On the Internet to protect themselves from self-reliance on these 9 articles

Source: Internet
Author: User
Tags strong password

If the smartphone does not have Internet access, what is the essential difference between a spicy chicken and a hot chick? Let us these " bow tribe " How to obtain news information, listen to the music to watch the video, play the game? But operators are so keyed up that every month the flow is so point. If you want to play, free Wi- fi is available! But for so many years of reality education we said: " the sky will not only drop pies, but also drop bricks."

Today to teach you how to ensure that your Internet security

1, refused to contact with the source of the Wi-Fi connection, most hackers use is the user want to free the internet to take advantage of the psychological, be cautious to use free and no password to the Wi-Fi. Many businesses have a place to provide free internet, but we also want to stay simpleton, must ask the detailed name, avoid being injected " Starbucks 1" and other fake Wi-fi spoofing;

2, use mobile phone login Online banking and online shopping must be cautious, in order to fund the security is not bad that point of traffic, with 3/4g Online mode to do it!

3. Turn off the " Choose Automatic connection " option in thephone settings Project , because if this feature is turned on, the phone will automatically scan the area where Wi-Fi is available and connect to a network that does not require a password. Will greatly increase the chance of mistakenly connecting " phishing Wi-Fi" .

4, refuse to use the "Wi-Fi Universal key " and other Wi-Fi connection, password Acquisition tool, because they are based on the principle of data upload and sharing, you or others connected to the Wi- fi Information to share, if someone has been connected to " fishing Wi-Fi" or " Trojan Wi-Fi", it happens that you are also in the vicinity, that congratulations, you also recruit!

want your own router will not become someone else's " Trojan Wi-Fi"to do the following points:

5, strong password is the most important cornerstone of Wi-Fi security. The so-called strong password, refers to the combination of uppercase and lowercase letters, numbers and symbols of more than 8-digit complex password, such as Gt/[email protected]. As long as WPA/WPA2 encryption is used for Wi-Fi, and strong passwords are set, it is almost impossible to compromise.

6, hide your SSID, refers to the router management interface for the relevant settings, so that the SSID of the wireless network is no longer broadcast, become an " Invisible Network ", This can also greatly reduce the probability of hacking attacks.

7. Turn off the QSSandWDS functionsof the wireless router and open the Guest Network for others to use. First QSS,WDS features It greatly reduces the security of the wireless router, so if not necessary, should be turned off these two functions, and the Guest network as long as the function is limited, can effectively protect the security of the router.

8, the common network device for MAC binding. mac bindings are settings that are related to the router and turn on the Mac address blacklist or whitelist feature. Of course, this is the recommended way to use the whitelist. The user simply adds the physical address (MAC address) of the device that needs to connect to the network to the whitelist list, and only these added devices can connect to the wireless network.

9,In addition, should also start from the source, do not purchase a known vulnerability to the router products. If the router is used for a long time, update the latest firmware version. If not high-play, try not to brush the third-party firmware. As for the background management password, take paper pen write down can think of the most troublesome password and change the router management interface landing address, to ensure foolproof!

users should also install personal firewall software to prevent black Due to the development of the network, the user computer is facing more and more serious hacker attacks, many network viruses have adopted a hacker method to attack the user's computer, therefore, users should also have a Software Management , set the security level to medium and high so that the hacker attacks on the network can be effectively prevented.


On the Internet to protect themselves from self-reliance on these 9 articles

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.