Experts teach you how to deal with the existing win2003 security risks

  

Due to congenital problems, although the functions of windows 2003 are constantly improving, there are still many security risks. If you do not block these hidden dangers in time, the system will have various problems, which will bring unnecessary trouble to everyone. Now come to understand the uncommon security risks under Windows2003 and how to block them.

Blocking automatic save hazards

In order to maintain the system maintenance in the future, when the Windows 2003 operating system makes an error in calling the application, Dr. Watson in the system will automatically save some important debugging information. stand up. But because this information is easy to be targeted by hackers, all kinds of important debugging information will be exposed, so we have to block the hidden dangers of Dr. Watson automatically save debugging information:

1. Open the start menu. , select the "Run" command, in the open run dialog box, enter the registry edit command "ergedit", open a registry editing window;

2, in the window, with the mouse Expand the HKEY_local_machine\\software\\Microsoft\\WindowsdowsNT\\CurrentVersion\\AeDebug branch, and in the right sub-window corresponding to the AeDebug key, double-click the Auto value, and in the pop-up parameter setting window, reset its value to “0” ,

3, open the system's Windows Explorer window, and then expand the Documents and Settings folder, the All Users folder, the Shared Documents folder, the DrWatson folder, and finally the User in DrWatson The .dmp file and the Drwtsn32.log file are deleted.

After the above operation is completed, restart the system and automatically save the hidden dangers to be blocked.

Blocking resource sharing risks

The file and print sharing functions are provided in the Windows Server 2003 system, mainly because it is not convenient for LAN users to transfer information to each other, but because of this It is convenient to open loopholes for hackers, and it also causes great security problems for the server system. Therefore, when using files or print sharing functions, you should close them at any time to block the resource sharing risks:

1 Execute the “Network Connection” command under the Control Panel menu item. In the subsequent window, right-click the “Local Connection” icon;

2. In the shortcut menu that opens. In the middle, click the “Properties” command to open a “Internet Protocol (TCP/IP)” property setting dialog;

3. In this interface, cancel the “Microsoft Network” File and printer sharing & rdquo; This option;

4, this way, the local computer can not provide file and print sharing services, hackers will be less attack system " Road & rdquo ;.

Blocking Remote Access Hidden Trouble

In Windows 2003 system, when performing remote network access connection, the remote desktop function can enter the user name and password when entering the network through ordinary plaintext content. The client program is transmitted to the corresponding connection terminal; in the process of clear text account transmission, if the content of the plain text account is easily used by another hacker or other attacker, the system will be continuously attacked, and the remote access hidden danger is blocked at this time. :

1. Click the “Start” button on the system desktop to open the Start menu;

2. Execute the Control Panel command from the drop-down menu that pops up, select “System” ” command, open a system property setting interface;

3, in this interface, click with the mouse "remote" tag;

4, in the subsequent tab page The "Allow users to connect to this computer remotely" option can be removed, and the remote access connection function can be blocked, thus blocking the remote access hazard.

Blocking user switching risks

We can easily log in to the system because Windows 2003 system provides us with fast user switching function; because of this function, the system also has installation hidden dangers. For example, if we execute the system "start" in the menu"start” menu, fast “ switch user”, when you log in to the system in the traditional way, the system is likely to log in this time. Incorrectly regarded as a violent "attack" on the computer system, the Windows 2003 system may treat the currently logged in account as a illegal account and lock it up, so it is necessary to block the security risks caused by the user switching. :

In the Windows 2003 system desktop, open the Control Panel command under the Start menu, find the following "Administrative Tools" command, and then execute the "Computer Management" command in the lower menu to find &ldquo ; user account & rdquo; icon, and in the window that appears, click “ change the way users log in or log out&rdquo ;; In the open settings window, the “Use Fast User Switching” option can be removed.

Blocking page exchange pitfalls

Leaking important confidential information to hackers or other visitors, especially important account information, even in normal operation of Windows 2003 operating system May be able to come back. In the page exchange file in the Windows 2003 operating system, a lot of important private information is hidden. This information is generated in the dynamic. If you do not clear them in time, it is likely to become a breakthrough for hackers; therefore, it must be Let the Windows 2003 operating system automatically delete all the page files generated when the system is working when the system is shut down:

1. In the Windows 2003 "Start” menu, execute the "Run” command Open the Run dialog and enter the “Regedit” command to open the registry window;

2. In the left area of ​​the window, click HKEY_local_machine\\system\\currentcontrolset\\control with your mouse. \\sessionmanager\\memory management key value, find the ClearPageFileAtShutdown key value in the right area, and double-click with the mouse, in the value setting window that opens later, the DWORD value is re-modified to “1”;

3 After completing the settings, exit the registry editing window and restart the computer system, the settings will take effect.

These uncommon security risks in the win2003 system are actually encountered in our usual basic operations, so we must act quickly to block various security risks in win20003 and let your system Run it under the safe conditions.

How to open dwg file, how to open dwg file

Windows 8.1 Update New Features

One-time batch delete of .svn files under Windows

Microsoft is developing Windows Redstone: next year or will be available

Ubuntu wireless network card search can not find a solution

Data: Win10 share continues to grow, Win7 is still the first

Microsoft released 16 security patches next week to fix 49 vulnerabilities

Introduction to the three major application skills of the control panel in Win7 system

Using a modem to activate Win7 in order to use the various functions of the system

</a></p> </div> </div><div class=wxf4></div> <div class="m2"> <div class="ekmbngbx ekmbngbx_c"> <label>Windows system</label> </div> <div class="uierbxbsh lihen l120 ovnpxrx_win pdt"> <li class=lm><a href="/wxp/">Windows XP System Tutorial</a></li> <li class=lm><a href="/w7/">Windows 7 System Tutorial</a></li> <li class=lm><a href="/w8/">Windows 8 System Tutorial</a></li> <li class=lm><a href="/w10/">Windows 10 System Tutorial</a></li> <li class=lm><a href="/win2003/">Windows 2003 System Tutorial</a></li> <li class=lm><a href="/win2008/">Windows 2008 System Tutorial</a></li> <li class=lm><a href="/windowsvista/">Windows Vista System Tutorial</a></li> <li class=lm><a href="/windowsjc/">Windows tutorial synthesis </a></li> <li class=lm><a href="/windowsserver/">Windows Server System Tutorial</a></li> <li class=lm><a href="/linux/">Linux system Tutorial</a></li> <li class=lm><a href="/ruanjian/">Computer software Tutorial</a></li> <li class=lm><a href="/windowsnt/">Windows NT Tutorial</a></li> </div> </div> </div> </div> <div class="qcieb_es_1"></div> </div> </div> <div class="diianbgdag"> Copyright © <a href="https://www.windows10windows7.com" target="_blank" title="">Windows knowledge</a> All Rights Reserved <script language='javascript' src='https://www.windows10windows7.com/AD/b.js'></script> </div> </body> </html>