Saturday, January 29, 2011
Weak current College】 【reasonable configuration does not have a bad habit threat system security.
In the frequent manipulation computer processes, we often form some bad habits, these habits operation looks can provide efficient, but through these operations used to take a look at the many threats to the security of the system, for example from Internet network download REG file, most people eyes closed is double-clicking, import it into system registry, but it can cause serious system failure; another example, the system administrator rights, feel free to open IE readers to surf the Web, may cause the system to encounter a Trojan horse or other malicious code or attacks. Because the operation used to not be changed overnight, in order not to let the bad habit of threat to Windows system security, we can reduce by reasonable configuration, bad operation used to security threats.
1. reduce the threat of double-clicking the reg file
Sometimes, in order to achieve a functional purpose, we download the reg file, and then double-click mouse essentials to import it into system registry, you can achieve it. However, now the Internet network in many malicious REG file, if they do rashly to, double-click Windows system may encounter illegal attacks. In order to reduce this habit of security threats, we can manually configuration, amend the REG file to open the form, and let Windows system to receive the double-click action command after the first call to a text editing program such as WordPad to open the REG file, so that we can identify the REG file could exist against system security of malicious code, here is the gist of the specific implementation steps:
First click the "start"/"run" command in the pop-up system run dialog box, enter the string "cmd" command, click the Enter key, the system screen to switch to a MS-DOS window of work;
Then in the Windows command line prompt, enter the string command "ftyperegfile = write.exe% 1" and click the Enter key, Windows system will succeed changes to REG file import forms, we again use the mouse to double click the file, the Windows system will use WordPad to open the content in the reg file, in the text editing window we will see at a glance which could exist against the system of malicious code. If you find that no malicious code exists, we need to do is right-click the target reg file, from the shortcut menu to perform the "merge" command, you can set the contents of the file are imported into the local system registry.
Of course, if you download from the Internet network is available in the BAT file, we can use the same key to modify its open form, in order to ensure the security of running Windows System. We can work in the MS-DOS window in command line prompt, execute string command "ftypebatfile = write.exe% 1" to the future with the mouse double-click BAT file, first open the text editor window. If you find that target BAT file in line with the operational requirements, we work in the MS-DOS window in command line prompt, enter the path to the BAT file, click the Enter key.
2, reduce the threat of double-click IE icon
In order to obtain maximum operation permissions, many Internet users are often like to use the system administrator account logon Windows system, and then in the system administrator rights, feel free to open IE readers to surf the Web, in fact, this is also very dangerous habit, this is because IE Reader itself there are many security vulnerabilities, some hacker programs often through these vulnerabilities on your computer system to perform illegal attacks, or attempts by these vulnerabilities to steal system administrator for the local computer. In order to reduce the threat of double-click IE icon, we can find ways to have Windows system forcing IE readers must be run as a standard user account, while at the same time need to enter a password to open IE readers do Internet access; to do this, we can perform the following actions:
First right-click on the local computer system desktop "computer" icon, from the shortcut menu command "management", open the corresponding system of the computer management window, on the left side of the display area of the window, click on the "System Tools"/"local users and groups"/"the user" branch options;
Then use the right mouse button to click the "user" branch options, and perform a right-click menu in the "new user" command, then the new user dialog box, set a new standard account name, and configured the appropriate access password, assuming that here we new a "aaa" standard account, the account password is configured to "111";
The following is a shortcut IE readers form, and place the shortcut forms directly onto the system desktop, right-click IE shortcut forms, from the shortcut menu command "property", open the target shortcut forms of property configuration window, in the window of the "target" text box, enter the string content directly "C: \Windows\System32\runas.exe/user:" aaa "C:\ProgramFiles\InternetExplorer\IExpLORE.EXE", click "OK" button to finish the above modification operations;
In order to guarantee the absolute security of the system, we now turn on the local computer's "start" menu, to remove IE readers about the project, as well as other locations on the shortcut forms, only reservations system that IE shortcut on your desktop.
After this configuration, our future system privileges,Double-click System desktop shortcut form in IE, the system will first require us to enter the "aaa" account password, wait until the password is entered correctly, IE readers would be to "aaa" account privileges to start running, in the permission state, hackers or unauthorized attacker even use the vulnerability to attacks on the local computer, but no permissions for their attack is limited, and does not threaten the safety of the local computer system.
3, reduce the threat to run Registry
A little know how little computer knowledge, often in the local computer system free run Registry Editor to modify the system for free registry key, but if a key value changes inappropriate words, light causes a system function cannot normally use, serious cause paralysis occurs in computer systems. In fact, through the following configuration operation, we can let Windows system user performs "regedit.exe" program, an automatic pop-up warning prompt, tell the user to run high risk procedures do not randomly:
First open the WordPad program and program edit window, enter the specific warning prompt, assuming the content entered here as "you are currently running is a high-risk procedure, please be sure to caution," and the content is saved as "F:\jinggao.txt";
Secondly then open WordPad file edit window, enter the following code:
startF:\jinggao.txt
ping-n5127.0.0.1>nul
taskkill/imwrite.exe
To confirm that the above code content is correct, then click "file"/"Save" command to save it as "F:\jinggao.bat" file; Windows system in the future, once the batch file has been executed, the system screen appears for 5 seconds "you are currently running is a high-risk procedure, please be sure to caution" text prompts;
Following "start" then click "run" command/, in the pop-up system run dialog box, enter "regedit" in the string command, click the "OK" button, open the corresponding system registry editing window, in the edit window on the left side of the display area, expand HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions branch option, in the target branch option to the right shows area, right-click the blank space, and then click on the shortcut menu of the "new"/"key" command, and then adds a new item named "regedit.exe";
Select "regedit.exe" subkey, and then press the same key in the subkey following the establishment of a string key value, the string value named as "debugger", and then double-click the key value, then the numerical configuration dialog box, set the "debugger" value is configured to "F:\jinggao.bat", and finally click "OK" button to finish the registry configuration operations.
Later, when other users on the local computer system running the registry program, the screen automatically appears "you are currently running is a high-risk procedure, please be sure to caution" such a warning message, and after five seconds the message will automatically disappear, believe that such alert notification, the ordinary person is free to run the registry edit such high risk procedures.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment