Your computer is often attacked by viruses? Or have not installed antivirus? Maybe you can try these tips how to prevent virus attacks manually as follows:
· Blocking Remote Access. To prevent your PC taken over by hackers, disable Remote Access. Dlm Start menu, right click on "My Computer" & select "Properties". Then there is the "System Properties", then select the tab "Remote", get rid of / remove the sign (V) which are in front of all the existing option to disable it. Then click "OK".
· Deleting User Accounts unused. In "Windows XP Professional" there are several user accounts that can be accessed through the trojan and utilized to perform the attack. To get rid select the Start menu, select "Control Panel", select "Performance and Maintenance". Then select "Administrative Tools", click 2 times "Computer Management". Select "Local Users and Groups", on the right side 2 times pd click the "Users". You can delete the old accounts are ill you use (existing users drawing an X).Then close the tampilan2 earlier.
· Closing the gap NetBIOS. File2 your document can be accessed via the Internet then nonaktifkanlah NetBIOS. Dlm Start menu, right click on "My Network Place" & select "Properties". Then there is the "Network Connections". Then right-click the Internet connection icon you are available, choose "Properties". If no display, select the tab "Networking". Tick (V) which are in front of "Internet Protocol (TCP / IP), then click the tab" Properties "which is underneath. Then there is the view" Internet Protocol (TCP / IP) Properties ", select the tab" Advanced ". Display no more "Advaced TCP / IP Settings", select the tab "Wins", and select "Disable NetBIOS over TCP / IP. Click 'OK'.
· Response to BO2K on Windows 9x. BO2K can be tracked with port scanning. Usually pd Windows 9x an open port that is only one port 139 (NetBIOS). Therefore need to be suspected if we know there is another port other than an open port 139. Circulating anti-virus program is currently able to detect the existence of this program. Make sure you have to download the latest version of anti-virus program. Rajin2 is to open the Windows registry. Usually pd Windows 9x, because BO2K embed itself in the "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ RunServices" or the "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Run".
· Security BIOS on the Server. The BIOS is the low level software which is useful for configuring or manipulating the hardware on x86-based PC. MS Windows and Lilo from Linux to use it to determine the procedure for booting on your PC. You need to protect your BIOS with a password given to him. This method is also useful for preventing the use of booting up via floppy disk. This way ill give the maximum protection of your PC, but it can complicate other org mengacak2 for your PC. Keep in mind that the current BIOS flashroom method, which allows us to change configuration or even remove them altogether.
· Abuse Shell CGI on Unix / Linux. There are some pretty powerful way of reply to address them:
a. You plug-chrooted Apache Jail on you so that the command which can be run to your limit.
b. Minor Tweaks CGI Source Code of the facility who would you give such as Perl, then you turn off the facilities function system () ...:)
c. Minimize the occurrence of local exploits on your system often tinkering with & follow the news about security.
· Removing non-COM components are needed pd Windows 2000/XP. Some non-COM components are needed by almost all applications must be removed. Consider first before deleting because each component is interconnected with a file system & dictionary objects. In the Start menu select Internet Explorer, on the "Tools" menu select "Internet Options". If no display, select the tab "Connections". In the "Dial-up and Virtual Private Network Settings" delete COM Unresponsive needed with clicking on it and select "Remove". Then click 'OK'.
· Enable Firewall. For Hacker & the attacker did not get to your PC, it takes a Firewall.With a firewall, you can block some ports which are often attacked by hackers.
· Installing Anti-Virus. Antivirus software does not just get rid of viruses, worms, or other destructive files but also protects your PC from the threat of attack script on the website.
source: jakabanda.com
· Blocking Remote Access. To prevent your PC taken over by hackers, disable Remote Access. Dlm Start menu, right click on "My Computer" & select "Properties". Then there is the "System Properties", then select the tab "Remote", get rid of / remove the sign (V) which are in front of all the existing option to disable it. Then click "OK".
· Deleting User Accounts unused. In "Windows XP Professional" there are several user accounts that can be accessed through the trojan and utilized to perform the attack. To get rid select the Start menu, select "Control Panel", select "Performance and Maintenance". Then select "Administrative Tools", click 2 times "Computer Management". Select "Local Users and Groups", on the right side 2 times pd click the "Users". You can delete the old accounts are ill you use (existing users drawing an X).Then close the tampilan2 earlier.
· Closing the gap NetBIOS. File2 your document can be accessed via the Internet then nonaktifkanlah NetBIOS. Dlm Start menu, right click on "My Network Place" & select "Properties". Then there is the "Network Connections". Then right-click the Internet connection icon you are available, choose "Properties". If no display, select the tab "Networking". Tick (V) which are in front of "Internet Protocol (TCP / IP), then click the tab" Properties "which is underneath. Then there is the view" Internet Protocol (TCP / IP) Properties ", select the tab" Advanced ". Display no more "Advaced TCP / IP Settings", select the tab "Wins", and select "Disable NetBIOS over TCP / IP. Click 'OK'.
· Response to BO2K on Windows 9x. BO2K can be tracked with port scanning. Usually pd Windows 9x an open port that is only one port 139 (NetBIOS). Therefore need to be suspected if we know there is another port other than an open port 139. Circulating anti-virus program is currently able to detect the existence of this program. Make sure you have to download the latest version of anti-virus program. Rajin2 is to open the Windows registry. Usually pd Windows 9x, because BO2K embed itself in the "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ RunServices" or the "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Run".
· Security BIOS on the Server. The BIOS is the low level software which is useful for configuring or manipulating the hardware on x86-based PC. MS Windows and Lilo from Linux to use it to determine the procedure for booting on your PC. You need to protect your BIOS with a password given to him. This method is also useful for preventing the use of booting up via floppy disk. This way ill give the maximum protection of your PC, but it can complicate other org mengacak2 for your PC. Keep in mind that the current BIOS flashroom method, which allows us to change configuration or even remove them altogether.
· Abuse Shell CGI on Unix / Linux. There are some pretty powerful way of reply to address them:
a. You plug-chrooted Apache Jail on you so that the command which can be run to your limit.
b. Minor Tweaks CGI Source Code of the facility who would you give such as Perl, then you turn off the facilities function system () ...:)
c. Minimize the occurrence of local exploits on your system often tinkering with & follow the news about security.
· Removing non-COM components are needed pd Windows 2000/XP. Some non-COM components are needed by almost all applications must be removed. Consider first before deleting because each component is interconnected with a file system & dictionary objects. In the Start menu select Internet Explorer, on the "Tools" menu select "Internet Options". If no display, select the tab "Connections". In the "Dial-up and Virtual Private Network Settings" delete COM Unresponsive needed with clicking on it and select "Remove". Then click 'OK'.
· Enable Firewall. For Hacker & the attacker did not get to your PC, it takes a Firewall.With a firewall, you can block some ports which are often attacked by hackers.
· Installing Anti-Virus. Antivirus software does not just get rid of viruses, worms, or other destructive files but also protects your PC from the threat of attack script on the website.
source: jakabanda.com
FREE DOWNLOAD
{ 0 komentar... Views All / Send Comment! }
Posting Komentar