2008年3月9日星期日

ADSL defence hacker attack ten big new wonderful law

ADSL defence hacker

Now, it is more and more to use the user of ADSL, since ADSL user online time length and speed are rapid, therefore, become the attack goal of hackers. Current net goes up have appeared various more and more " detailed IP address storehouse ", to know some IPs of ADSL user, it is the matter that is easy very much. Do you want to how to defend own network safety? Not Fang see following method.

One and cancel

If you have used the system of Windows 2000 / XP, right key clicks C a plate of or other plates, choice is shared , you can wonder land discovery it is already been by installation " share this file ", and in" the neighbor on net", can't see these contents , this is why matter? Is original, when the state acquiesced in takes off , Windows 2000 / XP can open all zone hide to share , from" the control / management tool / computer management of face plate" under window, select " systematic tool / shares file / share " , may see that every zone well-known back on hard disk has added a " $ ". However input only" computer name or IPC$", system will inquire user name and password, what is regretful is that the password of most personal user systematic Administrators is empty , invasive person may see the content of C plate easily, this has brought maximum hidden trouble to network safety.

How to come to eliminate to acquiesce in share? Method is very simple , opens registered table editor ware , enters "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetSevicesLanmanworkstationparameters", a new name worths for the two bytes of " AutoShareWKs ", and it is "0" to set up its value , then, start computer again, so, sharing have canceled.

2, refuse

Malice webpage has become the one of biggest threat of wide band. Before, use Modem, because the speed that opens webpage is slow, in close malice webpage before opening completely still have to avoid the possibility recruited. Now, the speed of wide band is so so attacked quickly very easily by malice webpage.

General malice webpage just has because of having joined with the malice code compiled to destroy force. These malice codes are equivalent to some little programs , so long as opening this webpage, will be run. Will so avoid the attack of malice webpage to prohibit the operation of these malice codes only may.

Run IE browser , click " tool / Internet chooses / safe / from define rank ", defining safe rank for " safe level - is high ", in " ActiveX controls and plug-in unit ", 2th, 3 installations are " hint" for the other installation " prohibit to use ", afterwards, click" determines ". So after installing , when you use IE, when glancing over webpage, can avoid the attack of malice code in malice webpage efficiently.

3, assign the

Common saying says ," without wind, do not take wave", as hacker can enter , that explains that system has surely the back door that opens for them , blocks up this dead back door only , lets hacker have no place to start , has no trouble back at home!

1. Delete unnecessary

For server and host computer, the general agreement of installing TCP / IP only is reached. Mouse is right to attack " network neighbor" , selects "attribute", again mouse is right to attack " local connection", select "attribute" , uninstall unnecessary agreement. In which, NETBIOS is the source of many safe defects, for need not offer file and print the host computer shared , return may will tie to decide when NETBIOS of the TCP agreement of / IP closes , avoid to aim at the attack of NETBIOS. Select " TCP / IP agreement / attribute / high-grade " , enter the dialog box " high-grade TCP / IP installs " , select the label of " WINS ", it is a to draw to choose on " prohibit with TCP / IP NETBIOS ", close NETBIOS.

2. Close " file

File and print to share should be a very useful function, but when not needing it, it is also the invasive very good safe leak of hacker. So under having no necessary condition of " file with print to share ", we may close it. It is right with mouse to attack " network neighbor" , selects "attribute" , then clicks the button " file and print to share ", the file that will be sprung and print to share the hook in the two check boxes in dialog box remove can.

Though, " file with print to share " have closed , but can not still ensure that safe, still modification registration is shown , prohibit that its person changes " file with print to share ". Open registered table editor ware , select the major key of " HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesNetWork " , create the key value of DWORD type under this major key, key value name is " NoFileSharingControl", key value sets up to express prohibiting this function for "1", so, reach to prohibit to change the purpose of " file with print to share "; Key value expresses for "0" that allows this function. So in the "attribute" dialog box of " network neighbor ", " file with print to share " have no more existed.

3. Guest Zhang

Having many invasions pass through this one Zhang number gets keeper password or limits of authority further. If do not want to pawn own computer to others toy, that still is good as prohibiting. Open control face plate , click double " user with password " , click " high-grade " to choose card , and then click "high-grade" button , spring local user and group window. In Guest Zhang above click right key, select attribute, when "routine" in page is chosen " account already out of service ". Is other, will Administrator Zhang number renames the keeper that may prevent hacker to know self Zhang number, this will guarantee greatly that computer is safe.

4. Prohibit

Under the condition of acquiescing in , any user may link server through leaving empty connection , list Zhang number guesses password. Therefore we must prohibit to establish empty connection. Method has following is two:

Method one is modification registered table: Open registration to show "HKEY_LOCAL_MACHINESystemCurrentControlSetControlLSA" , worthing the DWORD key that worths " RestrictAnonymous" to alter for "1" can.

Finally, suggest the system that all

4, hide IP

Hacker often looks over our message of host computer using some network survey technologies, major purpose can be the IP address of host computer in network. IP address is a very important concept on network safety, have known your IP address if attacking person, is equal to for his attack preparation good goal, he may start various attacks to this IP , attacks as DoS( refusal service) , Floop spills over attack. The major method of hiding IP address is to use proxy server.

And directly join to Internet to compare , use proxy server IP that can protect net user address, so on guarantee, net is safe. The principle of proxy server is when client computer( the computer with net user) sets up between long-range server( want to visit end WWW server as user) a " transfer station ", when after client computer puts forward service requirement to long-range server, proxy server the request concerning first cuting out user , then, proxy server transfers long-range server service request , so realizes the contact between client computer and long-range server. Very obviously, after using proxy server, other user can only survey the IP address of proxy server instead of the IP address of user, this has realized to hide the purpose of user IP address , has ensured that user is net and safe. There are many websites offered free proxy server, you may also seek by oneself with the tools such as agency hunter.

5, close unnecessary

Hacker when invasion often scanning your computer port of regular meeting, if have installed port monitor program( for example Netwatch), this monitor program can have warning hint. If meet this kind of invasion, may close with tool software to use the port that does not arrive , for example, with "Norton Internet Security", close the 80 that is used to offer webpage service and 443 port, the port that other does not use frequently somewhat may also close.

6, change

Administrator account possesses highest systematic limits of authority, once this account is used by people, aftermath is unimaginable. What hacker invade is to attempt to get the password of Administrator account frequently with one of means, so, we will deploy Administrator account number again.

First, it is to install a powerful complex password for Administrator account, then, we rename Administrator account , and then found a Administrator account deception invasive person who has no keeper limits of authority. So as soon as coming , invasive person is nearly impossible to do clear what account to possess keeper limits of authority really , has also reduced dangerousness on certain degree.

7, stop the invasion

Guest account so called guest account, it may visit computer , but gets restriction. What is unfortunate is that Guest has also opened convenient door for hacker to invade! Net goes up have many articles in have introduced the method of how to use Guest user to get keeper limits of authority , will so stop invade based on the system of Guest account.

It is the best method that prohibiting use or delete thoroughly Guest account, but under some conditions of must use Guest account , need to make defence work through other channel. First, will set up a strong password to Guest, the then detailed visit of installing Guest account for physical route limits of authority. Give an example , may visit tool file if you will prevent Guest user, it may be right to attack this file, select the label of " safety " in springing menu, may see from it may visit this file have user. Delete keeper besides have user can. Or in limits of authority, set limits of authority for corresponding user, say can only " list file catalog " and " read to take " etc., so for safety, it is many.

8, install necessary

We should still install and use in computer, is necessary to guard against dark software, antivirus software and fire wall are essential. When geting on the Internet , open them, such even have hacker attack our safety also has guarantee.

9, guard

Hobbyhorse program can steal the useful message

In the file that put in downloading file first

When" beginning" " program" " start " or " beginning " " program"

In show registration HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion \ Run is all as

10, do not return

Some hackers may pretend to be some names of regular website, then weave high-sounding reason the user that sends a letter to give you to ask you to input to get on the Internet name and password, determine if pressing , your account number and password have entered the postbox of hacker. So, do not return the mail of stranger casually, even if he describes again pleasant again tempting also do not be taken in.

Make the safe

ActiveX controls and Applets, have the function than winner, but also have the hidden trouble used by people, the malice code in webpage is often to, using these, control the little program compiled , so long as opening webpage, will be run. So, will avoid that the attack of malice webpage has only to prohibit the operation of these malice codes. IE has offered multiple choice for this, installing step specifically is: " tool" " Internet chooses item " " safety" " from define rank ", suggest you to control ActiveX to and is related to choose item prohibit to use. Have not been wrong carefully always!

Additionally, in the safety property of IE sets , we can only set Internet and local Intranet , receive the web site of confidence , receive the web site of restriction. However, Microsoft has hidden the safety property of " my computer " here to set , show through modification registration should choose item to open , may make we when treat ActiveX to control the choice with from time to time more Applets , is for the local influence of larger computer safe arising.

Downstairs, it is specific method: Open the "operation" in menu of " beginning " , input Regedit.exe in the dialog box of " operation " that sprung , open registered table editor ware, the "+" before click takes place in order: HKEY_CURRE-NT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ InternetSettings \ Zones \0 finds DWORD in right window to worth "Flags" , acquiescing in key value click double "Flags" for 16 into the 21 of system( the 33 of decimal system), in the dialog box sprung altering its key value for "1" can, close registered table editor ware. Need not start computer again , open IE again , click the label " tool Internet chooses item safety" again, you will see many a " my computer " icon, here, you may set its safe grade. It is high some to set its safe grade , such is on guard is more tight.

没有评论: