Seven strokes to create a secure Windows XP operating system

  


Microsoft's next-generation operating system Win 7 has been available for some time, but due to several reasons such as the update of the user's hardware system and the compatibility of the software with the win 7 system, most users are still using Windows XP extensively. system. Therefore, it is necessary to revisit the old words. In this article, we will talk about some Windows XP security aspects of the operation strategy, so as to make as few attacks as possible from viruses and hackers.

1, shielding does not require the service components
Despite the more service components installed, users can enjoy the more services. However, the service components that users usually use are still limited, and those components that are rarely used not only take up a lot of system resources, but also cause system instability. It also provides multiple ways for hackers to remotely invade. Therefore, we should try to shield those service components that are not needed. The specific operation method is as follows: first find the “Services and Applications” icon in the control panel, and then open the “Services” dialog box, select the program to be shielded in the dialog box, and click the right mouse button. From the shortcut menu that pops up, select the “property”/“stop” command, and set the “startup type" to “manual" or "disabled", so that it can be specified The service component is blocked.

2, timely use of the important components of Windows Update to update the system
WindowsUpdate as the Microsoft security protection systems, improve Windows performance, has now entered its V6 version. Through it, we can not only get component service packs that improve system function and performance (such as the current popular Windows XP Service Pack 2), but also get the latest security vulnerabilities, of course, you can also get the latest hardware drivers. The latest and most popular viruses, trojans, worms, etc. usually take advantage of the latest vulnerabilities in the operating system. If the latest patches are upgraded before their massive attacks, the chances of a computer being attacked will be greatly reduced. .

3,
important information is encrypted to prevent other people when using their own computer, peep own file information stored in the computer, WindowsXP specially provided for us ordinary users & ldquo; File and The folder encryption & rdquo; function, we can encrypt important information stored in the computer, so that other users can not access the contents of the file or folder without a password. When encrypting a file, we first open the Windows XP Explorer, then find the file or folder that needs to be encrypted in the Explorer window, then right-click on the selected file or folder and pop it up. Select the “Properties” command in the shortcut menu, then Windows XP will pop up the file encryption dialog box, click the “General” tab in the dialog box, and then select ““Advanced” to encrypt the content to protect the data. & rdquo; It will be fine.

4, lock your computer If you need a short
leave the computer, then use the computer in the process because of a hurry, many people fear their computers will be occupied by others, tend to take the first shutdown, Leave, then come back and turn it on again, but it is not good for the computer to switch the machine frequently. So, is there any way we can do it without shutting down and preventing others from using our own computer? Of course, there are ways to quickly lock the keyboard and display by double-clicking the desktop shortcut without using the CTRL+ALT+DEL key combination or screen saver. Step

when lock your computer, you can refer to the following to perform: first, right-click the WindowsXP desktop and select New /Shortcut from the context menu, then follow the onscreen prompts, in Enter rundll32.exeuser32.dll, the LockWorkStation command character in the text box of the command line, and then enter the specific name of the corresponding shortcut in the subsequent wizard window. Here, for the convenience of calling later, you can directly name the shortcut. Lock your computer. In the future, you can achieve the purpose of locking by simply double-clicking "Lock Computer" on the desktop. Or you can directly press the “windows key + L & rdquo; shortcut to lock the computer.

5, using the & ldquo; Connection Firewall & rdquo;
function in the Internet age, the mode of transmission of the virus, transmission speed and destructive power has undergone a tremendous change, and hacking is also world-wide activities. In order to prevent random invasion of viruses and hackers, many users have installed firewalls on their own computers. Windows XP has added the "Internet Connection Firewall" function. With this function, Windows XP can dynamically filter all information coming in and out of the system, allowing the system to agree to access people and data into their internal network, and will not allow Users and data are rejected, maximally preventing hackers on the network from accessing their networks, preventing them from changing, moving, or even deleting important information on the network. When using the “Connect to Firewall” function, you can click the “Settings” button in the Start menu, select the “Network Connections” menu item, and then select the dial-up connection you need to access from the pop-up window, then use Right-click the connection icon and select the “Properties” command. In the Dialing Properties window that pops up, click the Advanced tab and select the “Internet Connection Firewall” option in the corresponding tab page. Click the “Settings” button of the corresponding firewall to set the firewall according to your requirements, so that the firewall can work more efficiently.

6, install third-party antivirus program, firewall programs, and Internet security procedures
it turns out, & ldquo; Internet Connection Firewall & rdquo; great functionality limitations, first of all it does not have anti-virus, anti-virus The function, secondly, the protection of the firewall technology is very limited, the effect is minimal. It is necessary for the user to add a third-party firewall program based on the "Internet Connection Firewall". The choice of firewall software, first of all depends on the actual protection effect, can effectively and timely promptly ask questions when the program accesses the outside world, and can effectively shield and filter data when subjected to various types of attacks from the outside world. Package, Rising Firewall has added the technology of “Tracking Location” to monitor the attack and actively track its location in real time. Anti-virus programs must be installed. The efficiency of anti-virus is a problem worth considering. In addition, real-time anti-virus effects should be paid more attention. In terms of protection, Rising anti-virus software monitoring is quite comprehensive, and the monitoring of the registry is most effective in preventing malicious programs, Trojans, etc. from being implanted into the computer without the user's knowledge.

7, assign administrative rights to install many programs in their own
in WindowsXP Caozuoxitong is, require users to have some administrative privileges to allow users to use the program, so in order to be able to use a good program, we sometimes need Temporarily assign an administrative right to access the program for yourself. When assigning administrative rights, we can log in to the Windows XP system as a normal user, then right-click the program installation file, and hold down the Shift key on the keyboard, click the running mode from the shortcut menu that appears, and finally Enter the username and password with the appropriate administrative privileges in the pop-up window.

Copyright © Windows knowledge All Rights Reserved