Last Articles


Most popular password

Network Information Security: Myths and Realities Omnipotence hackers

Hackers and crackers, or what is good and what is bad?

Chronology of the ARPANET - INTERNET

Protection system in Windows - Fact or Fiction

The basic principles of security

Manager SAM and Active Directory

Administrative boundaries: the forest or domain?

Can you trust a domain that is connected to the Internet?

Идентификаторы защиты (SID)

Why can not I log in as an administrator from any location?

Network security model and resource sharing

Remote attacks on distributed computing systems

Characteristics and mechanisms of implementation of standard remote attacks

Fake ARP-server on the Internet

False DNS-server on the Internet

Substitution of one of the subjects TCP-connections on the Internet

Malfunction host on the network

Mythical remote attacks on the Internet

Dedicated channel communication between objects distributed CS

Security in Windows XP

One of the most rather big problems, intent upon computer users who have always been viruses, but in recent years were added, and spyware. For a home computer on which there is no confidential information is not a very rather big problem, but all the same, not very nice when infa about the owner of a computer somewhere is passed without his vedoma.Iz this article you will learn how to improve the security of your order computer so that you stop worrying about your important data and do not allow anything to send information from your computer without your permission.

Passwords:

The first thing that should initiate - passwords. In this place are the registry keys associated with passwords. The main rule to be followed, in case you want your passwords to be effective - do not use words that are permitted to turn up in the dictionary, or set of numbers. It is best to combine numbers and letters in different registers or store your passwords in an accessible location.

Prompt for password when returning to work from standby mode

[HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftWindowsSystemPower] "PromptPasswordOnResume" = '1 '

Require passwords of all letters and numbers

Same key will make you eternally in passwords combine letters and numbers. [HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion

PoliciesNetwork] "AlphanumPwds" = '1 '

Set a minimum number of characters in passwords

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesNetwork] "MinPwdLen" = hex: 6

Cancel storing passwords in Internet Explorer

If you trust the company Microsoft to store passwords and other confidential information, you may have permission to Windows to protect the password to access the Internet on the drive of your computer, but it's not a very good idea.

[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersion Internet Settings] "DisablePasswordCaching" = '1 '

Barring password storage

In previous versions of Windows 9x to save passwords had health problems. At present it is not so, Windows 2000 and XP protect this information much better. But, again the same way you find a solution to allow the operating system to save passwords to disk or not. This applies to user passwords and network passwords.

[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion PoliciesNetwork] "DisablePwdCaching" = '1 '

Network

Deny access to anonymous users

Unknown user can get access to the list of users and public resources to forbid this, is allowed to use this key.

[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLSA] "RestrictAnonymous" = '1 '

Do not show passwords as you type

When attempting to access password-protected resource, Windows does not hide the password that you enter. Same key allows you to replace characters in the password with asterisks.

[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion PoliciesNetwork] "HideSharePwds" = '1 '

"Hiding" your computer from other users in the network

Same key allows you to connect the order in which to browse mode other network users will not see on your computer.

[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServices LanmanServerParameters] "Hidden" = '1 '

Remove all traces of your work at the computer

Cleanup file PageFile

Extermination at the completion of the entire information that could survive in your system Page File.

[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControl Session ManagerMemory Management] "ClearPageFileAtShutdown" = '1 '

Automatically delete temporary files after the work in the Internet

0 will force Internet Explorer to delete all temporary files such as images from the web-pages and other information, the remaining traces of the Internet, and one will leave the files on the disk.

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows CurrentVersionInternet SettingsCache] "Persistent" = '0 '

To cancel saving the list of documents you were working

[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion Policies Explorer] "NoRecentDocsHistory" = '1 '

Canceling store information about user actions

Same key prohibits enter, with some applications that only worked as a user, and what documents he has access.

[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion PoliciesExplorer] "NoInstrumentation" = '1 '

Batch file to remove the temporal information

The same batch file will remove all the temporal information in front of the computer shuts down. To create it, it is necessary to carry out some simple steps:

1. Open Notepad and type the same text: (do not forget to replace the username the user name under which you log into the system, and C: Temp - name your folder with temporary files).

RD / S / q "C: Documents and SettingsUSERNAMELocal Settings

History "

RD / S / q "C: Documents and SettingsDefault UserLocal Settings

History "

RD / S / q "C: Temp"

2. Save the same file on your C: drive named deltemp.bat.

3. Click Start-> Run. Type gpedit.msc. In the left pane of Group Policy, click Computer Configuration - Configuration of Windows - Scripts (Startup / Shutdown), and then in the right pane, click Shut Down. In the resulting window, click the Add button and specify where the file you created. Now it will run before every shutdown

Top 5 most read

The basic rules of safe behavior on the Internet

Manager SAM and Active Directory

You forget your password. What should I do? Part 3

Идентификаторы защиты (SID)

Social engineering as a way of committing crimes in the sphere of computer information

Copyright © 2010 BRV ISTCOM S.R.L.- раскрутка сайта