What problems should you pay attention to when using others ' computers?

Source: Internet
Author: User

1, the time of the machine must delete the file

When you leave your computer, you need to delete the files you created, such as downloading attachments, opening the temporary documents you created, and so on.

2, if not shut down the cache to clean up.

When you leave someone else's computer, remember to put the cache, including your browsing history, online also has a lot of cleaning software to use, empty the most recent document cache, especially if you use the creation of the document on the computer, even if deleted, if not immediately restart the machine, the back of the next comer can almost 100% can restore these content.

3, also remember to empty the Recycle Bin

This is important if emptying is equivalent to not being deleted. Any removal and cleanup, the Recycle Bin will be emptied.

4, to know the current state of other people's computers

When you sit in front of someone else's computer, it is best to check the current state of the computer, if it is running computer, it is recommended to restart the machine, adhere to the use also need to check the running of the program, whether is running video, recording equipment, you may be doing things, every move is recorded by others, If you don't use a webcam, it's best to turn the camera and microphone aside. This may be a bit of a hassle, but it should be done for safety.

Whether there is a keylogger software, this is a hacker stealing important information, a way, the keyboard recording software design is not a complete record, can be designed to trigger certain conditions will be recorded, such as open the browser or encountered some keywords, such as user name and password control. The method of checking this kind of software can be carried out through the anti-virus software rule or other malicious software detection program, because this kind of monitoring software mostly uses the hook form, almost all anti-virus software will eject the warning when installs, these rules most likely can appear in the anti-virus software and the firewall rule.

Although many internet cafes are using the freezing point restore or shadow system, after the restart will be reset system, but not all, or attention for the wonderful. After the reboot or to check whether the system tray icon is not aware of the system program, to see if the task Manager there is a suspicious process.

5, check the malicious monitoring software and peripherals

Many of the levels of malware are run in the background, but to send this information out is through the network or the external device on the computer, so you also need to check the computer peripherals are suspicious storage devices, such as some you think suspicious of storage devices or connections, These devices are likely to be stolen by a background program installed on the computer. If it is through the network to send out, certainly also need to pass the firewall rules, so if you use other people's computer is a bare metal, or cautious use for good.

6, pay attention to the people next to

Other people's computers are definitely in public places, so it's inevitable that someone will come over and be aware of the malicious people wandering around you, but also some places may be in your top or near the presence of cameras, such as the hotel's bedside table and the top of the chandelier location is a good hiding place, the camera can record your every move, Including the keyboard operation process, if there is a camera, you can rotate the display angle to solve.

7. Be careful with net silver and online shopping

has not recommended the use of online banking and online shopping on other people's computers, as far as possible to leave these things to go home to do, the absolute network of silver encryption plug-ins for hacker software, almost a fake. Determined to use, be sure to remember the real network address, phishing and interception has always been so dry, you may enter the net silver address will automatically jump to a completely "exactly the same" page, and then enter the account and password, and then will win the bid.

8. Do not remember login and save settings for others ' computers

On the common computer, any login behavior should not choose to record login information and save settings, whether it is e-mail, game client or other, many e-mail address or login client, the default will choose to remember the status of login, must be canceled.

9, suspicious input personal information tips

If you do not have any account, password operation, such as the discovery of pop-up warning, please enter XXX to continue xxx, then need to strictly confirm whether this pop-up window is malicious, do not easily enter personal name, account password and ID information.

10. I pay attention to myself

If you are a seasoned user, although you may not find a confirmed malicious program, but if the use of the process, there are some suspicious phenomenon, we must pay attention to, such as hard drive, computer card, screen suddenly flashing, firewall pop-up inexplicable warning, etc., this time need to pay attention, if you think suspicious, It is better to leave now and change the machine, and believe that your intuition is more important than any other suggestions.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.