this article would like to inform that ordinary computer users to prevent computer become someone else 39 s quot chicken quot and arrested the attacker quot chicken quot as a super simple and effective you just know that if a quot chicken quot will be injured you will refuse to be any control these points the attacker would like to catch you children do not have doors closer to home to prevent a quot chicken quot you only need to note the following point 1 windowsxp piracy huge risk immediate safety of its transformation br if your operating system is installed on other technical staff or there may be pirated xp such as computer builders tomato garden xp rain timber wind xp xp etc tornado such a system many unattended installation installation steps are very simple you put cd into the computer out of tea came back may find the system already installed such systems the biggest flaw here re understand however the system administrator password is empty and automatically log o n in other words anyone can try with an empty password login to your system from the internet such is not the obstacle transformation method immediately amend the administrator user password the password using letters and other special characters length of not less than eight change the login which calls for press ctrl alt del can log on br point 2 at any time from your computer unplug the network cable proposal not break the computer it is recommended to immediately lock do not let strangers to physical access to your computer a random windowspe disc disk repair tool leaves the mountains etc use this cd rom guide administrators can easily change your password modify your registry information including of course to write viruses and then start virus program once an example a shanghai white collar one time online banking program is a way to hack yunnan 100 000 yuan for the average internet banking the public version of a one day withdrawal limits are usually around 1 000 yuan a micro payment once the account is lost that does not mean a huge loss for professional internet banking if the number certificate is stored on the local computer and when you leave your computer a long time the attacker can remotely control your computer your computer transfer of property this is your local online banking business is no different use of mobile digital certificates for online banking users do note that the digital certificate used to pull do not give the attacker a chance solution when you need more time to leave the computer lock computer or unplug the network cable point 3 to ensure that enable firewall br for internet users internet firewall note that in this case firewall not many people think that real time monitoring the virus is isolated together with you and the outside barrier properly enabled and configured firewall will allow you to reduce a lot of direct surface of the attacks there are loopholes in your system is not repaired the firewall may be the only way to protect your computer security solution but do not turn the firewall on all things that worry and the basic firewall is blocking from the outside to the inside from the internet to the machine communications access from inside to outside it is easy to use various means to cheat trojan is this completed the firewall to avoid theft task though the firewall is not always effective but not much stronger than a firewall it must be enabled point 4 truly concerned about security vulnerability information in a timely manner using a variety of patch repair tools improve system security br br vulnerabilities before the official announcement will normally be used by hackers for a long time it is often said that 0day attacks such attacks are increasingly common windows operating system vulnerabilities related to file and other applications but the risk is still the largest windows vulnerabilities the use of software vulnerabilities will be more environmental constrain ts is usually relatively low risk br br recent widespread cause for concern is that flashplayer vulnerability an attacker could exploit this vulnerability to run arbitrary code br br solution can use windowsupdate and must use so windows automatic update see the bottom right corner of the icon windowsupdate is working do to stop the br br some pirated users can not use windowsupdate or microsoftupdate normal and recommend the use of third party tools for bug fixes br br point 5 use anti virus software installed and regularly check if working properly it can update virus signatures br br security issue not to be responsible only to the anti virus software security systems engineering anti virus software is only one part always first the virus will have anti virus software updates in many cases install antivirus software or will be in a variety of viruses but this could not explain the anti virus software unnecessary on the contrary anti virus software is very important if not anti virus software your system may be even worse br br growing number of viruses to invade your system will first try to destroy anti virus software destruction of anti virus software functionality anti virus software to deal with than the virus even easier because the destroyer goal is clear that is the most popular software market for these types of security software tricks are very easy also virus antivirus software maker did not like we must consider compatibility issues caused by each update the attacker only concerned about the trojans need to complete the task other consequences of the virus maker is not have to spend a lot of effort to be considered br br trojan virus anti virus software maker is so hated so that there are a lot of trojan invasion the first thing to destroy anti virus software as long as the spoilers are willing targeted destruction of anti virus software can always be done users do not expect anti virus software itself can be made into an impregna ble fortress even the operating system can be destroyed not to mention anti virus software br br antivirus software we can work to the state as another test tool as long as the observed anti virus software suddenly does not work you should consider is not the first trojan to be destroyed br br solution install an antivirus software for their own and pay attention to regular checks of the validity of its functions such as can not start can not work to upgrade and so on br br point 6 be careful to use mobile storage devices br br developed before the internet the spread of the virus is dependent on soft
No comments:
Post a Comment