Easily transfer files with genuine Windows 7 (2)

  
        

Third, the security design

In the Windows software transfer process, also considered the need for security. After the old and new computers are properly connected (if a connection request is made from the new computer to the old computer), the new computer will send a transfer password like the old one. Then on the new computer, the user will be prompted to "enter the Windows Easy Transfer Key displayed on the old computer." The user can start transferring files only after the key is entered correctly. This security measure guarantees the security of the file transmission process to a certain extent. However, this safety design is rather rough. It is only against the villain, not the gentleman. Why do you say that? In fact, its easy transfer function is implemented according to the Telnet protocol. However, this protocol has a large security flaw, that is, its content transmitted in the network is transmitted in plain text. Not only files, but passwords are also transmitted in clear text. For this reason, people with ulterior motives can easily steal the information they want without losing a sniffer on the network. Therefore, this security measure is not strict enough. But for most companies, this security measure is enough. After all, through the sniffer to illegally obtain information, not many happen in the enterprise.

Although this security design has certain flaws, it can be combined with other security measures to improve the security and stability of the transmission process. Such software transfer can be combined with IPSec security policies. If you only need to enable the IPSec security policy on both sides of the transmission, the system will automatically encrypt the data that needs to be transmitted. That is to say, this encryption is not implemented on the "software transfer" side, but on the underlying IP layer. Since the software transfer function can be seamlessly used in conjunction with the IPSec security policy, it is a good ending solution to use this security to encrypt related data and make up for the lack of security in software delivery. Instead of using encryption and decryption on the software transfer, you can also use existing solutions to improve security. This consideration of the Microsoft operating system is still worthy of recognition.

However, it should be noted that if a personal firewall is set in the computer, especially a third-party independent firewall, such as Rising's personal firewall, it may hinder the use of this software. To do this, you can temporarily turn off the firewall when using this software. Wait until the transfer is complete before turning the firewall back on.

Fourth, convenient management

After the file transfer is successful, the user can see a detailed list of the content that has been transferred. And there are related connections on this list. The user can directly open the corresponding file by clicking this connection. This is like using Thunder software to download files. In other words, you can use this software delivery tool to centrally manage the transferred files. Undoubtedly this software delivery tool has also become a file management tool invisibly. Files that have been transferred through it can be managed through this list. Including open, delete, and so on. What's rare is that it can also choose and default the default save path based on the content of the file transfer. If you are transferring Internet favorites, the system will automatically locate the input target and source target in the default directory of the Microsoft operating system storage favorites. If the system administrator does not need to change the target directory without changing the source directory, just press OK and you want to be able to transfer the files to the favorites without additional operations. Of course, the system administrator can also change the relevant directory. If you need to store your favorites on a non-system disk to prevent the system from crashing and the favorites are lost, you can also change this default path. It can be seen that Microsoft has spent a lot of thought on the design of this humanization. It does facilitate the operation of system administrators and users to a large extent. It is even more foolish to use. Even if there are not many computer-based users, you can easily master this software and complete the task of file transfer.

Copyright © Windows knowledge All Rights Reserved