Cracker OF Computer Security

Cracker OF Computer Security




1. Blocking Remote Access. To prevent your PC taken over by hackers, disable Remote Access. 
in Start menu, right click on "My Computer" & select "Properties". 
Then there is the "System Properties", then select the tab "Remote", dismiss / remove the sign (V) which are in front of all the options that exist to disable it. 
Then click "OK". 



2. Removing unused User Accounts => On the "Windows XP Professional" there are several user accounts which can be accessed through the trojan and utilized to perform the attack. 
To get rid select the Start menu, select "Control Panel", select "Performance and Maintenance". Then select "Administrative Tools", click 2 times "Computer Management". Select "Local Users and Groups", on the right side 2 times pd click the "Users".
You can delete the old accounts that you use non- (Image users who have an X). Then close the screen earlier. 



3. Closing the gap NetBIOS => file2 your documents can be accessed via the Internet then no active NetBIOS. in Start menu, right click on "My Network Place" & select "Properties". 
Then there is the "Network Connections". 
Then right-click the Internet connection icon you are available, choose "Properties". 
If no display, select the tab "Networking".Tick ​​(V) which are in front of "Internet Protocol (TCP / IP), 
then click the tab" Properties "which is underneath. 
Then there is the "Internet Protocol (TCP / IP) Properties", select "Advanced" tab. Display no more "Advaced TCP / IP Settings", select the tab "Wins", and select "Disable NetBIOS over TCP / IP. 
Click 'OK'. 



4. Response to BO2K on Windows 9x. BO2K can be tracked with port scanning. Usually pd Windows 9x an open port that is only one port 139 (NetBIOS). Therefore need to be suspected if we know there is another port other than an open port 139.
Circulating anti-virus program is currently able to detect the existence of this program. 
Make sure you have to download the latest version of anti-virus program.to open the Windows registry. Usually pd Windows 9x, 
because BO2K embed themselves in "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ RunServices" or on "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Run". 



5. Security BIOS on the Server => BIOS is the low level software which is useful for configuring or manipulation of the hardware on x86-based PC. MS Windows and Lilo from Linux to use it for determine the procedure for booting on your PC. 
You need to protect your BIOS with a password given to him. This method is also useful for preventing the use of booting up via floppy disk. This way ill give the maximum protection of your PC, but it can complicate other bad for your PC. Keep in mind that the current BIOS flashroom method, which allows us to change configuration or even remove them altogether. 



6. CGI Abuse Shell on Unix / Linux => There are some pretty powerful way of reply to address them: 
a. You plug-chrooted Apache Jail on you so that the command which can be run to your limit. 
b. Minor Tweaks CGI Source Code of the facility who would you give such as Perl, then you turn off the facility system () function ... Smile 
c. Minimize the occurrence of local exploits on your system often tinkering with & follow the news about security. 



7. Removing non-COM components are needed pd Windows 2000/XP => Some non-COM components required by almost all applications must be removed. Consider first before deleting it because every component of each other associated with a file system & dictionary objects. In the Start menu select Internet Explorer, on "Tools" menu select "Internet Options". If no display, select the tab "Connections". In the "Dial-up and Virtual Private Network Settings" delete COM Unresponsive needed with clicking on it and select "Remove". Then click 'OK'. 



8. Enable Firewall => For Hackers & attacker did not get to your PC, it takes a Firewall. 



9. Installing Anti-Virus => antivirus software does not just get rid of viruses, worms, or other destructive files but also protects your PC from the threat of attack script on the website. 



10. Do you do a chat on MIRC before the above tips into practice,

0 Comments

0 Response to "Cracker OF Computer Security"

Post a Comment