Home IT Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ ADSL router to defend their own network security methods     - Oracle View index and use indexes Precautions (Database)

- Achieve single backup of MySQL by innobackupex (Database)

- Minimum period string problem (Programming)

- Java concurrent programming using the synchronized keyword ReentrantLock alternative primitive (Programming)

- PHP interview questions of design patterns (Programming)

- Linux remote wake the computer original code [C] (Linux)

- SUSE Linux network configuration and firewall configuration (Linux)

- Nginx logging client ip (Server)

- NAT (network address translation) Realization (Linux)

- Java thread lifecycle (Programming)

- Linux operating process information (Linux)

- Oracle LONG RAW BLOB CLOB type of presentation (Database)

- Embedded Linux to solve the problem in the time zone (Linux)

- Docker: installation under Ubuntu (Server)

- Applications in Objective-C runtime mechanism (Programming)

- using Docker Kitematic on windows (Linux)

- Use Ansible to bulk manage remote servers (Server)

- RHEL7 system making use of OpenStack mirror (Linux)

- Linux Shell Scripting (Programming)

- Ubuntu 12.04 / 14.04 users to install software LyX document processing (Linux)

 
         
  ADSL router to defend their own network security methods
     
  Add Date : 2016-12-09      
         
       
         
  At present, more and more users use ADSL, ADSL users online due to the long time, fast, become the target of hackers. Now appeared on the Internet a variety of increasingly detailed "IP address of the database", to know the IP number of ADSL users is very easy to do. To how to defend their own network security? Take a look at the following methods.

First, the cancellation is hidden share

If you use Windows 2000 / XP system, right-click the C drive or other disk, select

"Sharing," you will be surprised to find that it has been set to "Share this folder" and in "Network Neighborhood" but can not see them, which is how it happened?

The original, in default, Windows 2000 / XP will open all the hidden partition share, select from the "Control Panel / Administrative Tools / Computer Management" window "System Tools / Shared Folders / Sharing", you can see on the hard disk the back of each partition names are added to a "$." But as long as type "computer name or IPC $", the system will ask the user name and password, unfortunately, most of the individual user system, Administrator's password is empty, an intruder can easily see the contents of C drive, which gives Network security has brought great risks.

How to remove the default share it? The method is very simple, open the registry editor, into the "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetSevicesLanmanworkstationparameters", a new "AutoShareWKs" DWORD value named, and its value is set to "0", then restart the computer, so that share canceled.

Second, refuse to malicious code

One of the biggest threats to a malicious Web page has become broadband. Previously used Modem, open a Web page is slow because, before fully opening and closing as well as avoid the possibility of a malicious web page in the move. Now broadband speeds so fast, so it is easy to be malicious web attacks.

Malicious Web page because of the general joined with the preparation of the malicious code only destructive. The malicious code is the equivalent of small programs, simply open the web page will be run. So to avoid malicious Web page attacks as long as the prohibition run malicious code on it.

Run IE browser, click "Tools / Internet Options / Security / Custom Level" security level will be defined as "security level - high" on the "ActiveX controls and plug-ins" in paragraph 2 and 3 is set to "Disabled" other items set to "prompt", then click "OK." This setting, when you use IE to browse the web, you can effectively prevent malicious Web pages malicious code attacks.

Third, sealed hackers "back door"

As the saying goes, "no smoke without fire", since the hacker can enter, it means the system must exist for them to open a "back door", as long as the blocked the back door, so hackers have nowhere to start, then no worries!

1. delete unnecessary protocols

For the server and host, the general only install TCP / IP protocol is enough. Right click "Network Neighborhood" and select "Properties", then right click "local connection", select "Properties", uninstall unnecessary protocol. NETBIOS which is the root of many security flaws, for providing file and print sharing does not require the host, can also bind the NETBIOS TCP / IP protocol is turned off, to avoid attacks against the NETBIOS. Select "TCP / IP Protocol / Properties / Advanced" and enter "Advanced TCP / IP Settings" dialog box, select the "WINS" tab, check "Disable TCP / NETBIOS IP on" a close NETBIOS.

2. Off "File and Print Sharing"

File and Print Sharing should be a very useful feature, but do not need it, when is a good hacking vulnerabilities. So in no need to "File and Print Sharing" situation, we can turn it off. Right-click with the mouse "network neighbors", select "Properties", then click "File and Print Sharing" button, will pop up the "File and Print Sharing" dialog box in two hook can be removed.

Although the "File and Print Sharing" turned off, but it does not ensure safety, but also to modify the registry to prohibit it from changing the "File and Print Sharing." Open the Registry Editor, select the "HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesNetWork" primary key, create a DWORD key value in the primary key, key named "NoFileSharingControl", key set to "1" indicates that prohibit this function to achieve the ban to change "document and print sharing "purposes; key to" 0 "to allow this feature. In this way, "Network Neighborhood" and "Properties" dialog box "File and Print Sharing" ceased to exist.

3. The Guest account disabled

There are many invasions were further obtained an administrator password or permission by this account. If you do not want to put your computer to others as toys, that is a good ban. Open the Control Panel, double-click "Users and Passwords", click "Advanced" tab, then click the "Advanced" button, pop-up Local Users and Groups window. Guest account in the top right-click, select Properties, select the "Account is disabled" in the "General" page. In addition, the Administrator account was renamed to prevent hackers know the administrator account, which will ensure computer security to a large extent.

4. prohibit the establishment of air link

In case of default, any user can connect to the server through the air connection, enumerate account and guess your password. Therefore, we must prohibit the establishment of air link. There are two ways:

One method to modify the registry: Open the Registry "HKEY_LOCAL_MACHINESystemCurrentControlSetControlLSA", the DWORD value "RestrictAnonymous" The key to "1".

Finally, we recommend to their systems patched Microsoft patch those endless or very useful!
     
         
       
         
  More:      
 
- Packages with Snort intrusion monitoring light (Linux)
- How to understand Python yield keyword (Programming)
- PHP CURL get cookies simulated login (Database)
- grep command usage (Linux)
- Ubuntu Telnet service settings (Linux)
- Linux CentOS configuration SVN + SVN hook (Server)
- Linux common commands: nslookup, ls md5sum, uname, history, etc. (Linux)
- Autojump: an advanced cd command in the Linux file system fast navigation (Linux)
- C ++ implementation of the list of basic operations and test cases (Programming)
- Based AutoYaST automated installation of SUSE practice (Linux)
- How to clean up your Ubuntu 14.10 / 14.04 / 13.10 system (Linux)
- To compiler and install MariaDB-10.0.20 under CentOS 6.6 (Database)
- What factors affect the performance of Java calls (Programming)
- Singleton (Linux)
- Linux server alarms using Java (Server)
- No password on Oracle and MySQL login (Database)
- Limit the use of the request being Nginx Flood attack (Linux)
- CentOS 6.6 running level (Linux)
- Ease of use "Explain Shell" script to understand Shell command (Linux)
- Debian installation (Linux)
     
           
     
  CopyRight 2002-2016 newfreesoft.com, All Rights Reserved.