Ten Tips to protect computer security anti-assault (2)

  
V.

close unnecessary ports Hackers often scan time of the invasion port of your computer, if you install the port monitor program (such as Netwatch), the monitoring program There will be a warning. If you encounter such an intrusion, you can use the tool software to close the unused port. For example, use "NortonInternetSecurity" to close the ports 80 and 443 used to provide web services. Other ports that are not commonly used can be closed.

Six, replace the administrator account

Administrator account has the highest system privileges, once the account is using the people, the consequences could be disastrous. One of the common ways to hack is to try to get the password for the Administrator account, so we have to reconfigure the Administrator account.

The first is set for the Administrator account a strong complex password, and then we rename the Administrator account, and then create an Administrator account without administrator privileges to deceive the intruder. In this way, it is difficult for an intruder to figure out which account actually has administrator privileges, which reduces the risk to a certain extent.

Seven, to prevent the invasion of Guest account

so-called guest account Guest account, it can access the computer, but limited. Unfortunately, Guest has also opened the door for hacking! There are many articles on the Internet that describe how to use the Guest user to get administrator privileges, so it is necessary to eliminate the system intrusion based on the Guest account.

disable or completely remove the Guest account is the best way, but in some cases you must use the Guest account, you need to do defense work in other ways. First, give the Guest a strong password, and then set the Guest account access to the physical path in detail. For example, if you want to prevent Guest users from accessing the tool folder, you can right-click on the folder and select the "Security" tab in the pop-up menu, where you can see all the users who can access this folder. Just delete all users except the administrator. Or set permissions for the corresponding users in the permissions, for example, only "list the folder directory" and "read", so it is much safer.

Eight, install the necessary security software

We should also install and use the necessary Hacking software in the computer, antivirus software and firewalls are essential. Open them when you are online, so even if a hacker attacks our security, it is guaranteed.

Nine,

prevent Trojans Trojans to steal the useful information will be implanted in the computer, so we have to prevent the implantation of Trojan hacking program, commonly used methods have:

When downloading files, first put them in the newly created folder, and then use anti-virus software to detect, play a role in prevention in advance.

in the "Start" → "program" → "Start" or "Start" → "program" → "Startup" option in the operation to see if there is an unknown item, if so, delete.

all to "Run" as a prefix of suspicious programs in the registry HKEY_LOCAL_MacHINESOFTWAREMicrosoftWindowsCurrentVersionRun delete all.

Ten, do not mail back to strangers Some hackers may

some posing as legitimate Web sites, and then compile a high-sounding reason to send a letter to ask you to enter your Internet user Name and password, if you press "OK", your account and password will be in the hacker's mailbox. So don't just go back to the stranger's mail, even if he says it will be tempting and tempting.
Copyright © Windows knowledge All Rights Reserved