Top Ten Recommendations to Enhance Operating System Security

  

Regardless of the operating system you are using now, there are always some general recommendations for enhancing system security. If you want to harden your system to prevent unauthorized access and unfortunate disasters, the following precautions will definitely help you. .

1. Using a password with a high safety factor According to expert observations, such theories and phenomena are worthy of consideration by the webmasters, so I hope that everyone can do more research and study, and strive to sum up more and better experiences. !

One of the easiest and most effective ways to improve security is to use a password that is not easily guessed by brute force attacks. .

What is a violent attack? An attacker uses an automated system to guess passwords as quickly as possible, in the hope that the correct password will be discovered soon. Use special characters and spaces, use uppercase and lowercase letters, avoid using words that can be found in the dictionary, and don't use pure numeric passwords. This password is more difficult to crack than using your mother's name or your birthday as a password. . Photographs, illustrations, and designs provided on this site. If you need to use it, please contact the original author.

In addition, you have to remember that each time you increase the length of your password by one, you will increase the combination of your password characters in multiples. In half, passwords smaller than 8 characters are considered to be easily cracked. You can use 10 or 12 characters as the password, and 16 is of course better. It's safer to keep your password as long as possible without being too long to type. For a true winner, no matter how his living conditions are, he will not be self-destructive.

2. Do a good job of border protection...

Not all security issues occur. On the system desktop. It's a good idea to use an external firewall/router to help protect your computer, even if you only have one computer. ..

If you think about it from a low-end perspective, you can purchase a broadband router device, such as Linksys, D-Link, and Netgear routers that you can buy online. If you're thinking about high-end, you can use security devices such as managed switches, routers, and firewalls from enterprise vendors such as Cisco and Foundry. Of course, you can also use your pre-packaged firewall/router installer to build your own protection devices, such as m0n0wall and IPCoP. Proxy servers, anti-virus gateways, and spam filtering gateways all contribute to very strong perimeter security. .

Keep in mind that, in general, in terms of security, managed switches are stronger than hubs, and routers with address translation are better than switches, and hardware firewalls are the first choice. Copyright statement: This article is from the network, if there is infringement, please contact 028-86262244-215, we will delete it immediately after receiving it, thank you!

3, upgrade your software.

In many cases, it is crucial to perform patch testing on the system before installing and deploying production applications. The final security patch must be installed. Go to your system. If you do not perform a security upgrade for a long time, it may cause your computer to be easily targeted by unscrupulous hackers. Therefore, do not install the software on a computer that has not been updated for a long time. According to expert observations, such theories and phenomena are worthy of consideration by the webmasters, so I hope that everyone can do more research and study, and strive to sum up more and better experience!

The same situation applies to any basis. The malware protection tool for signatures, such as anti-virus applications, can be compromised if it is not updated in time to obtain the current definition of malware features. !

4, closing the unused service for the real winner, regardless of his living conditions, will not self-destruct

In most cases, many computer users do not even know It is a very dangerous situation to run services that are accessible over the network on their systems. .

Telnet and FTP are two common problem services. If your computer does not need to run them, please turn them off immediately. Make sure you understand exactly what each service running on your computer does, and know why it is running. A successful life requires you to operate on your own. Don't say it anymore. Don't wait any longer. Now plan for your life, light up a bright light for life, and win at the starting point of life.

In some cases, this may require you to understand which services are important to you so that you don't make mistakes such as shutting down the RPC service on a Microsoft Windows computer. However, it is always a good idea to turn off services that you don't actually use. .

5, use data encryption.

For those security-conscious computer users or system administrators, there are different levels of data encryption can be used, select the correct level of encryption according to need It is usually determined on a case-by-case basis. ..

Data encryption can range from encrypting files to files one by one, to file system encryption, and finally to the entire disk. In general, these encryption levels do not include encryption of the boot partition, because that requires decryption help from specialized hardware, but if your secret is important enough to spend this part of the money, you can also achieve this to the entire system. Encryption. In addition to boot partition encryption, there are a number of solutions to meet every level of encryption, including both commercial proprietary systems and open source encryption for every major desktop operating system. system.

6. Protect your data with backups..

Backing up your data is one of the most important ways you can protect yourself from damage in the face of disasters. . A data redundancy strategy can include both simple and basic periodic copying of data onto a CD, as well as complex periodic automatic backups to a single server. !

For systems that must maintain continuous online service without downtime, RAID provides automatic error redundancy to prevent one of the disks from failing. !

Free backup tools such as rsync and Bacula can integrate automated backup solutions of any complexity level. Version control tools such as Subversion provide flexible data management, so you can not only do backup work on another computer, but you can also synchronize the same data with multiple computers without the hassle. Using subversion in this way, I was spared when the hard drive of my working notebook was damaged in 2004, which also illustrates the importance of regular backup of critical data. .

7. Encryption-sensitive communication...

A cryptosystem for protecting communications from eavesdropping is very common. The OpenPGP-enabled software for e-mail, the Off The Record plug-in for instant messaging clients, and the encrypted channel software for maintaining communications using secure protocols such as SSH and SSL, as well as many other tools, can be easily used to ensure Data is not compromised during transmission. !

Of course, in personal-to-person communication, it is sometimes difficult to convince the other party to use encryption software to protect communications, but sometimes this protection is very important. ..

8. Don't trust external networks.

In an open wireless network, such as in a local coffee shop with a wireless network, this concept is very important. If you are very cautious and alert enough to security, there is no reason to say that you can't use this wireless network in a coffee shop or some other untrusted external network. However, the key is that you must ensure security through your own system, and don't believe that external networks are as secure as your own private networks. Copyright statement: This article is from the network, if there is infringement, please contact 028-86262244-215, we will delete it immediately after receiving it, thank you!

For example, in an open wireless network, it is necessary to use encryption to protect your sensitive communications, including when you connect to a website, you might use a login session cookie. To automatically authenticate, or enter a username and password for authentication. Also, be sure not to run network services that are not required, because if there are unpatched vulnerabilities, they can be exploited to threaten your system. This principle applies to network file system software such as NFS or Microsoft's CIFS, SSH servers, Active Directory services, and many other possible services. .

Check your system from both internal and external sources to determine what opportunities can be exploited by malicious security breachers to threaten your computer's security and ensure that these entry points are closed as much as possible. In some ways, this is just an extension of the two security recommendations for turning off unwanted services and encrypting sensitive communications, and you need to be more cautious when using external networks. Many times, protecting yourself in an external, untrusted network will actually require you to reset the security configuration of your system.

9. Using Uninterruptible Power Supply Support

If you just don't lose files during a power outage, you may not want to choose to purchase a UPS. In fact, it is recommended that you use UPS, there are more important reasons, such as power conditioning and avoid file system damage. For this reason, make sure your operating system can remind you when it will be turned off so that you don't be at home when the power is exhausted, and be sure to ensure a UPS that provides power conditioning and battery backup. ...

A simple surge protector is not enough to protect your system from the smashing of dirty electricity. Remember, UPS plays a key role in protecting your hardware and your data. ..

10. Is the security of the surveillance system threatened and intruded!

Never think that because you have taken a series of security measures, your system will not be affected. The invasion of security vandals. You should set up some types of monitoring programs to ensure that suspicious events can quickly get your attention and allow you to track whether it is a security breach or a security threat. We not only monitor the local network, but also perform integrity checks and use some other local system security monitoring technologies. Copyright statement: The articles in this site are all from the network. All the reprinted articles on this site do not represent the opinions of this site.

There are many other security precautions depending on the operating system you use. Some operating systems have larger security issues due to design reasons. And some operating systems allow experienced system administrators to greatly improve system security. However, whether you are using Microsoft's Windows and Apple's Mac OSX, or use open source operating systems like Linux, FreeBSD, etc., when you are strengthening their security, the above suggestions must be kept in mind.

Copyright © Windows knowledge All Rights Reserved