Computer Information and Security Practical Knowledge Teaching

  
Network can be said to be safe or dangerous. It depends on whether you know some computer information and security skills! The security of the network is crucial, because an oversight can easily reveal all kinds of information! Here is a brief introduction to some of the commonly used knowledge to protect your own network security! First, security settings. 1. Power-on password setting. Method: Click “Start”→Open“Control Panel”→Double-click"user account” →click on the account name you want to change in the list→ click“create password”→open Enter your own password in the first column of the page, then enter your password in the second column to confirm, and finally click the “Create Password” button in the lower right corner of the page to set it successfully. Restart the computer, you will find a dialog box asking for a password before logging in to the desktop. Enter the correct password in the password box to log in to the system. Role: It can prevent others from opening the computer without their permission, and can effectively prevent hackers from invading the system anonymously. 2. Screen saver settings. Method: Right click on the system desktop blank → “ attribute & rdquo; & rarquo; & ldquo; screen protection & rdquo; set. Role: After the screen saver is enabled in Windows, as long as we leave the computer (or do not operate the computer) for a preset time, the system will automatically start the screen saver, and when the user moves the mouse or hits the keyboard, I want to return to normal. In the working state, the system will open a password confirmation box. Only after entering the correct password can the system be returned to the system. Users who do not know the password will not be able to enter the working state, thus protecting the data security. 3. The screen is locked. Method: When the computer is open and you want to leave temporarily, to prevent others from using your own computer, press the Windows + L button at the same time to lock the computer screen. To go back to the system desktop, just click on the username and enter the correct password. Role: quickly lock the computer when the computer is turned on, to avoid others. 4. Turn off the remote function. Method: On the "My Computer" right click on → “ Attributes & rdquo; & rarquo; & ldquo; remote & rdquo; & rarquo; will & ldquo; remote assistance & rdquo; and & ldquo; remote desktop & rdquo; under the box in the box to remove. Role: Prevents hackers from using the "Remote Assistance" and "Remote Desktop" functions to connect to your computer and control your computer. 5. Turn off sharing settings. Method: Open “ Start Menu → Control Panel & Rarr; Management Tools & Rarr; Computer Management & Rarr; Shared Folders & rdquo;, view all shared resources in the computer, if there is sharing, then open “ start menu → control Panel & Rarr; Management Tools & Rarr; Service & rdquo;, find “ Server & rdquo; service, stop the service, and in the "property" in the "start type", set to "manual" or "regular" or "disabled" ; Note that the computer after this setting will not be able to print on the network. Role: Shared services will bring convenience to hackers, and can be effectively prevented from hacking after being disabled. 6. Turn on automatic updates. Method: Right click on “My Computer&rquo;"Properties”→“Automatic Update”→Select"Automatic (Recommended)” → Role: When Microsoft discovers operating system vulnerabilities, it will issue a patch to enable this feature to automatically download patches for installation on computers connected to the Internet, thus effectively preventing hackers. 7. Open the firewall. Method: Open “ Start Menu & Rarr; Control Panel & Rarr; Network Connection & Rarr; Local Connection & rdquo;, double-click to open “ Local Connection & rdquo; select “General “→“Properties”→“ Advanced & rdquo; → & ldquo; Windows Firewall & rdquo; & rarquo; & ldquo; set & rdquo; & rarquo; & ldquo; enable (recommended) & rdquo;. Role: to prevent hacking. Second, with the help of third-party software 1, install anti-virus software and virus firewall. A virus is a harmful computer program that destroys the software programs and documentation we use. It mainly comes from the network and spreads through e-mail or some infected media such as floppy disks, USB flash drives, mobile hard disks, and optical disks. Computers that do not have upgradeable anti-virus and virus firewalls are vulnerable to infection. At present, the more commonly used anti-virus software are: Kaspersky, Rising, Jinshan, Jiangmin, Norton, PC-cillin (recommended for use). The Rover firewall is recommended for virus firewalls. U disk, mobile hard disk virus killing is recommended to use the U disk virus kill tool USBcleaner. Rogue software clears the recommended use of Rising Kaka. Trojan horses are recommended for use in Trojans. Internet pop-up various illegal networks recommended to use Huangshan IE repair experts. These software can be downloaded and used online. 2, install windows optimization master and super magic rabbit and other software to optimize the system settings, clear Internet traces, document operation traces and temporary files, error files, fragment files, can reduce the risk of compromise. Third, encryption or hiding 1, encryption. There are a lot of encryption software, you can download some small software to encrypt the folder on the Internet, and pay attention to file backup before trial. You can also use common compression software, such as winram, winzip, etc. to encrypt and compress folders. For word and Excel files, you can open the file directly and select “Tools”→“Options"→“Security", enter the password to open or change the password for encryption. 2, hidden. You can download software on the Internet to hide disk or disk partitions, folders, files, and so on. The easy way is to right click on the folder or file right click → “ attribute & rdquo; → in the box in front of the "hidden", click the left mouse button to hit the hook, press the F5 button to see, the file Is it missing? To find this file, you need to open “My Computer”→“Tools”→“Folder Options”→“View”→Select “Hide Files and Hidden Folders” Under the "Show all files" & rdquo; → OK. Fourth, data backup According to the relevant provisions of confidential work, non-confidential computers should not store confidential information, including important documents and official documents of our daily work. These data should be collected in time, copied to a mobile hard disk or burned to a data disc for proper storage.
Copyright © Windows knowledge All Rights Reserved