internet Options/Security/Custom Level" to define the security level as "security level-high", set the 2nd and 3 items to "disabled" in ActiveX controls and Plug-ins, set the other items to "prompt", and then click OK. This setting, when you use IE to browse the Web page, you can effectively avoid malicious Web page malicious code attacks. Third, the closure of the hacker's "back door" as the saying goes "smoke", since the hacker can enter, that means that the system must exist for them to open the "back door", as long as the door to block the backdoor, so that hackers have no place to start, there will be no worries! 1. Delete unnecessary protocols for servers and hosts, TCP is typically installed onlyThe/IP agreement is enough. Right-click Network Neighborhood, select Properties, right-click Local Area Connection, select Properties, and uninstall unnecessary protocols. Among them, NetBIOS is a source of many security flaws, and for hosts that do not need to provide file and print sharing, it is possible to shut down the TCP/IP protocol NetBIOS to prevent NetBIOS attacks. Select TCP/IP protocol/Properties/advanced to go to the Advanced TCP/IP Settings dialog box, select the WINS tab, and uncheck "Disable NetBIOS on TCP/IP" to turn off NetBIOS. 2. Turning off file and print sharing files and print sharing should be a useful feature, but it is also a good security breach for hackers when it is not needed. So we can turn it off without the need for file and print sharing. Right-click Network Neighborhood, select Properties, and then click the File and Print Sharing button to remove the hooks from the two check boxes in the File and Print Sharing dialog box that pops up. Although file and print sharing is turned off, it is not guaranteed to be secure, and the registry is modified to prevent people from changing file and print sharing. Open Registry Editor, select the "Hkey_current_usersoftwaremicrosoftwindowscurrentversionpoliciesnetwork" primary key, and under the primary key, create a new DWORD type key value named " Nofilesharingcontrol ", the key value is set to" 1 "to prohibit this feature, so as to prohibit the change of" File and Print sharing ", the key value of" 0 "to allow this feature. This removes file and print sharing from the Properties dialog box in Network Neighborhood. 3. The Guest account is disabled a lot of intrusion is through this account to further obtain the administrator password or permissions. If you don't want to give your computer to others as a toy, it's a good ban. Open the Control Panel, double-click Users and Passwords, click the Advanced tab, and then click the Advanced button to eject the Local Users and Groups window. Right-click on the Guest account, select Properties, and choose "Account deactivated" on the "General" page. In addition, renaming the administrator account can prevent hackers from knowing their administrator account, which will largely guarantee computer security. 4. Prohibit the establishment of a null connection by default, any user can connect to the server via a null connection, enumerate the accounts, and guess the password. Therefore, we must prohibit the establishment of an empty connection. There are two methods: one is to modify the registry: Open the Registry "Hkey_local_machinesystemcurrentcontrolsetcontrollsa", the DWORD value "Restrictanony"The key value of MOUs "1". Finally, we recommend that you put a patch on your system, Microsoft's endless patches are very useful! "Responsible editor: Zhao TEL: (010) 68476636-8001" to force (0 Votes) Tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title of the party (0 Votes) passed (0 votes) by the original: ADSL router to prevent hackers to attack the top ten tips back to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.