A full experience of the security features of WinXP SP2

  
On August 7, the long-awaited official version of Windows XP SP2 RTM was finally born! Unexpectedly, this SP2 even supports pirated Windows XP, so that everyone can fully experience the powerful features of SP2. I downloaded it in the first time and installed it for trial! I heard that SP2 has greatly enhanced the security features. What is it? Let us take a look!

WinXP SP2 English version official download>〉〉

What is “RTM”? RTM (Release.to.Manufacturing) Manufacturing means manufacturing. Is it necessary to take a period of time to compress, package and distribute before the retail store is put on the shelves? So the program code must be completed some time before the official release. The completed program code is called Final.Code. This time Windows XP development is completed, and the foreign media is called Windows XP.goes.gold. After the development of the program code, the master chip is sent to the factory for a large number of compressions. This version is called the RTM version. Therefore, the RTM version of the program code must be the same as the official version. However, it is different from the official version: for example, the OEM in the official version cannot be upgraded, and the upgraded version will check the old operating system CD if it is newly installed. These are the different places of RTM and the official version, but their main program code. all the same.


First, a powerful security center

The long installation process is finally over! After restarting, I saw the "Safety Center" at first sight.

"Security Center" is a new service introduced by Windows XP SP2. It acts as a “central zone” that allows users to change security settings, learn more about security issues, and ensure that the system performs the latest basic security updates recommended by Microsoft.

It also detects the working status of firewalls, automatic updates, and virus protection software. If the problem involves one of these three security elements (for example, if the antivirus program has expired and the firewall is not turned on), then it is safe. The center will send you an alert and provide suggested practices to help you better protect your computer. Especially for the "virus protection" item, if the security center does not detect a virus scanner in your machine, it will remind you to install the virus scanner every time you turn it on! In fact, today's popular domestic anti-virus software can not be identified! Foreign products, such as the Norton series, are only recognized in 2004. We only have to wait for the version of the anti-virus software to be updated.

So how do we close it? Every time you turn on the phone, it’s too annoying! Just click "Recommended" under "Virus Protection", check "I have installed anti-virus program and monitor the status of myself", and it will take effect after reboot!


Second, defensive Windows Firewall

SP2's Windows Firewall is an updated version of the original Internet Connection Firewall. By default, the firewall is enabled on all NIC interfaces to provide more protection for network connections.

Go to the Control Panel and open the Windows Firewall console:

We can see that it provides three options: enable (recommended), allow exceptions, and close (no) Recommended), select "Enable" by default. If you choose "Do not allow exceptions", Windows Firewall will block all network requests that connect to your computer, including the applications and system services listed in the Exceptions tab. In addition, the firewall will also intercept file and printer sharing, as well as network device detection. Using a Windows Firewall that does not allow exceptions is more appropriate for connecting to a personal computer on a public network, such as a computer that is commonly used at hotels and airports. Even if you use a Windows Firewall that doesn't allow exceptions, you can still browse the web, send an email, or use instant messaging software. Of course, I don't want you to choose "close"! What is the specific effect? Let's take MSN messenger 6.2 as an example:

Windows Firewall is really not recognized by the six parents, and their software is not missed! We can rest assured.



In fact, we can also edit the interception rules just like other network firewalls. Click on "Exceptions", the interface is as follows:


Have you seen it? Any application connected to the network leaves a "trace" here. Here we can manually edit the programs that allow the connected network: including adding programs, adding ports, editing, deleting. If you want other clients on the network (outside the firewall) to be able to access a particular program or service on your local machine without knowing which port and which type of port the service or service will use, in this case you This program or service can be added to the exceptions of the Windows Firewall to ensure that it can be accessed externally; if you know the port used by the program, you can also open the required port for the program; of course, if you do not need or prohibit a program from accessing the network You can delete this rule.






In the Advanced tab, we can set different settings for each connection. The rules to suit different requirements.


can also be logged to the log for reasons when problems occur:

ICMP rules are allowed on the network through the Internet Control Message Protocol (ICMP) The computer shares and passes error and status information.



Third, blocking pop-ups

When we surf the Internet, the most annoying pop-ups Before SP2 was released, we used third-party maskers or IE plugins to prevent pop-ups. Now, SP2 adds this feature to IE.

Open IE, click "Tools→Internet Properties→Privacy":

Select the check box in front of the "Block Popup" option in the "Popup Management" at the bottom. . Later, when we access the portals with more pop-ups, the system will pop up a dialog box, and the user only needs to select "Yes" to prevent unauthorized pop-ups from being displayed. The next time you visit the page, IE will automatically block the pop-up window of the page and display an icon in the status bar, and the sound notification will be automatically played.

If you want to browse the pop-ups of certain websites, you can open IE, click "Tools → Internet Properties → Privacy", click the "Settings" button, in the window that opens " Enter the specific website address under "Address to add" and click the "Add" button.


4. Unified Management Add-ons

Internet Explorer add-ons are loaded for convenience and efficient browsing. Go to the components on the browser. Common add-ons include additional toolbars, dynamic mouse pointers, stock market information, and ad blockers (such as the 3721 IE tool). They need your permission before downloading to your computer. But some will download and load if you don't know. Usually they are usually safe to use, but sometimes it can cause an unexpected shutdown of Internet Explorer. Therefore, we need to manage them effectively: Open IE, click "Tools → Internet Properties → Programs → Manage Add-ons":

Here, we can see which add-ons are in the machine. ? Which are commonly used and which are useless? You can select frequently used add-ons (such as Shockwave Flash
Object), then click "Update ActiveX" in the lower right corner. If there is a newer version available, you can use the Add-In Manager dialog to update the ActiveX control to load. item. For those who are unsolicited and often make mistakes, you can disable it here!



V. Highly Integrated Microsoft Update Service

Prior to SP2, the Microsoft Update service only upgraded Windows components online. Security patches and updated drivers. Now, the Microsoft Update service not only does the above tasks, but it also supports SQL, Exchange, and Office!

Click "Start" → "Microsoft Update" to log in to the Microsoft Update online upgrade site:

Microsoft Update site In order to improve the user experience, the Windows Update home page now has two Mode:

"Quick Install" provides users with pre-selected emergency updates from Microsoft. Users can also modify the update list according to their needs.

"Custom Installation" allows users to advance The selected emergency update project has full control rights, and the user can hide, delete or select the corresponding update program as needed.

As you can see, it detects that my computer has "Automatic Update" turned on! Click "Select the time to install the update program" below, you can set the time for automatic update:

When we click on the "office series" above, we enter the online upgrade site of Office!

Here

Copyright © Windows knowledge All Rights Reserved