With the popularization of the Internet, there are more and more people accessing the internet, and many so-called hackers are also involved. Moreover, software for hackers can be downloaded everywhere, especially for individuals. Professional websites have their own specialized security agencies, and they only suffer from personal internet users. Therefore, the personal network security issue is raised again.
I have been on the Internet for several years, so I have some experience. Recently, I have summarized some points that should be paid attention to in personal anti-Black. For individual users, network security should include two aspects: system security and information security, as described below:
System Security
System security means that the user's operating system is not infringed. Currently, most netizens use Win9x operating systems. (Some people may say that I use WinMe. In fact, the kernel of WinMe and Win9x series are the same, at least from the security perspective ). Windows has always been famous for its many bugs. Its kernel is fragile and prone to crashes, that is, it is generally referred to as a crash. In addition, it provides limited network tools and poor security. In addition, Microsoft's consistent Product Style: software first, patch pressure. We can see the seriousness of system security issues.
There is an old saying in China: Know yourself, know yourself, and know what you want. First, you must know how others hacked you.
The following is a simulated attack recording.
(Black: attacker/dish: attacker/shrimp: Friend of the dish, network expert .)
Black: I saw a kid in the chat room today. He threw dirty water and made a comment. I couldn't take it easy and decided to give it a try. First, find out his IP address (note: the IP address is equivalent to your online address. You can only be found through IP addresses ). Well, now I can drive IP Hacker1.0 (Note: This tool can tell who has established a connection with myself) and so on. Haha.
(After a while .)
Black: Well, I found the address of that kid. Haha, let's die. (an atomic bomb has been thrown into food ).
Food: Why? It's strange.
Shrimp: You have been bombed, and your IP address has been exposed (Note: it is not difficult to look at others' IP addresses, but it is difficult to connect others to you if it is difficult, the common method is to use the above Code in a chat room that supports HTML syntax. First, use oicq to add you as a friend, and use a sniffer and directly query the user name list in the chat room, but the last two are not commonly used). If someone else knows your address, they can blow you up.
Food: how is this good. I must go to that chat room.
Shrimp: It's okay. Installing a skynet personal firewall can block his bomb attack.
(After a while, the hacker sees the food coming again)
Black: Hey hey, that kid is coming again. Look at my means (the atomic bomb is shot again ). Hey, why didn't I even kill him when I threw some of them? Does he or he have installed a firewall? Hum, I thought it would be okay if I installed the firewall. Look at me.
(Note: The Javascript has been disabled .)
Food: No, saving your life. Why can't you stop using so many windows? shrimp, come on. (Shrimp rushed up to take the food
The chat room window is closed, so the window will not be opened .)
Food: scared me to death. How can this problem be solved? I can't stand it.
Shrimp: You 've got someone else's chat room bomb. This bomb was written in Script language and targeted at browsers. There is no way to deal with such a bomb firewall. In the short term, it is to immediately close the window of the bomb. In the long term, it is to turn off the Script in the advanced tools/Internet Options.
(In order not to be fried, I chose the latter. After a while, I came back .)
Black: This guy is stubborn. Dare to come? This time let you go farther. So the hacker moved out of his magic weapon: browser bomb.
(This time the dish does not have any texture .)
Black: miserable. I cannot get rid of him. What should I do ..................
Food: Haha, I cannot do it this time. I am going to chat with MM.
(The computer level of food is not good. It is a good time to cheat the little girl. I will talk to a little girl in a short time .)
Black :( hey, you idiot, I am the little girl, haha .) How can I contact you? I miss you so much!
Food: good sister. Do you want to contact me? If you don't tell me, how can I know that you want to contact me? I won't say that you don't want to contact me. I want to contact you if you don't want to contact me. Well, let me tell you, my Oicq number is 10091073, and e-mail is a cainiao@sina.com. What about you?
Black: I don't know. I will tell you again next time in Oicq, OK? Okay, I am here to find you.
(The hacker sent a letter to his mailbox. The attachment in the middle is a flash animation, an executable file that has been compiled, and then binds the YAI server to the Flash Animation .)
(Note: YAI is a Trojan, a program that can control your machine at the remote end)
Black: I sent you a letter containing my favorite animation. You can see it.
Food: Good. Well, this animation looks really good. Sorry, how come my browser is closed? Ah, why can't I move my mouse? Ah, why is my desktop replaced. Ah, no. Don't delete my favorite images. Ah, wow, you are too bad. Shrimp, come and help me.
Shrimp: (run and shut down the cat.) You are a Trojan Horse. How many times have you said to you? Don't download things in disorder. That's true.
Food: What should I do now?
Shrimp: No way. Do you have The Cleaner? (Note: This is a software dedicated to trojan detection and removal. It can kill hundreds of Trojans.) If not, use Kingsoft drug overlord.
Food: Come on, and wait for me.
(After 10 minutes, the food goes to Oicq again .)
Black: this kid is coming again. It seems that the trojan is invalid. No way. Blow it with him first. (After a while, I got the IP address of the dish.) Hey, I still have some tricks. You are waiting.
(The hacker took out Oicq Bomber3.0, filled in the port number and IP address, and then pressed the transmit key. After a while, the dish went offline .)
Food: shrimp, come on, my QQ can't get on, so many people come to me (Note: This is a notable characteristic of being attacked by Oicq Bomber, it sends messages to other QQ randomly by imitating your port number and IP address. Once someone else responds and has more people, they will drop you in .)
(NARRATOR: This guy is really a hero .)
Shrimp: You are in the Oicq bomb, there is no way, I will give you a chopping machine ready, and then attacked you will use the chopping machine online cutting messages. If this is not the case, try again next time. The version 2000 may be better.
(After such a toss, the food was no longer interested in QQ, and he went back to the chat room .)
Black: Today I am tired, and the boy has no vulnerabilities. I will give him a permanent souvenir before leaving.
(The hacker wrote a letter to the dish and added an attachment to it. However, this time it is in HTML format and it is no longer an executable file. The story is not complete ......)
In the evening, the dish went to receive the letter and saw the "Little Girl". Originally, the dish was full of doubts, but there were several words written in it: I wrote my detailed information in the attachment. Let's take a look. The attachment is in HTML format, so you can safely open the attachment. There is a girl's constellation and Height Information, and the most fascinating thing is the girl's Sanwei. At this time, the food found a button in the middle of the file. The preceding instructions show that the girl's website can be reached as long as she clicks it, and there is everything about the girl on the website. Then he found that a dialog box pops up in the browser to show whether the ActiveX control will interact with the webpage and whether to continue. Then ......
Late at night, with the help of shrimp, the dish is re-installing software to the computer.
The story is over. If you are a dish, what should you do?
1. Do not fill the water in public, or abuse people. In short, it is better to converge on the Internet, so that it will not become an attack target.
2. You must install a firewall. Now, many people cannot distinguish between a virus firewall and a network firewall. They think that it will be okay if KV3000 is installed, but they do not know that it cannot defend against bombs.
3. Do not let others add you as friends easily, because this is the easiest way to get a person's IP address.
4. Try not to go to chat rooms that support HTML syntax. If you do, you must disable all scripts and ActiveX.
5. Do not leave your QQ number and email address to unfamiliar people.
6. You 'd better rename format. bat in c: windowscommand. Because a lot of code can call it.
7.if an attachment is included in the received email, and it is .exeor .bator .zip, you must scan it with anti-virus software. The virus database should be updated quickly.
8. Do not trust others easily. Many destructive experts are good at playing any role and often show up as girls.
At the above eight points, I think your system should be safe. This is what I call system security.
Information Security
I think no one would deny the importance of information. But Will your information be known? For example, would you like your dial-up account and your credit card account to be known by others? I don't think anyone will. The interests of hackers have now changed from attacking others' systems to stealing others' information, because information means wealth and is of vital interest to everyone. To some extent, information security is more important than system security.
We should know that we use a form to register and submit personal information. The program will package the information and send it to the destination. During the transfer to the destination, we need to go through a series of websites, of course, it is easy to trace the transmitted information on the network. If the information is used by some interested people, it will be very bad, this means that your information may be insecure. Although the probability is not too high, it is too late to cry once.
Now, I want to summarize some experiences and hope to help you a bit.
1. Do not run attachments in emails of unknown origins. Because the server may contain Trojans. Especially people in chat rooms and Oicq, such as saying, "This is a good thing. Please use it." or "this is my ......" Pay more attention to this. If you have to accept it, you must run the latest anti-virus software.
2. do not leave a Cookie whenever possible. A Cookie is a data file sent from a Web server to a computer. It records information such as the user name, password, and user interest. It has some benefits, for example, you do not need to enter a password when logging on to the website (in fact, the server reads the information from the c: Windows cookies on your host .), But there are also some bad points. First, some cookies are designed to always reside in the computer to collect personal data, so that your information will be taken away by the website, and a better one will send an advertisement to your mailbox, if you encounter bad intentions, you have to identify yourself as unlucky. Therefore, I suggest you disable the Cookie. How can this problem be solved? You can find "security" in Internet Options of IE and select "Custom.
3. Be sure to pay attention to password security. Do not use a password that can be easily guessed, such as a birthday, phone number, name, common words, or a number less than 8 digits as a password. This is because it is easy to be cracked by enumeration. The best password is more than 8 characters. It is case-insensitive and mixed with numbers and special characters, which makes it difficult to crack. It is best to use different user names and password names on different systems.
4. Disable ActiveX control because it has been confirmed unsafe. There are also some Javascript and Java applets. If you don't want them, try to avoid them. Security first.
5. Regularly Delete cached files.