Windows XP Several login methods resolve

  

Usually when we use Windows XP, we must always log in first. The login authentication mechanism of Windows XP is much stricter than that of Windows 98. It is very important for us to understand and master the login authentication mechanism and principle of Windows XP. It can enhance the understanding of system security and effectively prevent and solve the invasion of hackers and viruses.

First, understand Windows XP

Several login types

1. Interactive Login

Interactive login is the most common type of login we usually log in. Users log in locally with the corresponding User Account and password. Some netizens think that “interactive login” is “local login”, which is actually wrong. “Interactive login” also includes “domain account login”, and "local login” is limited to "local account login”.

It is necessary to mention that the terminal service and remote desktop login host can be regarded as "interactive login", the principle of verification is the same.

During interactive login, the system will first check the type of user account that is logged in, whether it is a local user account or a domain user account, and then use the corresponding authentication mechanism. Because of different user account types, the processing methods are different.

本地 Local User Account

Log in with a local user account and the system will authenticate with the information stored in the local SAM database. So why Windows 2000 forgets the Administrator password can be solved by deleting the SAM file. However, it is not possible for Windows XP, it may be for security reasons. After logging in with a local user account, you can only access local resources with access rights. (Figure 1)

Figure 1

Domain User Account

Log in with a domain user account, and the system authenticates with data stored in the Active Directory of the domain controller. . If the user account is valid, after logging in, you can access resources with access rights in the entire domain.

Tip: If the computer joins the domain, the login dialog will display the "Log in to: & rdquo; project, from which you can choose to log in to the domain or log in to the machine.

2. Network Login

If a computer is joined to a workgroup or domain, you will need to "network login" when you want to access resources from other computers. As shown in Figure 2, when you want to log in to the host named Heelen, enter the user name and password of the host and verify it. The reminder here is that the user account entered must be on the other host, not the user account on the host. Because the network login is performed, the validity of the user account is controlled by the interviewed host.

Figure 2

3. Service Login

Service Login is a special login method. Usually, when the system starts the service and the program, it is run after logging in with certain user accounts. These user accounts can be domain user accounts, local user accounts or SYSTEM accounts. Log in with different user accounts, and the access and control rights to the system are different. Moreover, when you log in with a local user account, you can only access local resources with access rights, and cannot access resources on other computers. This is &ldquo ; interactive login & rdquo; similar.

As you can see from the task manager in Figure 3, the account used by the system process is different. When the system starts, some base and Win32 services will be pre-logged into the system to achieve access and control of the system. These services can be set by running Services.msc. Because system services have a pivotal position, they are generally logged in with the SYSTEM account, so they have absolute control over the system, so many viruses and Trojans are also vying to join the aristocratic system. In addition to SYSTEM, some services are also logged in with the Local Service and Network Service accounts. After the system is initialized, all the programs that the user runs are logged in with the user's own account.

Figure 3

The principle mentioned above is not difficult to see, why many computer articles tell the average user, when using the computer, you should log in as the users of the Users group, because even if the virus is running, The Trojan program, because of the corresponding permission of the logged-in user account, can only destroy the resources belonging to the user at most, and the important information for maintaining the security and stability of the system is not destructive.

4. Batch Login

Batch logins are rarely used by general users and are typically used by programs that perform batch operations. When performing batch login, the account used must have the right to batch work, otherwise you cannot log in.

Normally, we are most exposed to “interactive login”, so the author will explain in detail the principle of “interactive login”.

Copyright © Windows knowledge All Rights Reserved