Defense Techniques for online information security law 13

Source: Internet
Author: User
The emergence of the Internet at the end of 1990s marks that human society has entered the information age. In this age, more and more people have begun to be unable to do without internet. However, in the existing Internet environment, there is no shortage of gentleman manners and trust. All the dangers, mean and speculation that can be found in society, and everything on the Internet. Since the birth of the Internet, especially since it was opened to the public in 1990s, it has become the target of the public. Especially when shopping on some e-commerce websites or registering as a member of some websites, we should pay special attention to protecting the security of our personal information on the Internet. This is because when we use a form to register and submit personal information, Program This information will be packaged and sent to the destination. During the transfer to the destination, a series of website transfers are required, of course, the transmitted information can easily be traced over the network. If these clues are unfortunately intercepted and exploited by some people with ulterior motives, the trouble is high-although this probability is relatively low, we should always be more careful when facing a network with no regulations, rules, and disorder. Next, I will provide some methods and measures to protect the security of online information for various users.
1. Do not easily run programs with unknown truth
If you receive an email with an attachment and the attachment is a file with the extension EXE, you must never rush to run it because it is a program with unknown truth, it may be a system that destroys the program. Attackers often email you the system damage program with a different name, with some spoofed theme. They lie to you and say, "This is a good thing. You must try it ", "Help me test the program" and so on. You must be vigilant! To treat these seemingly friendly and well-intentioned email attachments, what we should do is to immediately delete these unknown files.
2. Shielding cookies
Cookies are data files sent from Web servers to computers. They record user names, passwords, and information about user interests. In fact, it makes it easy for you to access the same site. For example, you do not need to enter a new password. However, the personal information collected by cookies may be used by some people who like to engage in "prank", which may cause security risks. Therefore, we can make some necessary settings in the browser, ask the browser to notify you before accepting cookies, or simply reject them. Generally, cookies are automatically deleted from the computer when the browser is closed. However, many cookies are normally stored on the hard disk to collect user-related information, in fact, these cookies are designed to reside on our computers. With the passage of time, cookie information may increase, and of course our mood is becoming increasingly insecure. To ensure that the cookie information is safe, the existing cookie information should be cleared from the hard disk immediately, and the cookie settings should be adjusted in the browser, so that the browser rejects the cookie information. To mask a cookie, click "Tools" in the menu bar and select "Internet Options" from the drop-down menu "; in the option setting box, select the "Security" tag and click the "Custom Level" button in the tag. In the "Security Settings" dialog box that appears, find the cookie settings, select "Disable" or "prompt ".
3. Use different passwords in different places
For users who frequently access the Internet, there may be many situations where passwords need to be set online. Many users use the same password wherever they are, but they have left a security risk without knowing it. Attackers usually use a password after cracking a user's password to try the user's desired password! Think about it. Someone uses a password to steal your account to access the Internet. Then they peek at and send your e-mail. Maybe they will use your identity to go To the chat room to damage your image; and ....., think about the serious consequences! Therefore, I strongly recommend that you use different passwords in different places. At the same time, you should write down the corresponding passwords for future reference. Another point is that when setting a password, we should not use words that can be found in the dictionary or personal birthdays. It is best to mix letters, symbols, and numbers with special characters, such as %, &, #, and $. The longer the value is, the better, to ensure that your password is difficult to guess.
4. Shielding ActiveX Controls
ActiveX controls can be embedded in HTML pages and downloaded to the browser for execution. This poses a certain security threat to the browser. Currently, there is evidence that inserting certain ActiveX controls in the browser of the client, such as IE, will directly cause unexpected security threats to the server. At the same time, some other technologies, such as the VB script language embedded in IE, use this language to generate executable client program modules, which are also the same as Java applets, this vulnerability may cause security vulnerabilities to clients. In addition, there are some new technologies, such as ASP (Active Serv er pages) technology, because users can add customer scripts, ActiveX controls and dynamic HTML for ASP output at will, therefore, there are also some security risks in ASP scripts. Therefore, to ensure that your information on the internet is absolutely secure, you can block ActiveX controls that may pose a threat to computer security. The procedure is as follows: first, click the "Tools" menu item in the menu bar and select "Internet Options" from the drop-down menu. Then, select the "Security" tab in the option settings box, click the "Custom Level" button in the tag. In the "Security Settings" dialog box that appears, find the settings for the ActiveX control and select "Disable" or "prompt ".
5. regularly clear cache, history, and contents in temporary folders
When browsing information on the Internet, the browser will save the information we browsed during the Internet access in the relevant settings of the browser, so that the next visit to the same information can quickly reach the destination, this improves our browsing efficiency. However, the browser cache, history, and contents in temporary folders keep too many of our online records. Once these records are obtained by boring people, they may find clues about personal information from these records. To ensure absolute security of personal information, we should regularly clear cache, history records, and contents in temporary folders. It is not difficult to clear the browser cache. The specific operation is as follows: first, click the "Tools" menu item in the menu bar and select "Internet Options" from the drop-down menu "; in the option setting box, select the "regular" tag and click the "delete file" button in the tag to delete the content in the temporary folder in the browser; then, in the same ELE. Me dialog box, click "Clear history" to delete the history records and cached content in the browser.
6. do not disclose any personal information at will
When browsing information on the Internet, users are often found to register their personal information forms. These sites use programming to achieve the goal of not getting the information they need without entering a form. In the face of this situation that forces users to register personal information, the best way is not to submit their actual information to them, especially not to disclose your password to anyone. In addition, when using network software such as ICQ and OICQ and registering free email information, we need to fill in some personal information. Some documents are required and cannot be skipped. However, you still have the right to remain silent for information that can be left blank but involves your own privacy. Otherwise, everything you say may be exploited by hackers on the Internet. This silence principle applies to chat rooms. it is wise to use a virtual network name before figuring out the chat room environment and various characters. You should pay attention to whether your IP address is displayed frequently, especially in some chat rooms. You must be careful! Attackers may attack you in this way to control you. Because the IP addresses of our dial-up users are dynamic, and the IP addresses you access each time are randomly allocated to you by the server, if you do not know your IP addresses, they will not be attacked.
7. Check the system information in a timely manner in case of an inexplicable fault
When I suddenly feel that my computer is not working properly, I feel like someone is remotely controlling you in a distant place. At this time, you must stop your work in time and immediately press CTRL + ALT + DEL to check whether the system is running any other programs. Once you find that some inexplicable programs are running, stop it immediately to avoid greater threats to the entire computer system. But not all programs run in the program list, some programs such as Back Orifice (a hacker's backdoor program) it is not displayed in the Process List of CTRL + ALT + DEL compound key, so if your computer is running Win98 or Win2000 operating system, it is best to run "attachments", "System Tools", "system information", double-click "software environment", and select "running task ", find a program that you are not familiar with or that you are not running in the task list. Once the program is found, terminate it immediately to prevent future troubles.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.