自己的如何保护自己的电脑 ip 不让别人攻击掉线(How do you protect your computer IP from being dropped)

ip攻击  时间:2021-02-12  阅读:()

如何保护自己的电脑ip不让别人攻击掉线How do you protectyour computer IP from being dropped

How do you protect your computer IP from being attacked? Somepeople will say that attack you IP let you drop he implementedafter you really lost how to do reward points: 100 - to solvetime: 2009-1-10 22:35 he said on QQ UT that let you drop offfor a while you tell me how to deal with him is my IP. I can'tchange the fixed do not always let him get ah

If I am an Internet cafe, it is impossible to install firewallsin every station. Is there any other good way?:

You see, it might be useful to you.

Cancel folder to hide share

If youuse the Windows 2000/XP system, right click the C or otherdisk, choose to share, you will be surprised to find that ithas been set to"share this folder in the"network neighborhood"can't see the content, how is this going on?

Originally, by default, Windows 2000/XP will open allpartitions hidden shared from the control panel / managementtools / computer management "window to select" system tools /share / share ", you can see each disk partition name behindwith a" $". But as long as the type the computer name or IPC$",the system will ask the user name and password, unfortunately,most of the individual users Administrator password is empty,the intruder can easily see the C content, the network securityhas brought great hidden danger.

How do you eliminate default sharing?The method is very simple,open the registry editor, enter

"HKEY_LOCAL_MACH INESYSTEMCurrentCont rol Set Sev i ce sLanmanwork

stationparameters", a new name "AutoShareWKs" double bytevalue, and its value is "0", and then restart the computer, thisshare was canceled.

Two, refuse malicious code

Malicious web pages have become one of the biggest threats tobroadband. Modem was used before because it was slow to openpages, shut down malicious web pages before being fully opened,and avoided the possibility of being caught. Broadband is nowso fast that it can easily be attacked by malicious web pages.Malicious web pages are generally destructive because they arewritten in malicious code. These malicious code is equivalentto some small programs, as long as the opening of the web pagewill be run. Therefore, to avoid malicious web attacks, as longas the prohibition of the operation of these malicious code onit.

Run the IE browser, click "tools /Internet options / safety /custom level, the security level is defined as" security levelhigh", "ActiveX controls and plug-ins in the second, third setto"disabled", the other is set to"tip", then click"ok". Afterthis setting, when you use IE to browse web pages, you caneffectively avoid malicious web pages malicious code attacks.Three, seal hacker' s back door"

As the saying goes "There are no waves without wind. ", sincehackers can enter the system, there must be open for them, aslong as the "back door" blocked the back door, so that hackersno place to start, there is no menace from the rear!

1. cut out unnecessary agreements

For servers and hosts, it' s enough to just install the TCP/IPprotocol. Right click the network neighbor, select properties,right-click the local connection, select properties, anduninstall unnecessary protocols. Among them, NETBIOS is theroot of many security flaws. For those hosts that do not needto provide file and print sharing, they can also close theNETBIOS that is bound to the TCP/IP protocol and avoid attacksagainst NETBIOS. Select the "TCP/IP protocol / property /advanced", enter the advanced TCP/IP settings dialog box,select the WINS tab, tick the disable TCP/IP on NETBIOS, andclose NETBIOS.

2. close file and print sharing"

File andprint sharing should be avery useful feature, but it' sa good security hole for hacking when you don't need it. So,without the need for "file and print sharing", we can turn itoff. Right click the network neighbor, select properties, andthen click the file and print sharing button to remove the hookin the two check boxes in the pop-up file and print share dialogbox.

Although the file and print share is closed, there is no

guarantee of security, and the registry must be modified toprevent it from changing file and print sharing". Open theregistry editor, select the

"HKEY_CURRENT_USERSoftwareMi crosof tWindowsCurrentVersi onPol

iciesNetWork" key, new types of DWORD keys in the key, the keyis called "NoFileSharingControl" key to "1" said the banfunction, so as to achieve the prohibition to change the fileand print sharing ";" 0 "key allows this function.

In this "network neighbor"property dialog box, "f ile and printsharing" no longer exists.

3. disable the Guest account

There are many intrusions through this account to furtheraccess the administrator password or permissions. If you don'twant to give your computer to someone else as a toy, it' sforbidden. Open the control panel, double-click the user andpassword, click the Advanced tab, and then click the advancedbutton to eject the local user and group window. Right clickon the Guest account, select properties, and select "theaccount is disabled" on the "general" page". In addition, theAdministrator account name change can prevent hackers knowtheir own administrator account, which will largely guaranteecomputer security.

4. prohibit the establishment of empty connections

By default, any user can connect to the server via an emptyconnection, enumerate the account number, and guess thepassword. Therefore, we must prohibit the establishment of

empty connections. There are two ways:

Method one is to modify the registry: open the registry"HKEY_LOCAL_MACHINESystemCurrentControlSetControlLSA", theDWORD value "RestrictAnonymous" key to "1" can be.

Finally, I suggest you put your own system patches, Microsoftthose endless patches are still very useful!

Four, hide the IP address

Hackers often use some network detection technology to checkour host information, the main purpose is to get the IP addressof the host in the network. IP address is a very importantconcept in network security, if the attackers know your IPaddress, is ready for his attack, he can ask the IP to launcha variety of attacks, such as DoS (denial of service) attack,Floop overflow attack etc. . The primary way to hide IP addressesis to use proxy servers.

Compared with the direct connection to Internet, the use ofproxy servers canprotect the IP address of Internet users, thusensuring Internet security. The principle of the proxy serveris the client (user computer) and remote server (such as theuser wants to access remote WWW server) set up between a"station", when a client request to a remote server, proxyserver first intercept the user' s request, and the proxy serverwill service request to the server. In order to achieve betweenthe client and the remote server connection. Obviously, afterthe proxy server is used, other users can only detect the IPaddress of the proxy server, not the IP address of the user,

thus realizing the purpose of hiding the user' s IP address andensuring the security of the user' s Internet access. There aremany websites offering free proxy servers, and you can also findthem yourself using proxies, hunters, and other tools.Five, turn off unnecessary ports

A hacker often scans your computer' s ports during an invasion.If the port monitor (such as Netwatch) is installed, the monitorwill have a warning prompt. If you encounter this kind ofintrusion, software tools available to close the port, forexample, to provide web service 80 and 443 port closure with"Norton Internet Security", some other commonly used ports canbe turned off.

Six, replace the administrator account

Administrator accounts have the highest system privileges, andonce the account is used, the consequences can be disastrous.One of the common ways of hacking is to try to get the passwordfor the Administrator account, so we have to reconfigure theAdministrator account.

The first is to set up a strong and complex password for theAdministrator account, then we rename the Administratoraccount, and then create a Administrator account with noadministrator privileges to cheat the intruder. As a result,it is difficult for intruders to figure out which accounts haveadministrator rights and, to some extent, reduce the risk.Seven, to prevent the invasion of Guest accounts

The Guest account, known as the guest account, has access tothe computer but is restricted. Unfortunately, Guest alsoopened convenient ways for hacking! There are many articles onhow to use Guest users to get administrator privileges, so wemust put an end to the system invasion based on Guest accounts.It' s best to disable or completely delete Guest accounts, butin some cases you have to use Guest accounts, you need to dodefensive work in other ways. First, set up a strong passwordfor Guest, and then specify the access rights of the Guestaccount to the physical path. For example, if you want toprevent Guest users can access the tool folder, right-click thefolder, select the "security" tab in the pop-up menu, can beseen from all users can access this folder. Delete all usersexcept administrators. Or set permissions for the appropriateuser in the permissions,

For example, you can only list folders, directories, and read,so that' s much safer.

Eight. Install the necessary security software

We should also install and use the necessary software incomputer hacking, antivirus software and firewall is necessary.Open them on the Internet so that even when hackers attack, oursecurity is guaranteed.

Nine, to prevent Trojans

Trojan horse program will steal useful information embedded in

the computer, so we have to prevent hackers implanted Trojanhorse, the commonly used method is:

When downloading files, first put them in your own new folder,and then use antivirus software to detect and play the role ofpreventing in advance.

In the "start", "program", "start", "start", "start","program", "Startup", see if there are any unknown runningitems, if so, delete them.

? all the

HKEY_LOCAL_MACHINE\SOFTWARE\Microsof t\Windows\CurrentVers ion\Run in the registry under the "Run"prefix for all suspiciousprocedures can be deleted.

Ten, do not return to strangers mail

Some hackers may be posing as some formal website name, username and password and then make a highfalutin reason to senda letter to you to ask you to enter the Internet, if you pressthe "OK", your account number and password into the hackermailbox. So don' t just return a stranger' s mail. Even if he saysit sounds good, he won't be fooled.

Do a good job of IE security settings

ActiveX controls and Applets have strong functions, but thereare also hidden dangers that are exploited. Malicious code ina web page is often a small programwritten using these controls.As long as the page is opened, it will be run. Therefore, to

avoid malicious web attacks, only prohibit the operation ofthese malicious code. IE provides awide variety of options forthis. The settings are: Tools > Internet Options > Security >Custom levels, and you are advised to disable ActiveX controlsand related options. There is nothing wrong withbeing careful!In addition, in the IE security settings, we can only setInternet, local Intranet, trusted sites, restricted sites.However, Microsoft to hide the "my computer" safety set here,by modifying the registry to the options open, so that we canhave more choices in dealing with the control of ActiveX andApplets, and have a greater impact on the local computersecurity.

The following is the specific method: open the "Start Menu"run", in the pop-up" run "dialog box, enter the Regedit. exe, openthe registry editor, click the" + "in front of the numberexpanded to: HKEY_CURRE-NT_USER\Software\Microsoft\Windows\CurrentVersion\InternetSettings\Zones\0, DWORD f ind the valueof"Flags "ontheright side of thewindow, the default key valueis sixteen hexadecimal 21 (33 decimal) , click" Flags "in thepopup dialogbox will its value to" 1 "then, close the registryeditor. No need to restart the computer, restart the IE, clickTools > Options Internet Security tab again, see the "mycomputer" icon you will, here you can set the security levelof it. Set its security level higher, so that the preventionis more stringent.

Next scheme:

If it' s fixed, IP. Then you can choose the proxy server.

青云互联19元/月,美国洛杉矶CN2GIA/香港安畅CN2云服务器低至;日本云主机

青云互联怎么样?青云互联美国洛杉矶cn2GIA云服务器低至19元/月起;香港安畅cn2云服务器低至19元/月起;日本cn2云主机低至35元/月起!青云互联是一家成立于2020年的主机服务商,致力于为用户提供高性价比稳定快速的主机托管服务。青云互联本站之前已经更新过很多相关文章介绍了,青云互联的机房有香港和洛杉矶,都有CN2 GIA线路、洛杉矶带高防,商家承诺试用7天,打死全额退款点击进入:青云互联...

百驰云(19/月),高性能服务器,香港三网CN2 2核2G 10M 国内、香港、美国、日本、VPS、物理机、站群全站7.5折,无理由退换,IP免费换!

百驰云成立于2017年,是一家新国人IDC商家,且正规持证IDC/ISP/CDN,商家主要提供数据中心基础服务、互联网业务解决方案,及专属服务器租用、云服务器、云虚拟主机、专属服务器托管、带宽租用等产品和服务。百驰云提供源自大陆、香港、韩国和美国等地骨干级机房优质资源,包括BGP国际多线网络,CN2点对点直连带宽以及国际顶尖品牌硬件。专注为个人开发者用户,中小型,大型企业用户提供一站式核心网络云端...

香港 E5-2650 16G 10M 900元首月 美国 E5-2660 V2 16G 100M 688元/月 华纳云

华纳云双11钜惠出海:CN2海外物理服务器终身价688元/月,香港/美国机房,免费送20G DDos防御,50M CN2或100M国际带宽可选,(文内附带测评)华纳云作为一家专业的全球数据中心基础服务提供商,总部在香港,拥有香港政府颁发的商业登记证明,APNIC 和 ARIN 会员单位。主营香港服务器、美国服务器、香港/美国OpenStack云服务器、香港高防物理服务器、美国高防服务器、香港高防I...

ip攻击为你推荐
苏州商标注册在苏州怎么注册商标!96155北京的住房公积金贷款不能打印还款凭证吗, 给96155打电话,他们说没这项业务,让问问贷款中心站长故事科学家的故事200字中国论坛大全甘肃论坛都有哪些?中小企业信息化中小企业如何进行企业信息化规划网易公开课怎么下载怎么下载网易公开课里的视频 .......天天酷跑刷金币如何使用八门神器给天天酷跑刷钻刷金币xv播放器下载xv播放器怎么下载?qq空间打扮如何打扮QQ空间?idc前线穿越火线河北的服务器好卡 有人知道怎么回事嘛 知道的速回
宿迁服务器租用 电信服务器租赁 博客主机 绍兴高防 php空间申请 个人域名 seednet hostloc 广州服务器 国外视频网站有哪些 空间租赁 西安服务器托管 日本代理ip 永久免费空间 广东主机托管 腾讯网盘 网站加速 卡巴斯基官网下载 xshell5注册码 hosts文件修改 更多