Teach you all aspects to eliminate the security risks of Win2003

  
Blocking the automatic save hazard Windows 2003 operating system error when calling the application, Dr. Watson in the system will automatically save some important debugging information, so that you can view the system when you maintain the system, but this information is likely to be hacked & ldquo; Aiming at ”, once you aim, all kinds of important debugging information will be exposed. In order to block the hidden dangers of Dr. Watson's automatic saving of debugging information, we can achieve the following steps: 1. Open the start menu and select &ldquo ; Run ” command, in the subsequent open dialog box, enter the registry edit command "ergedit", open a registry editing window; 2, in the window, use the mouse to expand HKEY_local_machine\\software\\Microsoft\\ WindowsdowsNT \\CurrentVersion\\AeDebug branch, in the right sub-window corresponding to the AeDebug key value, double-click the Auto value with the mouse, in the pop-up parameter setting window, reset its value to "“0”, 3, open the system's Windows resources. Manager window, and then expand Documents an in it d Settings folder, All Users folder, Shared Documents folder, DrWatson folder, and finally delete the User.dmp file and Drwtsn32.log file corresponding to DrWatson. After completing the above settings, restart the system, you can block the automatic save hidden danger. Blocking resource sharing hidden dangers In order to facilitate the transfer of information between LAN users, Windows Server 2003 system is very "sincere" to provide you with file and print sharing capabilities, but we are enjoying this feature Convenience, the sharing function will also “lead the wolf into the room”, “great degree” opened a lot of loopholes to the hackers, causing great insecurity to the server system; therefore, after running out of files or printing When sharing functions, you must always turn off the function at any time to block the hidden danger of resource sharing. Here are the specific steps to turn off the sharing function: 1. Execute the “Network Connection” command under the Control Panel menu item. In the window, right-click on the "Local Connection" icon; 2. In the shortcut menu that opens, click the "Properties" command to open a "Internet Protocol (TCP/IP) ” Attribute Settings dialog; 3. In this interface, cancel “ Microsoft network file and printer sharing &r Dquo; This option; 4, as a result, the local computer has no way to provide file and print sharing services, so hackers naturally have less attack system "channel". Blocking remote access hazards Under Windows 2003 system, when remote network access is required, the remote desktop function under the system can transfer the user name and password entered during network connection to the client of the corresponding connection through ordinary plaintext content. Program; in the process of clear text account transmission, the implementation of "plug-in" on the network channel of various sniffing tools, will automatically enter the "sniffing" state, this clear text account is easily "captured" rdquo; Once the plaintext account content has been used by hackers or other attackers, hehe, be careful that your system is "crazy" attack! In order to put an end to this security risk, we can use the following method for the system "ldquo; Reinforcement: 1. Click the “Start” button on the system desktop to open the Start menu. 2. From the Control Panel command, from the pop-up drop-down menu, select the “System” command to open a system property setting. Interface; 3, in the interface, click with the mouse “ remote & rdquo; ; 4, in the subsequent emergence of the tab page, the & ldquo; allows users to connect remotely to this computer & rdquo; option to cancel, so that you can use remote access connectivity blocked, thereby blocking the remote access risks. Blocking users to switch to hidden dangers Windows 2003 system provides us with a fast user switching function, we can easily log in to the system with this function; but when enjoying this kind of ease, the system also has installation hidden dangers, for example, if we execute the system & ldquo "Start" “ in the menu "Logout" command to quickly "when switching users", and then use the traditional way to log in to the system, the system is likely to log in this time, mistakenly regarded as a computer A system of violence "attacks", so Windows2003 system may treat the currently logged in account as a illegal account, lock it up, which is obviously not what we need; however, we can follow the steps below to block user switching When the security risks are generated: In the Windows 2003 system desktop, open the Control Panel command under the Start menu, find the following “Administrative Tools” command, and then execute the “Computer Management” command in the lower menu to find ““ User account & rdquo; icon and in the window that appears Click “change the way the user logs in or logs out  in the settings window that opens, remove the “Use Fast User Switching” option. Blocking page exchange hazards Windows 2003 operating system may leak important confidential information, especially important account information, to hackers or other visitors even in normal working conditions. Maybe we will never want to check out the files that may leak private information, but hackers are very concerned about them! In the page exchange file in the Windows 2003 operating system, there are actually a lot of important private information hidden. This information is generated in the dynamics. If you do not clear them in time, it is likely to become a breakthrough for hackers. To do this, we must follow the following method to let the Windows 2003 operating system automatically shut down the system. The page files generated during the system work are all deleted: 1. In the Windows 2003 “Start” menu, execute the “Run” command to open the Run dialog box and enter the “Regedit” command to open it. Registry window; 2. In the left area of ​​the window, click the HKEY_local_machine\\system\\currentcontrolset \\control\\sessionmanager\\memory management key with the mouse, find the ClearPageFileAtShutdown key in the right area, and double-click it with the mouse. Open the value setting window, the DWORD Re-edit as & ldquo; 1 & rdquo ;; 3, after the completion of setting, exit the Registry Editor window and restart the computer system, you can make the above settings take effect.
Copyright © Windows knowledge All Rights Reserved