Seven tricks to avoid illegal invasion without hacking broilers (1)

  

This article wants to inform ordinary computer users that it is super simple and effective to prevent the computer from becoming a "broiler" of others. You only need to realize that if you become a "broiler", you will be very hurt and you will definitely refuse to be controlled by anyone. To do this, the attacker wants to catch you, neither is the door.
Closer to home, to prevent becoming a "broiler", you only need to pay attention to the following points:

Key point 1: pirated Windows XP is a huge risk, you need to immediately modify it.

If your operating system is installed by other technicians, or it may be pirated XP, such as the computer installer's Tomato Garden XP, Yumu Linfeng XP, Tornado XP and so on. Many of these systems are unattended. The installation procedure is very simple. You put the CD into the computer, go out to drink tea, and you may find that the system has been installed.

Where is the biggest flaw in such a system? Again, the administrator password for this system is empty and automatically logged in. In other words, anyone can try to log in to your system with a blank password, which is not an obstacle for the Internet.

Transformation method:

Immediately modify the administrator user password. The password uses a combination of letters and other special characters, and the length is not less than 8 digits.

To change the login method, you must press ctrl+alt+del to log in.

Point 2: Any time you leave your computer, it is recommended to unplug the network cable, the computer can not be disconnected, it is recommended to lock immediately, do not allow strangers to physically touch your computer.

Just find a Windows PE CD (Deep Mountain Red Leaf Repair Toolpad, etc.), use this CD to boot, you can easily modify your administrator login password, modify your registry information, of course, including writing Virus, then start the virus program.

There used to be an example. A white-collar online bank in Shanghai was taken away by Yunnan hackers for 100,000 yuan. For the general online banking, the popular version usually limits the withdrawal of 1,000 yuan a day, which is a small payment. Once the account is lost, the loss will not be particularly large. For professional online banking, if the digital certificate is stored on the local computer, when you leave your computer for a long time, the attacker can remotely control your computer and transfer the property on your computer. This is no different from your local online banking business. For online banking users who use mobile digital certificates, be careful not to unplug the digital certificate when it is used, and do not give the attacker any chance.

Solution:

When you need to leave the computer for a long time, lock the computer or unplug the network cable.

Point 3: Make sure to enable the network firewall

For Internet users, the network firewall (note, here is the firewall, not many people think that the virus is monitored in real time) is to isolate you from the outside world. Passing, properly enabling and configuring the firewall will reduce your chances of directly facing the attack. When your system has a patch that is not patched, the firewall may be the only solution that protects your computer's security.

However, don't think that if you turn on the firewall, you will have nothing to worry about. The firewall basically only intercepts the communication from the outside to the inside (from the Internet to the local machine). From the inside to the outside, it is easy to use various means to spoof. This is how Trojans evade the firewall to complete the theft task.

Although the firewall is not always effective, but the firewall is much stronger than no, it must be enabled.

Point 4: Pay attention to security vulnerability information and use various patch repair tools in time to improve system security.

System vulnerabilities are usually exploited by hackers for a long time before they are officially released. This is the usual 0day attack, and such attacks are becoming more common. The vulnerability involves windows operating system files and other application software, but the biggest risk is still the windows system vulnerability. The exploitation of application software vulnerabilities is subject to more environmental constraints, usually with relatively low risks.

The most recent cause of concern is the flash player vulnerability, which can be exploited by an attacker to run arbitrary code.

Solution:

Can use windows update, must use, let windows automatically update. See the icon in the bottom right corner of windows update is working, don't block it.

Some pirated users can't use windows update or microsoft update normally. It is recommended to use third-party vulnerability repair tool.

Point 5: Install anti-virus software, and often check if it works properly, can you update the virus features


Copyright © Windows knowledge All Rights Reserved