Building XP'S Safety Defense Line
The world is amazing. Anyone can imagine that a network will completely change people's lives. Through the Internet, we can easily implement home office, home trading, VOD VOD, online games and so on.
The rapid development of Internet has indeed made us taste the sweetness.
However, sometimes it will bring us helplessness: when we surf the Internet, network viruses and hacking tools appear frequently, making you worry and worry you.
For netizens, all kinds of potential threats may come at any time.
In these threats, it is often "clear guns to hide and difficult to prevent". Network viruses, hacker tools are more valued by people, and the loss is relatively small, but for those who use special means to spy on their privacy, they neglect.
Obviously, it has caused privacy leakage, but has no knowledge of it.
Therefore, what measures should be taken to ensure the safety of personal network is bound to become the most concern of Internet users.
First, the stealth method in the network.
To remind Internet users who often surf the Internet, we should note that the operating system above Win9x can have the memory function for the information previously logged on. When we restart the computer next time, we will find the login name of the last user in the user name column. This information may be used by some illegal elements and threaten the users. Therefore, it is necessary for us to hide the names of the users on the computer.
There are three ways to use it. The specific steps are as follows:
The first method: first, open the local connection property (control panel to network connection), select "Microsoft network file and printer sharing" in the "General tab", click the uninstall button, click "OK" in the pop-up dialog box to prohibit "Microsoft network file and printer sharing", thus hiding the computer.
Second way: first, open the registry editor (start to run to Regedit), find the "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" branch, change the value of "Hidden" (REG_DWORD type) to 1 (0 is not hidden) in the right pane, and then quit the registry editor and restart the computer.
The third way is to start with the "run" dialog box in the start menu, enter the "gpedit.msc" command in "open", start the group policy, click "computer configuration, Windows settings, local strategy, user rights assignment" in turn, find "refuse to access the computer from the network" in the right window, double-click, click add user or group, click "advanced" in the pop-up dialog box, and use "search immediately" function to determine which users are allowed to access the computer through the network.
After using the above methods, you can rest assured!
Your computer has been hidden and no longer worried about the problem of resource leakage.
Two. Update your software regularly.
To protect computers from being attacked by Internet.
Our anti-virus software needs frequent updates.
At present, most anti-virus software has automatic reminder function. If your virus library has been used for a period of time without updating, anti-virus software will pop up and remind you to update your anti-virus software in time.
Antivirus software is not available for viruses that are not defined in the virus library.
If you can't do that, you will pay a heavy price.
In addition, it is also necessary to update the Windows operating system itself.
At present, the frequency of Microsoft security patches is very high.
But on the other hand, although Microsoft can not avoid loopholes, it has been taking active measures and is very effective.
From Windows98 to the latest Windows version, there is a link to the Windows update site in the start menu. Windows2000 with servicepack3 and XP and automatic update function can automatically download the latest upgrade files in the background.
Making computer software in the latest version is of great benefit to computer security.
At the same time, we must guard against similar Kazaa file sharing services, because this kind of file sharing service is much more trap than a few years ago.
If you want to use this software to download files, check that the size of the file is reasonable, especially if you want to verify the real name of the file you downloaded.
Doing so does not guarantee one hundred percent security, because Peer-to-Peer (point to point) shareware is itself an unsafe factor.
You can take a look at Kazaa's report on the spread of the virus.
Http://www.blue198.com.cn/news/findnews/shownews.asp? Newsid=4328 can also search "Kazaa" on www.google. to learn relevant information.
Three, configure WindowsXP firewall
Installing and configuring firewalls is a good way to protect your computer or network effectively.
But we need a Cable/DSL router that integrates firewall /NAT, or a firewall software, such as ZoneAlarm, BlackIce.
You can also use the WindowsXP home edition or professional edition.
The firewall we are configuring here, and most of the firewall software, its default configuration is to close all the data receiving ports.
So if you want a computer on a Internet to access some parts of your network, you must modify the default configuration.
At the same time, applications need to be checked to determine which ports they will use.
All software vendors will add this information to their own software.
Now we are going to configure the two most common firewalls.
Main roles: the firewall program in the WindowsXP operating system and an ordinary cable/DSL router.
How to configure WindowsXP firewall?
First, you need to activate the firewall.
Take the English version of XP as an example, enter "start/controlpanel/networkandInternetconnections/networkconnections", then right-click your Internet connection, select "properties", select the "advanced" label after entering the property page, then click "InternetConnectionFirewall".
What we do now is just a package
- Related reading
Low Cost Strategy For Website Construction Of Small And Medium Sized Enterprises
|- Web page | Qiangxin Mechanical Technology Presents To The World A STRONG&Nbsp; H
- Advertising blockbuster | Miss World China 2011 Finals Swimsuit
- Fashion character | Busan Film Festival Opens &Nbsp; Fan Bingbing Blue Yarn Skirt Again Becomes The Focus.
- Fashion Bulletin | Casual Shoes And Clothes, Autumn And Winter, Street Fashion.
- Equipment matching | Dongguan Emma CNC "Digital Future, Charm China Line"
- Web page | September Emma CNC Brings New Products To China International Sewing Equipment Exhibition
- Shoe Express | Fun, Pace, Converse&Nbsp; X&Nbsp; Marimekko&Nbsp; Holiday&Nbsp; 2011 Series.
- Fashion Bulletin | How To Understand A Person In All Directions Through Shoes
- Regional policy | In Order To Promote Energy Saving And Consumption Reduction, Zhejiang Has Set Up Energy Consumption Quota Standards For 44 Industries, Such As Printing And Dyeing.
- Fashion Bulletin | Patients With Achilles Tendinitis Benefit By Adjusting The Height Of Their Shoes.
- Smes Need To Get Out Of E-Commerce Misunderstandings
- Google'S Internal Data Language Is Nearly 100 Times Faster Than XML.
- Low Cost Strategy For Website Construction Of Small And Medium Sized Enterprises
- SME Database Maintenance Is Very Weak.
- How To Improve Website Ranking On Google
- Tips On Creating User Experience For Good Content Websites
- Ya Jia - To Carry Out The Fashion Classics To The End! Recruitment Agents!
- Let Your Eyes Cash In On Value.
- OWL08 Autumn And Winter Inviting Business!
- "King Of The Zodiac" -- 3.15 Quality And Service Promise Honest Enterprise