How do you prevent social engineering attacks?

Source: Internet
Author: User

The power and charm of social engineering cannot be imagined. If RP is good, the consequences will be unimaginable.
The program is stable and vulnerable. If one day you find someone trying to understand your information.
Pay attention to the following points:


All of the following is based on communication with people you are not very familiar with (except for the first point)


1. First, remember this sentence: never admit that you are a hacker or a master, because this title has to pay a price.

 

2. After receiving a strange call, be sure to know what the other party has and then tell him or her about your current geographical location.
  
3. Never try to solve a problem by text message or QQ. The other party may be worried about it. We are no stranger to phone number address query and qq ip address query.

 

4. When someone asks you what technical forum you have, you can recommend it, but do not tell others which forum you often use.

 

5. If the other party asks for remote assistance, it is best to use a proxy. If the other party agrees to use remote control, remember to uninstall it after the assistance is completed.

 

6. Learn to be a conservative person. Remember to tell each other before the project starts (for example, kill-free): "I may not be able to solve the problem eventually. Do I have to continue ?".

 

7. Be prepared to be counted by others, because angry or emotional people tend to lose their senses and make wrong judgments, thus disclosing your information.

 

8. If a person says that his memory is 200 GB in a technical forum or QQ group, you should never correct it as a hard disk.

 

9. A person who does not know what the signature is, generally does not know what the Assembly is going on, and does not have to explain anything. Just remove the Assembly as required, this will not affect your work.

 

10. You can tell the other party what to use to kill software, but you must tell the other party that you have not killed any software installation packages. Otherwise, the software you install will be the worst, it is also the most problematic.

 

11. Do not transmit any files to each other if possible, because your files may be accused of being virus.

 

12. Last sentence: do not be afraid of criticism because you cannot escape.

 

Note: It is impossible to suddenly see any beautiful mm on the network, and it is impossible to fall down next sister lin in the sky. Everyone should always be vigilant and pay attention to network security.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.