Joke Collection Website - Blessing messages - How to turn off network service information
How to turn off network service information
Figure 2 Closes the "platform" of privacy exposure-scrapbook service. Some friends often like to copy and paste user name and password information, which seems to be very efficient. I don't know that this way of entering accounts often saves private information such as passwords in the local clipboard, but once the ClipBook service in the local system is started, some people with ulterior motives may connect to the local workstation through the network and remotely obtain all kinds of privacy saved in the local clipboard through the ClipBook service. Obviously, if the information stored in the local clipboard is your bank account number and password, opening the ClipBook network service at will may bring you huge economic losses. 1. Shutdown Reason Once the ClipBook network service is opened in the local workstation and the administrator account of the local system uses a weak password, an illegal attacker may crack the IPC login password by exhaustive methods. Once the password is successfully cracked, the illegal attacker can use IPC account to access the local workstation and access various shared resources of the local system at will. Moreover, an illegal attacker can open the clipboard viewer of the local workstation, and then execute the "Connect Remote Clipboard" menu command in the viewer interface, so as to obtain the private information saved in the local clipboard. 2. Close operation When you close the scrapbook service in the local workstation, you can first open the service list interface of the local workstation system according to the above operation method; Double-click the scrapbook service in the list interface to open the service attribute setting interface as shown in Figure 3, click the Stop button in the interface to set the startup type of the corresponding service to disabled, and finally click the OK button.
Fig. 3 "Path" to Close Hacker Intrusion-Remote Registry Service As we all know, the remote registry service provided by Microsoft Company for managers is designed to facilitate managers to remotely manage local systems through this service; However, once the service is enabled, any user connected to the network may illegally modify the registry of the local system through the service, and the registry is the core of the computer system. As long as a little change is made, some functions of the computer will be "abnormal", and in severe cases, the computer system will be "paralyzed" directly. 1. shutdown reason If the local workstation system has started the remote registry service, the hacker can only try to get the login password of the system administrator and log in to the local system through IPC, and then the hacker opens the registry editing window of his computer and executes the "File"/"Connect to the network registry" command in the menu bar of the editing window. In the subsequent computer selection dialog box, select the computer name of the local workstation and click the "OK" button. The hacker can enter the registry editing window of the local workstation system, and then only need to add network virus or Trojan in the startup item or other location of the system, so that the local workstation system will be maliciously attacked by hackers. Once the remote registry service is closed, no remote user can open the registry editing window of the local workstation, let alone destroy the registry. 2. Close operation When closing the remote registry service in the local workstation, you can first open the service list interface of the local workstation system according to the above operation method; Double-click the remote registry service in the list interface to open the service attribute setting interface as shown in Figure 4, click the Stop button in the interface to set the startup type of the corresponding service to disabled, and finally click the OK button.
Figure 4 Turn off the "carrier" of illegal attacks-Task Scheduler service Task Scheduler service was originally designed by Windows system to facilitate local users or remote users to arrange time reasonably, but some hackers will also use this service to execute virus destruction plans on local workstation systems. 1. Reasons for shutting down If the local workstation runs the task scheduler service, some hackers can first transfer virus programs or Trojan viruses to the hard disk of the local workstation through special methods, then use the built-in "net time" time of Windows system to check the current system time of the local workstation, and then create a task plan to run virus programs at an appropriate time through the "at" command. After the specified time, the local workstation will be "ravaged" by virus programs or Trojan horses pre-implanted in the hard disk. If we shut down the task scheduler service, hackers will not be able to create virus attack plans through the "at" command. 2. When closing the task scheduler service in the local workstation, you can first open the service list interface of the local workstation system according to the above operation method; Double-click the task scheduler service in the list interface to open the service attribute setting interface as shown in Figure 5, click the Stop button in the interface to set the startup type of the corresponding service to disabled, and finally click the OK button.
Editor's Note of Figure 5: In fact, each system service has its own existence value and built-in security mechanism. For example, the server service mentioned in this article can't share files normally without it. In addition, most security incidents caused by system services are caused by users' wrong settings rather than the service itself, such as too simple passwords. As long as the correct settings are made, most security problems should be solved. After all, we can't shut down all services because many services are what we need. However, shutting down some services that are not usually used can really reduce the chance of being attacked. But before closing, be sure to understand the functions of these services and make sure that you really don't need this service. Many inexplicable system failures are caused by related services not being started. Therefore, please shut down the service carefully. Source: Internet Forum
- Related articles
- OCR¡¯s ¡°Basic Written Examination Paper Report¡± and ¡°Written Examination Advanced Paper Report¡±
- How to check the online time of mobile phone number?
- Why can't the sky broadcast be opened?
- Does People's Republic of China (PRC) (China) Personal Information Protection Law include anonymous information?
- 202 1 Announcement on Public Selection and Transfer of Staff in Institutions Directly under Sichuan Provincial Market Supervision Administration
- Is the mediation before the overdue WeChat complaint of China Merchants Credit Card a real person?
- Can Apotheker VoIP be used on mobile phones?
- Battle.net forgot the answer to the security question.
- Has Taixing Huangqiao been unsealed?
- How to test your husband with a strange number