Security Miscellaneous-computer security rules for preventing attacks

Source: Internet
Author: User
Tags microsoft mail

In this network age, everyone can easily obtain various simple and easy-to-use hacking tools from the network. As a result, many "hackers" were born. Most of these people are idle online worms, which are inherently destructive. As a result, they are bored and want to show off their skills in the vast network with a variety of "bombs" and other things found on the Internet. When you surf the Internet or chat with others, the machine suddenly crashes or has a blue screen, the web page cannot be viewed, And the QQ login fails, now you should think about whether you are poisoned or hacked. What security rules should we follow when using computers to prevent personal computers from being attacked by hackers?

Password Security Guidelines

Do not use a simple password. Do not simply use a birthday, word, or phone number as a password. The password must be at least 8 characters long and contain a mix of numbers, letters, and other characters on the keyboard. Different passwords must be used for different websites and programs to prevent hackers from deciphering them. Record your ID and password so that you do not forget it, but do not store the record in your computer. Do not save the password for the next login convenience; also, change the password frequently and do not disclose your password to anyone.

Email Security Guidelines

Do not open attachments in emails easily, or run programs in attachments unless you know the source of the information. Keep vigilance at all times. Do not trust the E-mail sent by acquaintances without hacker programs. For example, Happy99 will be automatically added to the E-mail attachment. Do not post or leave your email address on the Internet at will. Apply for a mailbox at the transfer site because it is not afraid of bombing. Restrict email size and filter spam in the E-mail client; use remote logon to preview emails; it is best to apply for a digital signature; you can use anti-virus software and professional Trojan removal tools to scan attachments.

IE Security Guidelines

Internet users using public machines must pay attention to the security of IE. Because the auto-completion function of IE brings convenience to users while entering forms and Web addresses, it also brings potential leakage risks to users. It is best to disable the auto-completion function of IE. The IE history records store links to all pages that the user has accessed. before leaving, you must clear the history records. In addition, the temporary IE folder (WindowsTemporary Internet Files) saves the web pages that you have browsed, and allows other third-party offline browsing software through the offline browsing feature of IE. Other users can easily read the content you have browsed, therefore, you must delete the files in this path before leaving. You also need to use a security program that has control over the Cookie program, because the Cookie program will send the information back to the website. Of course, you can install the personal firewall to disable, prompt, or enable the use of cookies.

Security Guidelines for chat software

When using chat software, it is best to set it to hide users, so that you do not have to use some special software to view your IP address, and then use some hacker tools for IP addresses to attack you. In the chat room, we also need to prevent Java bombs. attackers usually send HTML statements with malicious code to enable your computer to open countless windows or display giant images, leading to a crash. You only need to disable the running of Java scripts and the function of displaying images to avoid attacks. However, you cannot access some interactive web pages. This requires your personal balance.

Protection Against Trojan Horse security rules

Do not trust others too easily. Do not install or run software that is downloaded from unknown websites, especially unreliable FTP sites. Some programs may be Trojans. If you install these programs, they will change your system or connect to a remote server without your knowledge. In this way, hackers can easily access your computer. The author does not trust anything from the Internet, because even a large website may be damaged by hackers. In addition, if you are buying a second-hand computer, do not buy or use a second-hand computer that has been infiltrated but has not been cleaned up. This may provide hackers with the opportunity to intrude into your computer. It is best to reformat the hard disk and reinstall the operating system.

Regularly upgrade your system

Many common programs and operating system kernels will discover vulnerabilities. Some vulnerabilities will make it easy for intruders to access your system. These vulnerabilities will spread quickly among hackers. For example, the nemda virus, which has been widely spread recently, is a virus that has a strong propagation capability compiled against Microsoft Mail browser vulnerabilities and Windows NT/2000 and IIS vulnerabilities. Therefore, the user must be careful. Software developers publish patches to help users remedy these vulnerabilities. We recommend that you subscribe to the list of emails about these vulnerabilities so that you can patch them in time to prevent hacker attacks. Of course, it is best to use the latest version of browser software, email software and other programs, but not the test version.

Install firewall

Do not surf the Internet without a firewall. If you are using a broadband connection, such as ADSL or optical fiber, you will be connected to the Internet at any time. In this way, you are likely to be the target of hackers who are playing games. It is best to disconnect when you don't need it. For example, you can install a hacker-proof firewall on your computer-an anti-intrusion program as the guard of your computer, to monitor data flow or disconnect the network. For example, the rising anti-virus firewall can provide both anti-virus and anti-Black functions and is trustworthy.

Disable file sharing

Users in the LAN like to share their computers as files to facilitate mutual Resource Sharing. However, if you share these computers, they leave a backdoor for those hackers, in this way, they can access your computer to peek at your files and even make some small damages. It is recommended that you set a password for the shared folder without sharing. Otherwise, the public and your opponents will be able to access your shared files freely.

If you follow these rules when surfing the Internet, you can ensure the security of your PC to a certain extent and avoid hacker attacks.
This article from: Hongke network security official Network Security Forum http://bbs.honkwin.com

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.