Senin, 10 Maret 2014

Increase Security of Windows

Share a folder without making it visible on the network

To share a folder on the network without it is visible to all, right click it and go to the Properties menu. On the Sharing tab, click Advanced Sharing. Select the Share this folder option. Enter a name ending mandatory by the sign "$". For example: $ images. Click OK. To access this file, users must enter the network address with the computer name followed by that of the shared item. If your computer is called max  max $ pictures. 
Increase Security of Windows


Prevent access to Task Manager

bloquegestiontache

Task Manager is a tool not to let all hands. To block access to the registry editor, navigate to HKEY_CURRENT_USER, Software, Microsoft, Windows, Current Version, Policies.Go to the Edit menu to create a new key named System.Right-click in the right pane and create a DWORD value named Disable TaskMgr 32 bits with a value of 1. Now links to the Task Manager will be grayed out. To restore access to delete the key or change its value to 0. 

Hide your computer in the network

You want your computer to enjoy all the benefits of the network while remaining invisible? Its possible. On the machine to "hide", run Regedit. Open the HKEY_LOCAL_MACHINE, SYSTEM, CurrentControlSet, Services, LanmanServer, Parameters. In the right pane, create aDWORD value named Hidden 32-bit with value 1. Restart Windows. The computer is no longer visible on the network. To access it, other users should, in the address window Network or My Network Places, type their name preceded by two backslash bar. 

Create an invisible folder on the desktop

dossierinvisible

Create a folder and name it with a non breaking space holding the Alt key and typing 0160 on the numeric keypad.Right click on the folder and Properties. Select the Customize tab and click Change Icon. Scroll through the list of icons to select an image blank (white list). Confirm with OK. Your file will be invisible even if the option Show hidden files is enabled. To find its location press Ctrl + Aon your desktop. 
 XP, Vista and 7 (level 1)

Display the last boot time

heuredemarrage

Want to know how long your son uses the PC? Press Win +R and type cmd and press Enter. Type net statistics workstation and entry. Statistics from the line indicates the date and time of the last time the computer starts.
XP, Vista and 7 (level 1)

Erase your navigation tracks

dns

Even if you take care of regularly emptying your browser history, traces of your Web travels remain. To realize this, press Win + R and type cmd and press Enter. In the command prompt, type ipconfig / displaydns. A list of areas visited will be displayed. To purge, type ipconfig / flushdns and press Enter. 
 XP, Vista and 7 (level 1)

Protect the registry

Found on many web files with the extension. Reg that allow a click to edit the registry. If your computer is used by several people and you want to prevent this type of file is executed too easily, open the registry key HKEY_CLASSES_ROOT, regfile, shell. On the right, double-click the key (default) and type in the edit field data value. Confirm with OK. Now double-click on a. Reg file, open it in Notepad. To add the registry information it contains, it is necessary to right-click and choose Merge. 
 XP, Vista and 7 (level 3)

Do not be afraid to lose your password!

mdp

You have chosen a strong password to protect your user session, thats fine, but to avoid the risk of being blocked in case you forget, remember to create the utility will reset.Get yourself a USB stick and go to Control Panel, User Accounts menu Create reset disk. 
 Vista and 7 (level 1)

Block USB Storage Devices

When you connect a USB drive or your microphone, it is immediately usable. To prevent users from copying their key files from your disk or file their own, perhaps pox, disable detection of USB devices in the registry. Find the key HKEY_LOCAL_MACHINE, SYSTEM, CurrentControlSet, Services, USBSTOR. In the right pane, double-click Start. In the Value data field, replace 3 with 4 and click OK. Close the registry and restart the PC. USB devices are now ignored. To reactivate the detection, simply restore the original value. 
 XP, Vista and 7 (level 3)

Enable media streaming

upnp

If you have several networked computers or UPnP-compatible game console, you can turn your PC into a media server. Launch Windows Media Player (11 or 12) and go to menu Diffuser continuously and Enable media streaming. Name your library and confirm, if necessary, access various machines found on the network, and then click OK. Your files are now available WMP libraries on your local network. 
 Vista and 7 (level 2)

Adjust your accounts

comptes

The best way to avoid mess up your computer if it is shared with several members of the household is to create multiple accounts, press Win + R and type control userpasswordsto access account management. Keep the Administratoraccount for you and create standard accounts for people who do not have to touch the system settings. The Guestaccount can be useful if you want to allow visiting friends use your computer without having access to your data. 
 XP, Vista and 7 (level 1)

Disable UAC

UAC

Introduced with Vista, UAC notifies each manipulation may pose a risk to the computer. If you feel comfortable and you are only using your PC, you can disable this option or lower level. With Windows 7, Control Panel menu under System and Security Action Center, click Change settings of UAC. Vista Control Panel, Security Center and leftChange the way Security Center alerts me. 
 Vista and 7 (level 2)

Show file extensions

extensions

By default, file extensions are hidden in Windows. For safety reasons, it is prudent to make them reappear, you avoid accidentally clicking on malicious files disguised. For example, without an extension, a file called music.mp3 musique.mp3.exe appears harmless. To enable the display of extensions, press Win + R and type Control folders in the View tab, uncheck Hide extensions, and then clickApply. 
 XP, Vista and 7 (level 2)

Search malware

winmrt

Windows includes a tool for original detect and remove malware to launch press Win + R and type mrt, then pressEnter. If you have never used this tool, or not long in the window that appears, you should have link to download the latest version. 
 XP, Vista and 7 (level 1)

Convert a FAT partition to NTFS without losing data

More secure than FAT32, NTFS file system also has other advantages, such as managing partitions larger than 2 TB or support files larger than 4 GB If you still have formatted volumesFAT or FAT 32, you can easily convert it to NTFS by typing convert X: / fs: ntfs (replace X with the letter of the volume to be converted) into the Command Prompt (type cmd in theStart menu, then Enter ). Unlike formatting, this command does not delete the data on the disk. 
 Vista and 7 (level 2)

Keep writing to USB drives

You want to view the contents of USB storage devices, but you do not want that copy data from your computer above. Go into the registry HKEY_LOCAL_MACHINE, SYSTEM, CurrentControlSet, Control and create a new key (Edit menu) namedStorageDevicePolicies. In the right pane, create a DWORD value named WriteProtect 32 bits with a value of 1 and restart the computer. To overcome the limitation, delete the key or change its value to 0.

Control the use of PC

You can find the user profile Standard somewhat lax, you can use the parental control module in the management interface of user accounts (press Win + R and type control userpasswords) to define which applications or the time periods during which the user account has the right to connect to the session. 
 Vista and 7 (level 1)

And also ...

Monitor process (XP, Vistaet 7 / Level 3) 
Download Process Monitor utility (t.01net.com/tc36541), expand the archive and click Procmon.exe. The program runs without installation. It lists all processes in real time, allowing to identify any suspicious activity.
Erase all traces of your files (XP, Vista and 7 / Level 2) 
When you delete a file, it is not really deleted from the disk and can be recovered by some software.To be sure that your data is destroyed, type cmd in Start to start the Command Prompt and type cipher / w: x:  (where x is the letter of the volume to clean). The program will write on the empty spaces to overwrite the data, it may take a long time on a large disk.
Create a bootable volume to analyze your PC (XP, Vista and 7 / Level 1) 
Windows Defender Offline, available for free on our website , you can create a CD / DVD or USB flash drive on which you can start and scan your system in search of malware, trojans, rootkits and other sweets.
Reboot into Safe Mode (XP, Vista and 7 / Level 1) 
Safe Mode loads a minimal version of Windows that may be useful to perform some cleaning tasks, uninstall programs or remove recalcitrant files in normal mode, as used by processes not easy to identify. To access this mode, simply press the F8 key (or F5) at the beginning of the boot sequence of the PC.
Clear the input password (Vista and 7 / Level 1) 
A password secures your session, but if youre only using your PC you may have no desire to enter at startup. Windows that open the session without prompting you every time, press Win + R, type netplwiz and uncheck Users must always enter a name (...). Confirm with Apply.

Related Posts by Categories

0 komentar:

Posting Komentar

Catatan: Hanya anggota dari blog ini yang dapat mengirim komentar.

FOOTER