Defense skills from Bin Laden's computer security issues

Source: Internet
Author: User

 

Www.2cto.com: in fact, this is a rising advertisement, but the content is indeed worthy of reference. Let's take a look.

Recently, the terrorist tycoon bin Laden was killed by the US military commandid and his personal computer was also seized. The news reported: "terrorists will be as hasty as ordinary people when using computers, for example, use a password that is easy to guess, do not encrypt sensitive files, and put unencrypted documents directly in folders that are easy to find." Bin Laden's computer still has so many security problems. How can we protect passwords, private files, and other information on computers for common Internet users?

 

According to security experts, according to current media reports, Bin Laden's computer has the following security problems:

 

1. Use a password that is easy to guess. Most users will not enable the "account and password" function in the system. Even if it is enabled, it will use a weak digital password, which is easily cracked by hackers. After this problem exists, hackers can easily remotely control the computer and use the computer as a springboard to attack others. The corresponding countermeasure is: In "Control Panel"-"User Account", open an account and use a complex password mixed with numbers, letters, and special characters. The length should be at least 10 characters.

 

2. Do not encrypt sensitive files. Chat tools, mailboxes, forums, online banking ...... Each application involves a large number of accounts and passwords. Due to the tedious memory, many netizens prefer to record account passwords for different purposes in one document for query purposes. Once stolen by others or hackers, it will pose a huge threat to your normal life, work, and personal property.

 

Corresponding solution: Add confidential information to the "rising encrypted disk. The "rising encryption disk" is designed to store users' important files. It can open up an independent private space on the computer. Without a specific password, the private files, important materials, and other contents cannot be extracted. Even if the computer is poisoned, the hard disk is lost, or even the whole disk is copied, the data in the encrypted disk will not be leaked. (: Http://www.rising.com.cn/2011/gelivable/index.html)

 

In addition to the security issues reported above, many individual commercial users with important information, there are also problems such as "improper use of SNS websites", "no protection for password theft", "accidental deletion of files, and data loss:

 

Accidental deletion and reinstallation lead to loss of important files. Many users are used to storing important files on drive C, desktop, or my documents, which are easily deleted by mistake due to unclear file categories. At the same time, it is easy to cause loss of important data during reinstallation. You can use the rising encrypted disk to classify personal folders and manage important information on your computer.

 

Lack of protection against custom Trojan viruses. To combat the technical strength of the United States in terms of the network, Bin Laden did not use computers, mobile phones, or even enable the messenger to manually transmit messages, this is mainly to deal with customized Trojans specially written.

 

At present, many senior hackers have specially designed Trojan viruses for some valuable targets. Before these viruses spread into users' computers, most of them have avoided all kinds of popular anti-virus software on the market, in this way, the computer protection fails. Previously, the "super factory" virus compiled for the Iran nuclear power plant and the time when the "commercial Trojan" came out in Israel all proved the great harm of such Trojans.

 

To address such problems, Rising's "smart active defense" function is independent of the previous anti-virus software's reliance on the virus database. Users can block and kill the trojan virus without upgrading, thus fully protecting computer security. At the same time, users can also set the active defense function in the anti-virus software based on actual needs, and limit and monitor access to sensitive software in real time. Once the virus is discovered, you can take corresponding preventive measures.

 

Improper use of social networking (SNS) websites: a report released by rising said: After analyzing and researching hundreds of social networking websites in China, these websites put "commercial interests" before "Security Principles" from the beginning of their design. They induce users to fill in their real information and use the recorded MSN account password and email password, the email contacts and MSN friends of registered users are frequently harassed. The "disclaimer" of website registration is used to exempt them from legal liability and allow users to take full responsibility for security risks. They use various commercial means to prevent users from being prevented.

 

During information filling and daily network communication, users often inadvertently reveal a large amount of personal information containing numbers, such as birthdays, mobile phones, and anniversaries. Once these figures are mastered by hackers, they will greatly improve their individual account cracking success rate, so as to carry out targeted phishing attacks and steal users' and enterprises' confidential files and account properties by taking the opportunity.

 

In addition to the above problems, some hackers may also target specific targets. These infiltration often exceeds the protection scope of anti-virus software in the past, causing more serious harm, for example, system paralysis and confidential leakage. You can use the rising firewall to query detailed network log records to monitor abnormal behaviors on your computer and find the source of malicious attacks.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.