How Should Internet users protect their privacy and Internet users protect their privacy?

Source: Internet
Author: User
Tags imap mozilla thunderbird

How Should Internet users protect their privacy and Internet users protect their privacy?
The arrival of the Internet era has fundamentally changed people's way of life and ways of survival, bringing great convenience to people's production and life. HoweverSentenceIt has two sides. While reflecting the huge advantages and potential of the Internet era, it also brings unprecedented severe challenges to people's privacy and power, illegal collection, sorting, analysis, and dissemination of personal privacy in the network environment are much easier than ever before. With the rapid and brutal development of the Internet in China, various Internet companies in China are often eager for immediate success and use various means to obtain the privacy of Internet users. Some websites are unable to guarantee the security of collected data due to their limited technical capabilities, as a result, security incidents such as CSDN leaks and 12306 user data leaks are constantly happening, resulting in almost no privacy on the Chinese Internet.


Due to the interaction of the network, once the network privacy right is infringed, the cost is huge, and the consequences of the infringement are far greater than those of the traditional privacy right. Therefore, privacy has become more important, and the protection of network privacy has become one of the biggest challenges brought by the Internet. Strengthening the protection of personal privacy in the network environment has become a top priority. How do ordinary netizens protect their privacy from being leaked?SentenceThe main points are listed:


How Should netizens protect their privacy?


1. Operating System Security:


First of all, we must ensure the security of the computer operating system, install Important and Urgent patches, and the operating system now has the automatic patch update function, so that the system can be updated frequently to ensure security. If the security of the operating system is not guaranteed, hackers or Trojans can easily obtain various user privacy information through system vulnerabilities. For Windows systems, it is recommended that users in the Power User or User group be used for routine logon to avoid using the Administrators group. In this way, the harm caused by trojans on the computer is controllable.


2. Mobile phone security:


In terms of security, iPhone without jailbreak is the most secure among common mobile phones. To use the iPhone, you need to enable the "fingerprint unlock" function and "find my iPhone" function, it also ensures the security of the Apple ID password and uses a unique and unique security password. If the mobile phone is lost, log on to the iCloud website immediately and enable "Lost mode" for the device in "find my iPhone ", in this way, no one else can use your mobile phone in any way (even if you do not brush your phone), and then call the carrier to report the loss of the SIM card. In case of an emergency, you can remotely erase the phone information on the iCloud website.


3. Software Security:


Do not use software that is suspected to have a risk of privacy leakage. Do not enter personal privacy information in software developed by small companies. The selection of common software is also very important. Some of my suggestions are as follows: browser: Chrome, input method: Google input method, Bing input method, or little wolf input method, email: Gmail or Hotmail, mail client: mozilla Thunderbird, password management: Lastpass, 1 password or KeePass, cloud Synchronization Network Disk: Dropbox or OneDrive, instant messaging software: Google ring chat or Skype, do not use QQ if possible, we cannot discuss any privacy or sensitive topics above. All in all, stay away from domestic software.


4. Two-step verification:


If the software used has a two-step verification function, in theory, all sensitive accounts should try to enable two-step verification, while the mobile APP application instead of text messages to generate a one-time random password. Currently, the main software supporting two-step verification includes: Google (Gmail), Hotmail, Dropbox, Amazon, Lastpass, Apple, Facebook, Twitter, Evernote, Github, WordPress, Linode, etc, when using the above software and services, we should try to enable the two-step verification function as much as possible. In this way, even if hackers obtain the user's password through other means, because there is no random phone password, therefore, you still cannot log on to your account.


5. Search engine:


Before using Google and Baidu for search, open a stealth window in the browser and search Baidu in the stealth window. If not, you do not have to log on to the search engine.


6. Security software:


Use security software outside China. The following items are available for anti-virus software:SentenceLittle red umbrella, AVG, Avast, Comodo, etc.


7. Email


In terms of user experience, the Web version has the best Gmail experience. By modifying the Google Hosts file, you can also access the Web version of Gmail. However, because the Web version of Gmail is blocked, therefore, in terms of stability, it is more stable to use client mail software to send and receive Gmail. We recommend using Mozilla Thunderbird to modify IMAP Hosts and then access Gmail through IMAP, you 'd better download an extension named Keyconfig () to customize the shortcut key, which is the same as Gmail.


8. Browser


We recommend that you use Chrome or Firefox to enable the DNT (Do Not Track) function. For example, in Chrome settings-Advanced Settings-Send "do not track" requests along with browsing traffic, regularly clear previous browsing history records, and browse sensitive information in "stealth mode. If you have multiple network identities, we recommend that you install multiple browsers. One Network identity uses one browser.


9. surfing the internet


Do not enter personal details, such as real names and ID card numbers, on any website. Some public proxy servers or VPN services will be used to publish sensitive Website access or sensitive information, be sure to use the proxy server. Do not expose your real IP address. Theoretically, IP addresses in China may be traced to people, unless the time interval is long.


10. VPN


VPN (Virtual Private Network) is a simple solution for hidden IP addresses to use network services.SentenceThe communication data between the VPN Server and the client is encrypted, and the data is transmitted securely on a dedicated data link, the privacy of users accessing the Internet will be protected to a great extent.


11. virtual machines


Virtual machines are intended for users who have very high privacy and security requirements. They usually use virtual machines to access the Internet. Each time they use a blank new virtual machine, they will be deleted after exiting. It is safer to access the Internet by dialing a VPN from a virtual machine.


Although the infringement of personal privacy is related to the development of technology, attitudes towards privacy can also contribute to the increaseSentenceFunction. The survey shows that people pay more and more attention to the protection of privacy. However, the excessive dependence and widespread use of online sentences in the information society make people increasingly aware of their or others' privacy rights, many people think that the collection of personal information on the Internet will not have an important impact on their privacy. Therefore, improving personal awareness of protection is the key to protecting the privacy of the network. Only by setting up the awareness of "preventing people" Can the personal privacy of the network be well protected.

This article is reproduced in: Sentence life http://zaojuzi.blog.ifeng.com

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.