-
The easiest way to do this is to firewall, then delete all the default shares, give you a batch, and you put it in the startup item, net share ipc$ delete
net share admin$ /deletenet share c$ /delete
net share d$ /delete
net share e$ /delete
You can delete it according to your shared items, so that every time you boot up, your default sharing will be deleted, port 137 will be blocked, all users who are allowed to access your item will be deleted in the group policy, guest will be closed, and it is best to add permissions to the startup item of the registry.
Pressing the firewall is the way to go. XP comes with it.
-
Close the remote port first, patch the system on time, and then install the firewall.
I'm getting an anti-scan software or something.
-
First of all, make sure that there are no Trojans in your machine, and use antivirus software to check and kill them. Then make sure you right-click on the remote in my computer properties to allow the remote desktop in front of the checkmark is not typed, and set a more complex password, especially the administrator password.
It is recommended to install Kaspersky+ZoneAlarm.
-
Generally through the Trojan program to your computer,After you hit it, he can control your computer,The best way to prevent it is not to click on those unknown files,Pornographic ones are the majority,You can do it basically and you won't be hit There is also don't accept files sent by others casually,Especially。 exe ending!!
-
Install a firewall. If you don't unplug the network cable, it can effectively prevent others from entering your computer!
-
Do you mean remote?
My Computer -- Properties--- remote --- allow the user to tick that.
If you are logging in locally, add a password.
-
Don't click on the unknown source**, scan the antivirus first every day, and turn off the remote control.
-
If you are not engaged in special confidential work, under normal circumstances, no one will hack into your computer, as long as you open the firewall, install relevant security software, and regularly disinfect viruses, there are very few hackers, and they will not be idle to hack into the computer casually.
-
1.Lock the computer, click Start, then click Settings, click Control Panel, then click User Account, and finally click on the account you want to set a password for, and you can set a password after entering2Setting a boot password, setting a screensaver password, and setting a file password are all beneficial protection measures, but you can't rely too much on the validity of the password, because these passwords are extremely easy for professionals to crack.
However, for the general office environment, setting the boot password is still quite useful.
After powering on, press the delete key of the keyboard to enter the BIOS interface.
Find the user
password option, which is off by default.
Activate and enter the user password (1 8 digits, English or numeric).
The computer prompts you to enter it again to confirm that the password is correct, and restart the machine after the save (f10) exit, and the password menu will appear when the computer is turned on.
3.If you need to leave because you are in a hurry, but you don't want your computer to log out of the system.
You can select "New Shortcut" (right-click on the desktop to create a new shortcut) and the Create Shortcut Wizard will launch and enter " in the text box
lockworkstation", click Next, and enter a name for the shortcut in the pop-up window. You can name it "Lock Computer" or.
At this time, all the functions of the computer are running, and when you come back, you can move the mouse or click the keyboard casually; If you set a password, enter it and you're good to go.
If you're satisfied, set it up oh, hehe, thank you
-
How to set a computer boot login password to protect personal privacy so that others can't enter the computer system.
-
1.With the permission of others, use a remote desktop connection to enter. The specific way is to connect to someone else's computer by connecting to the remote desktop that comes with the Windows system.
The specific operation method of remote desktop connection is as follows: (1) Start Program Attachment Remote Desktop Connection Click to enter Enter the computer name and then connect. There is also a way to use QQ's remote assistance to enter other people's computers, and the specific operation method is as follows:
Find the other party's QQ number, and then double-click to chat with the other party, there is an application option behind the top**, select remote assistance in the application option, if the other party agrees, you can enter the other person's computer.
2. Entering other people's computers without permission. First of all, you must determine the IP of the computer to be hacked, after you have the IP address, you can connect to the computer that will be invaded by you, generally the user name of the computer is mostly in the form of "user number" in the form of empty password, so enter the net use IP address IPC$ under the "Command Prompt".""user:""and the net use IP address ipc$""user:
user number"command to connect. After the connection is successful, you must close the antivirus software of the other computer, right-click "My Computer", select "Manage", right-click "Computer Management (Local)" in the pop-up window, select "Connect to another computer", connect to the IP number of that computer, and start the "Tenlet" service. Then under the Command Prompt, enter two commands to create a new user20 user locally and add it to the Administrators group.
netuser user number add net localgroup administators user number add. Then enter C: Winnt System32, right-click, select "Create Shortcut", then right-click the shortcut, select "Properties", select "Run as another user", run the shortcut cmd, pop up the "Run as another user" window, enter the "user number" Enter with TelNet computer IP number Log in to the other party's computer, and then kill the process software from a command line on the Internet, such as knlps, etc., Shut down the antivirus process on Telnet.
Love the turn, why are you girls like this? I thought girls in the south would be like this... >>>More
The most cost-effective upgrade is to add the memory to 2G 4G, and the performance will be increased several times, and then I want to improve the CPU to a slightly better E4200, and finally the graphics card with a GT220. In fact, this computer can cope with most programs by adding 2G memory, but if you have more money, you can upgrade it as appropriate, as follows: >>>More
Make a boot disk with a USB flash drive, there are a lot of tutorials.
The problem you said should be a notebook,Win7Under it,You can find the power options-Find the option you are using-Change the plan settings-Change the advanced power settings-Power button and cover-Close the lid operation-Select the settings you want,I hope it can help you。
First of all, a person should have a confident attitude to calmly face their own life, and can see that you are a cheerful boy Secondly, you should look in the mirror more, medically speaking, the mirror can reflect a kind of rays, which is good for **, I wish you more and more handsome The more you grow up, the more handsome you will be. You should also focus more on your study and life, and wish you healthy growth!!