Strengthen NT kernel protection to create a secure XP system

  
System security is valued by every user. For xp systems, it has strong network functions and stability, but for the xp NT kernel has to let us strengthen security protection.
1. General security protection
The so-called "regular security protection" is the same as Windows98 to install anti-virus software, upgrade system, prohibit Ping three security methods. It should be emphasized that Windows XP and its predecessor, Windows 2000, have numerous loopholes. The upgrade of the system cannot be as sloppy as Windows98. In addition to installing Microsoft's vulnerability patch for "Blast Wave", it is recommended to upgrade WindowsXP to the latest ServicePack1 ( After the upgrade, the resource possession will be increased, but the security and stability will be improved).
2. Prohibit Terminal Services Remote Control
<Terminal Services" is a service form left over by Windows XP on Windows 2000 system (Windows 2000 uses this service to implement remote server hosting). Users can use the terminal to achieve remote control. “Terminal Services” and “Remote Assistance” are different. Although they all implement remote control, Terminal Services pays more attention to the user's login management rights. Each connection requires a specific login of the current system. ID, and isolated from each other, "Terminal Services" is independent of the invitation of the current computer user, and can log in to the remote computer independently and freely.
Under Windows XP, "Terminal Services" is opened by default (Windows 2000 system needs to install the corresponding components before you can open and use Terminal Services). That is, if someone knows a user on your computer Log in to the ID and know the IP of your computer, it gives you complete control over your computer.
In Windows XP, the method of closing "Terminal Services" is as follows: Right click to select "My Computer", "Attributes", select "Remote", remove "<; Allow users to connect remotely to This computer” in front of “√”
3. Turn off the Messenger service
The Messenger service is a communication component that Microsoft integrates into Windows XP system. It is also opened by default. When using it to send information, as long as you know the IP of the other party, and then enter the text, the corresponding text message window will pop up on the other party's desktop, and will be accepted if the Messenger service is not closed.
Many users don't know how to turn it off, but they are harassed by information. In fact, the method is very simple, go to the "Control Panel", select "Administrative Tools", start the "Services" item, then right click on the Messenger item, select "Stop" & rdquo;
4. Disable remote assistance, block idle ports
On Windows XP, there is a function called “Remote Assistance”, which allows users to send remote assistance to friends on MSN when they have difficulty using the computer. Invite to help solve the problem yourself.
And this "Remote Assistance" function is exactly the "shock wave" of the RPC (RemoteProcedureCall) service that the virus is attacking on Windows XP. Users are advised not to use this feature, and should also install the RPC vulnerability tool provided by Microsoft and the "shock wave" immunization program before use. The method of disabling "Remote Assistance" is to open the System Properties dialog box (right click "My Computer", "Attributes"), remove it from the "Remote" item and allow it to be sent from this computer. Remote Assistance Invitation & rdquo; in front of “√”.
The port can be restricted using the system's own "TCP/IP filtering service". Here's how: Right click on the "Network Connections" button and select "Properties" to open the "Network Connection Properties" dialog box. In the "General" category, select the Internet Protocol (TCP). /IP)” Then click the [Properties] button below, in the "Internet Protocol (TCP/IP) Properties" window, click the [Advanced] button below, in the pop-up "Advanced TCP/IP Settings" In the window, select the "Options" option, click the [Properties] button below, and finally pop up the "TCP/IP Filter" window. Add the "Allow only" radio box in the window. “TCP”, UDP”, IP” and other ports allowed by the network protocol, without providing various services, can block all ports. This is the best form of security.
5. Reasonable management of the Administrator
Windows2000/XP system, after the system is installed, an Administrator user will be created by default, which has the highest management authority of the computer. Some users did not set a password for the Administrator user at the time of installation. Hackers use this to log in to the other computer using an advanced user. Therefore, individual users should properly keep the “Administrator” user information. When Windows 2000 logs in, it is required to enter the login password of the Administrator user. After Windows XP starts normally, the Administrator user cannot be seen. It is recommended that users using Windows XP enter the security mode. Add the password for the Administrator user in the “User Account” section of the “Control Panel” or delete it to avoid potential hazards.
6. Prevent IPC default sharing
WindowsXP allows any user to get all the accounts and shared lists of the system through the empty user connection (IPC$) after the default installation. This is to facilitate LAN users to share resources and files, but Any remote user can use this empty connection to get a list of your users. Hackers use this feature to find a list of users on the system and use some dictionary tools to attack the system. This is the more popular IPC attack on the Internet.
To prevent IPC attacks, you should start from the default configuration of the system. You can make up the loophole by modifying the registry:
Step 1: Set the RestrictAnonymous item of HKEY_LOCAL_MacHINESYSTEMCurrentControlSetControlLSA to “1” to disable the empty user connection.
Step 2: Open the HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesLanmanServerParameters item in the registry.
For the server, add the key value “AutoShareServer”, type is “REG_Dword”, the value is “0”.
At the client, add the key value “AutoShareWks”, type is “REG_DWORD”, the value is “0”.
The six aspects of the prevention point introduced by Xiaobian, through these six aspects of prevention, can enhance the security of the NT kernel, thus ensuring the security of the XP system.
Copyright © Windows knowledge All Rights Reserved