• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    Building XP'S Safety Defense Line

    2008/7/12 14:11:00 31

    Building XP'S Safety Defense Line

    The world is amazing. Anyone can imagine that a network will completely change people's lives. Through the Internet, we can easily implement home office, home trading, VOD VOD, online games and so on.

    The rapid development of Internet has indeed made us taste the sweetness.

    However, sometimes it will bring us helplessness: when we surf the Internet, network viruses and hacking tools appear frequently, making you worry and worry you.



    For netizens, all kinds of potential threats may come at any time.

    In these threats, it is often "clear guns to hide and difficult to prevent". Network viruses, hacker tools are more valued by people, and the loss is relatively small, but for those who use special means to spy on their privacy, they neglect.

    Obviously, it has caused privacy leakage, but has no knowledge of it.

    Therefore, what measures should be taken to ensure the safety of personal network is bound to become the most concern of Internet users.



    First, the stealth method in the network.



    To remind Internet users who often surf the Internet, we should note that the operating system above Win9x can have the memory function for the information previously logged on. When we restart the computer next time, we will find the login name of the last user in the user name column. This information may be used by some illegal elements and threaten the users. Therefore, it is necessary for us to hide the names of the users on the computer.

    There are three ways to use it. The specific steps are as follows:



    The first method: first, open the local connection property (control panel to network connection), select "Microsoft network file and printer sharing" in the "General tab", click the uninstall button, click "OK" in the pop-up dialog box to prohibit "Microsoft network file and printer sharing", thus hiding the computer.



    Second way: first, open the registry editor (start to run to Regedit), find the "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" branch, change the value of "Hidden" (REG_DWORD type) to 1 (0 is not hidden) in the right pane, and then quit the registry editor and restart the computer.



    The third way is to start with the "run" dialog box in the start menu, enter the "gpedit.msc" command in "open", start the group policy, click "computer configuration, Windows settings, local strategy, user rights assignment" in turn, find "refuse to access the computer from the network" in the right window, double-click, click add user or group, click "advanced" in the pop-up dialog box, and use "search immediately" function to determine which users are allowed to access the computer through the network.

    After using the above methods, you can rest assured!

    Your computer has been hidden and no longer worried about the problem of resource leakage.



    Two. Update your software regularly.



    To protect computers from being attacked by Internet.

    Our anti-virus software needs frequent updates.

    At present, most anti-virus software has automatic reminder function. If your virus library has been used for a period of time without updating, anti-virus software will pop up and remind you to update your anti-virus software in time.

    Antivirus software is not available for viruses that are not defined in the virus library.

    If you can't do that, you will pay a heavy price.



    In addition, it is also necessary to update the Windows operating system itself.

    At present, the frequency of Microsoft security patches is very high.

    But on the other hand, although Microsoft can not avoid loopholes, it has been taking active measures and is very effective.

    From Windows98 to the latest Windows version, there is a link to the Windows update site in the start menu. Windows2000 with servicepack3 and XP and automatic update function can automatically download the latest upgrade files in the background.

    Making computer software in the latest version is of great benefit to computer security.



    At the same time, we must guard against similar Kazaa file sharing services, because this kind of file sharing service is much more trap than a few years ago.

    If you want to use this software to download files, check that the size of the file is reasonable, especially if you want to verify the real name of the file you downloaded.

    Doing so does not guarantee one hundred percent security, because Peer-to-Peer (point to point) shareware is itself an unsafe factor.

    You can take a look at Kazaa's report on the spread of the virus.

    Http://www.blue198.com.cn/news/findnews/shownews.asp? Newsid=4328 can also search "Kazaa" on www.google. to learn relevant information.



    Three, configure WindowsXP firewall



    Installing and configuring firewalls is a good way to protect your computer or network effectively.

    But we need a Cable/DSL router that integrates firewall /NAT, or a firewall software, such as ZoneAlarm, BlackIce.

    You can also use the WindowsXP home edition or professional edition.

    The firewall we are configuring here, and most of the firewall software, its default configuration is to close all the data receiving ports.

    So if you want a computer on a Internet to access some parts of your network, you must modify the default configuration.

    At the same time, applications need to be checked to determine which ports they will use.

    All software vendors will add this information to their own software.

    Now we are going to configure the two most common firewalls.

    Main roles: the firewall program in the WindowsXP operating system and an ordinary cable/DSL router.



    How to configure WindowsXP firewall?

    First, you need to activate the firewall.

    Take the English version of XP as an example, enter "start/controlpanel/networkandInternetconnections/networkconnections", then right-click your Internet connection, select "properties", select the "advanced" label after entering the property page, then click "InternetConnectionFirewall".

    What we do now is just a package

    • Related reading

    Smes Need To Get Out Of E-Commerce Misunderstandings

    Market network
    |
    2008/7/12 14:10:00
    28

    Google'S Internal Data Language Is Nearly 100 Times Faster Than XML.

    Market network
    |
    2008/7/12 14:10:00
    27

    Low Cost Strategy For Website Construction Of Small And Medium Sized Enterprises

    Market network
    |
    2008/7/12 14:09:00
    27

    SME Database Maintenance Is Very Weak.

    Market network
    |
    2008/7/12 14:09:00
    35

    How To Improve Website Ranking On Google

    Market network
    |
    2008/7/12 14:09:00
    33
    Read the next article

    Olympic Cybersecurity: China Is Not Afraid Of Hackers.

    Olympic cybersecurity: China is not afraid of hackers.

    主站蜘蛛池模板: 亚洲成av人片在线观看无| 天天爽亚洲中文字幕| 国产乱码卡一卡2卡三卡四| 久久国产精品女| 门国产乱子视频观看| 日日噜噜噜夜夜爽爽狠狠视频| 国产中文欧美日韩在线| 丰满少妇被猛烈高清播放| 翁公厨房嫒媛猛烈进出| 成人亚洲国产精品久久| 免费国产高清视频| 99久久精品免费看国产免费| 毛片免费全部无码播放| 国产精品自产拍2021在线观看| 亚洲国产成人久久一区二区三区| 51影院成人影院| 日韩乱码人妻无码中文字幕| 国产三级在线观看免费| 三上悠亚大战黑人在线观看| 白嫩奶水的乳奴| 国产韩国精品一区二区三区| 亚洲国产成人精品女人久久久| 免费观看美女用震蛋喷水的视频 | 黄色软件下载免费观看| 日本免费小视频| 又黄又爽又色的视频| sao浪美人的激爱之路| 欧美白人最猛性xxxxx| 国产欧美va欧美va香蕉在线观看| 久久夜色精品国产欧美乱| 美女被吸乳老师羞羞漫画| 精品国产粉嫩内射白浆内射双马尾| 小泽玛利亚国产在线视频| 亚洲色在线视频| 手机在线看片国产| 日本娇小videos精品| 六月丁香婷婷综合| 800av在线播放| 日韩AV无码一区二区三区不卡毛片 | 韩国理论片中文字幕版电影| 成人性生话视频|