Ten recommendations to strengthen the security of the Windows operating system (2)

  

5, using data encryption

For those security-conscious computer users or system administrators, there are different levels of data encryption can be used, according to the need to choose the correct level of encryption is usually based on specific The situation is determined.

Data encryption can range from encrypting files one by one to encrypting file systems, and finally encrypting the entire disk. In general, these encryption levels do not include encryption of the boot partition, because that requires decryption help from specialized hardware, but if your secret is important enough to spend this part of the money, you can also achieve this to the entire system. Encryption. In addition to boot partition encryption, there are a number of solutions to meet every level of encryption, including both commercial proprietary systems and open source encryption for every major desktop operating system. system.

Friendly Tips for Web Teaching: Regardless of the operating system you are using now, there are always some general recommendations for enhancing system security. If you want to harden your system to prevent unauthorized access and unfortunate disasters, the following precautions will definitely help you. 1. One of the easiest and most effective ways to increase security with a high-security password is to use one that doesn't easily


6. Protect your data by backup
Back up your data. This is one of the most important ways you can protect yourself in the face of disasters. A data redundancy strategy can include both simple and basic periodic copying of data onto a CD, as well as complex periodic automatic backups to a single server.

For systems that must maintain continuous online service without downtime, RAID provides automatic error redundancy to prevent one of the disks from failing.

Free backup tools such as rsync and Bacula can integrate automated backup solutions of any complexity level. Version control tools such as Subversion provide flexible data management, so you can not only do backup work on another computer, but you can also synchronize the same data with multiple computers without the hassle. Using subversion in this way, I was spared when the hard drive of my working notebook was damaged in 2004, which also illustrates the importance of regular backup of critical data.

7. Encryption-sensitive communication

A cryptosystem for protecting communications from eavesdropping is very common. The OpenPGP-enabled software for e-mail, the Off The Record plug-in for instant messaging clients, and the encrypted channel software for maintaining communications using secure protocols such as SSH and SSL, as well as many other tools, can be easily used to ensure Data is not compromised during transmission.

Of course, in personal-to-person communication, it is sometimes difficult to convince the other party to use encryption software to protect communications, but sometimes this protection is very important.

8. Don't trust external networks

In an open wireless network, such as in a local coffee shop with a wireless network, this concept is very important. If you are very cautious and alert enough to security, there is no reason to say that you can't use this wireless network in a coffee shop or some other untrusted external network. However, the key is that you must ensure security through your own system, and don't believe that external networks are as secure as your own private networks.

For example, in an open wireless network, it is necessary to use encryption to protect your sensitive communications, including when you connect to a website, you might use a login session cookie. To automatically authenticate, or enter a username and password for authentication. Also, be sure not to run network services that are not required, because if there are unpatched vulnerabilities, they can be exploited to threaten your system. This principle applies to network file system software such as NFS or Microsoft's CIFS, SSH servers, Active Directory services, and many other possible services.

Check your system from both internal and external sources to determine what opportunities can be exploited by malicious security breachers to threaten your computer's security and ensure that these entry points are closed as much as possible. In some ways, this is just an extension of the two security recommendations for turning off unwanted services and encrypting sensitive communications, and you need to be more cautious when using external networks. Many times, protecting yourself in an external, untrusted network will actually require you to reset the security configuration of your system.

9. Using Uninterruptible Power Supply Support

If you just don't lose files during a power outage, you may not want to choose to purchase a UPS. In fact, it is recommended that you use UPS, there are more important reasons, such as power conditioning and avoid file system damage. For this reason, make sure your operating system can remind you when it will be turned off so that you don't be at home when the power is exhausted, and be sure to ensure a UPS that provides power conditioning and battery backup.

A simple surge protector is not enough to protect your system from "dirty electricity." Remember, UPS plays a key role in protecting your hardware and your data.

10, monitoring system security is threatened and intrusive

Never think: because you have taken a series of security measures, your system will not be vulnerable to security breaches Invasion. You should set up some types of monitoring programs to ensure that suspicious events can quickly get your attention and allow you to track whether it is a security breach or a security threat. We not only monitor the local network, but also perform integrity checks and use some other local system security monitoring technologies.

There are many other security precautions depending on the operating system you are using. Some operating systems have larger security issues due to design reasons. And some operating systems allow experienced system administrators to greatly improve system security. However, whether you are using Microsoft's Windows and Apple's Mac OSX, or use open source operating systems like Linux, FreeBSD, etc., when you are strengthening their security, the above suggestions must be kept in mind.


Copyright © Windows knowledge All Rights Reserved