Modify the registry

  

Computer store news: Although the function of Windows 2003 is constantly increasing, due to congenital reasons, it still has many security risks. If you do not block these hidden dangers, it may bring the whole system. Unnecessary troubles; below I will introduce the anti-blocking method of the security risks that are not common in Windows2003, I hope to help you!
Blocking automatic save hazards
When the Windows 2003 operating system makes an error in calling the application, Dr. Watson in the system will automatically save some important debugging information, so that it can be viewed later when the system is maintained, but this information is very It is possible for a hacker to "shoot on", and once it is aimed at, all kinds of important debugging information will be exposed. In order to block the hidden danger of Dr. Watson automatically saving debugging information, we can achieve the following steps:
1, open the start menu, select the "Run" command, in the subsequent open dialog box, enter the registry edit command "ergedit", open a registry editing window;
2, in the window In the middle, use the mouse to expand the HKEY_local_machine\\software\\Microsoft\\WindowsdowsNT\\CurrentVersion\\AeDebug branch. In the right sub-window corresponding to the AeDebug key, double-click the Auto value, and in the pop-up parameter setting window, reset its value to & ldquo; 0 & rdquo ;, shown in Figure 1;

FIG. 1
3, open the system's Windows Explorer window, and then expand the Documents and Settings folder, All Users folder, Shared Documents folder, DrWatson folder, and finally the User.dmp file in DrWatson, Drwtsn32.log The file is deleted.
After completing the above settings, restart the system, you can block the automatic save hidden danger.
Blocking resource sharing hidden dangers
In order to facilitate the transfer of information between LAN users, Windows Server 2003 system is very "comprehensive" to provide you with file and print sharing capabilities, but we While enjoying the convenience of this feature, the sharing function will also “lead the wolf into the room”, “great degree”, opening a lot of loopholes to the hackers, causing great insecurity to the server system; therefore, When you are finished using the file or print sharing function, you should always turn off the function at any time to block the hidden danger of resource sharing. Here are the specific steps to turn off the sharing function: 1. Execute the “Network Connection” under the control panel menu item. ; command, in the window that appears, right-click on the "local connection" icon;
2, in the shortcut menu that opens, click the "property" command, this will open a <;Internet Protocol (TCP/IP)" Property Settings Dialog;
3. In this interface, cancel “ Microsoft Network File and Printer Sharing & rdquo; this option;
4, this way, the local computer is no way to provide external file and print sharing services, so naturally less hackers to attack the system & ldquo; channel & rdquo ;.
Blocking Remote Access Hidden Trouble
Under Windows 2003 system, when remote network access connection is required, the remote desktop function under this system can transmit the user name and password entered during network connection through ordinary plaintext content. To the client program of the corresponding connection; in the process of clear text account transmission, realize that all kinds of sniffing tools on the network channel will automatically enter the state of "sniffing", this plaintext account is easy to be "Captive"; the contents of the plaintext account have been used by hackers or other attackers, hehe, be careful that your system is "crazy" attack! In order to prevent this security risk, we can use the following method to "reinforce" the system: 1. Click the "Start" button on the system desktop to open the Start menu;
2. Execute from it Control panel command, from the pop-up drop-down menu, select the "System" command to open a system property setting interface; 3, in the interface, click with the mouse "remote" label;
4, in In the subsequent tab page, the option "Allow users to connect to this computer remotely" is removed, so that the remote access connection function can be blocked, thus blocking the remote access hazard.
Blocking user switching risks
Windows 2003 system provides us with fast user switching function, which makes it easy to log in to the system; however, when enjoying this kind of difficulty, the system also has installation hidden dangers. For example, if we execute the system "start""""""""""""""""""""" The ground is regarded as a violent "attack" on the computer system, so that the Windows 2003 system may treat the currently logged in account as a illegal account and lock it up. This is obviously not what we need; however, we can press the following Steps to block the security risks caused by user switching:
In the Windows 2003 system desktop, open the Control Panel command under the Start menu, find the following "Administrative Tools" command, and then execute the submenu in the lower menu. "Computer Management" command to find the "User Account" icon and then In the window that appears, click “change the way the user logs in or logs out  in the open settings window, the “Use Fast User Switching” option can be cancelled.
Blocking Page Exchange Hidden Trouble
Windows 2003 operating system may leak important confidential information, especially important account information, to hackers or other visitors even in normal working conditions. Maybe we will never want to check out the files that may leak private information, but hackers are very concerned about them! In the page exchange file in the Windows 2003 operating system, a lot of important private information is hidden. This information is generated dynamically. If it is not cleared in time, it is likely to become a breakthrough for hackers; We must follow the following method to let the Windows 2003 operating system automatically delete all the page files generated when the system is working when the system is shut down:
1. In the Windows 2003 "Start” menu, execute “Run” command, open the run dialog, and enter the “Regedit” command to open the registry window;
2. In the left area of ​​the window, click HKEY_local_machine\\system\\ The currentcontrolset\\control\\sessionmanager\\memory management key, find the ClearPageFileAtShutdown key in the right area, and double-click it with the mouse. In the subsequent value setting window, change the DWORD value to “1”;
3 After completing the settings, exit the registry editing window and restart Computer system, you can make the above settings take effect. ”

Copyright © Windows knowledge All Rights Reserved