The rapid development of the network has prompted the information age to network as the core has undergone profound changes, many people roaming in the network of virtual world, and did not realize that someone is watching your every move. The Netizen through OICQ and you one side chats intimately, while spying on the personal data on your hard drive, he "shares" your computer as if it were your own, and your file may be in his pocket at any time, and the hard drive may inadvertently be formatted. Maybe it's just that when you're trying to hide your identity, he's already giggling. In the eyes of hackers who have hacked into other people's computer systems, your computer is transparent to him.
Keep in mind: Hackers unscrupulous attacks everywhere, network security for individual users is not a distant topic. When you surf the internet, download software from the Internet to receive mail at any time it is possible to get viruses and Trojans mixed in. There are threats whenever you shop online, use a credit card to pay online, buy or sell shares, or transfer money through an online bank. The result of these malicious attacks is that the Internet account is stolen, bank accounts are stolen, passwords are modified, and even the entire system is paralyzed. In fact, want to remotely get your hard drive content does not need people imagine the acme of technology, as long as the use of some hacker tools is enough, because many intelligent hacker tools in more than 200,000 hacker Web site can easily download.
A new generation of hackers not only attack others themselves, but also write a variety of hacker tools on the Internet for people to download free of charge. At the same time, the hacker tool version of the upgrade was unexpected faster. For example, experts have just issued a warning: to create a raging "Kournikova virus" subseven hacker Tool software version 2.0 has been published, only a few hours, and then found an updated version of the upgrade was born. Now the hacker tool is becoming more and more powerful, it is easier to use this tool to generate intelligence breakthrough computer network defense hacker software.
Earlier this year, a well-known Internet security company held a "1000 sad reasons"-Internet insecurity factors Questionnaire survey. Statistically, among the many troubling Internet insecurity listed in the questionnaire, the most concern is (according to the number of votes) ranked third: online shopping, I am afraid that I provide to the website of personal information will be illegally used; four: When surfing the internet, my computer resources will not be exposed The Internet chat when the IP address is stolen; Sixth, some programs are automatically downloaded to my computer when visiting certain websites, and eighth: How to avoid harmful cookies; Nineth: It is safe to visit a strange web site. From the above survey, information security has attracted more and more attention, personal privacy rights more and more attention. It is reported that the protection of personal privacy has been listed as the first of the eight ethical problems facing the network economy.
In addition, an average of about 30% per cent of PCs have been viciously attacked, according to an international statistic, which is higher in the more developed countries and less in China, but the figure is on the rise as the number of Internet and Internet computers in China increases. The early focus of the Internet germination on development, today, derived from the network security problem is that every netizen must face, can not avoid the new problems. We must take active measures to defend our wonderful online life. There are a variety of ways to reduce the time spent on the internet, to feel the attack immediately forcibly disconnected, to increase vigilance and so on, of course, the safest way is to choose a suitable and personal user's firewall.