Do not use a simple password. Don't use the same one or two passwords on multiple sites, although that's easier to remember. Do not use words, to mix letters and numbers, the length of the password is at least 6 characters long. Do not use a birthday, child or pet name, or a simple sort like XYZ123 to make a password.
Keep track of your ID and password so you don't forget it, but don't write it down on your PC. Do not save the password for the convenience of the next landing. Also, change your password frequently.
2. Caching
Do not keep the browser cache. By storing pictures in the hard disk cache, browsers can improve the speed of browsing the web. Of course, anyone who enters your computer can know which sites you have visited. Therefore, I suggest that you often empty the browser cache.
To empty the cache of Internet Explorer 5, select the Tools->internet option. In the General tab, click the Delete File button in the Temporary Internet Files section. In Netscape 4 or later, select the edit-> parameter. In the directory tree, double-click Advanced and select Cache. Here, click "Clear Memory Cache" and select "Confirm". Then, click the "Clear Disk Cache" button and select "Confirm".
3. File sharing
Prohibit file sharing. You don't need to set up your computer for file and print sharing. If you set up a share, you leave a backdoor for the hackers who have access to your computer to peek at your files, and even to do some minor damage.
To prevent file sharing, follow these steps: In Windows 9x, select Start-> Control Panel, double-click the Network icon, and then select the Configure tab. If the "Allow other users to access my files" and "Allow other computers to use my printer" check boxes are selected, deselect.
4. History
Do not keep historical records. The browser makes a history of every site you visit. If you are using a public computer, you'd better delete the history records regularly. To clear the history in IE5, select the tool->internet option.
In the General tab, click the "Purge History" button. In Netscape 4 or later, select the edit-> parameter and click "Purge History" in the directory window.
5. Managing Cookies
Do not accept cookies from dubious origins. Useful cookies can recognize you when you return a visit. But some cookies will track your Internet hobby and send it over the Internet. In Win 98, the IE4 or higher version stores cookies in the Windows\Cookies directory. In Win 2000, the directory where cookies are stored is the documents and Settings\....\local Settings\Temporary Internet files\.
You can select a file first, then press CTRL-A to select all the files, and finally press DELETE. Netscape 4 or higher releases cookies in cookies.txt files. All you have to do is find the file and delete it and its subdirectories. But you may also accept cookies, so I suggest you use some cookies management software, such as Cookiewall and Cookiejar.
6. Do not make unnecessary chat.
Try not to chat with strangers without a firewall. When you talk to people you know, you might think it's safe. But in fact, there may be hackers or websites that will collect your email address.
The best way to do this is to not run some instant messaging programs in the background. If you use these software, it is best to turn it off or set up a hidden user. For example, in AOL Instant Messenger, select my Aim->edit options->edit preferences->privacy. In MSN Messenger, select the tool-> option-> parameters, and then deselect the top three options.
7. Internet access on an anonymous basis
It is recommended that you use the Internet anonymously to avoid revealing your personal data. If you want to hide your ID when surfing, you can use the anonymous service provided online. Most Online services work the same way: you first log on to their site and then visit the site you are going to.
In this way, you can hide your actual IP address and use them instead. I use the website is safeweb.com.
8. Firewall
Do not surf without a firewall. If you are using a broadband connection, such as DSL or fiber optics, you will be connected to the Internet at all times. In this way, you are likely to be the target of those who are playing the hacker. The new high-speed modem has a shutdown feature that does not damage its internal parts, and the modem is more secure. You'd better put a firewall on your computer--an anti-intrusion program--as the doorman of your computer.
9. Tables and JavaScript
Do not disclose your information without the necessary circumstances. The more personal information you provide, the less privacy you can keep. When you register, fill in the minimum personal information as possible. Do not fill in the optional columns. Do not save credit card numbers for future convenience. If a website allows you to save your password for later visits, I recommend that you do not save it.
10. Protect your Email
Encrypt your email. Do you think your email is a high degree of confidentiality? Think about it, a system administrator, a hacker, or anyone else who can access your mailbox can see your email. For those confidential communications, the best protection is encryption. Only you and the recipient can decrypt it. There are many easy to use encryption procedures on the Internet, may wish to try.
11. Encrypt your network
The Internet tools that we usually use on workstations and servers are not secure. Unless your password is very strict encryption, do not use Telnet, POP, FTP and other programs. Authentication in plain text format is not secure, and hackers can easily intercept your password by capturing the tool.
SSH is a good substitute for telnet, and it can also replace FTP. In addition, sensitive information should never be sent by email. Also note that both the client and server-side encryption requirements support the encryption method used.
12. Don't trust people too easily.
Don't slumber the software you downloaded from the Internet. Do not install software that is downloaded from an unknown website. Some programs may be Trojans, and if you install these programs, they will change your system or connect to a remote server without your knowledge.
In this way, hackers can easily access your computer. Now, there are a number of sites that have checks to check whether a program is secure before you install it. I'm not making you distrust anything from the internet, but even large websites can be compromised by hackers.
13. Upgrade your system on a regular basis
You should upgrade your system on a regular basis. Many common programs and the kernel of the operating system often find vulnerabilities. Some vulnerabilities can make it easy for intruders to get into your system. These vulnerabilities will quickly spread through hackers.
Therefore, you need to be careful about precautions. The software developer will release the nails so that users can remedy the vulnerabilities. I suggest you subscribe to a mailing list of these vulnerabilities so that you can even know the vulnerabilities.
14. Disconnect when you don't need it, preferably when you don't need it. For servers, if you often keep a connection, turn off the deamon that are rarely used.
In the newly installed operating system, Deamon is run according to the default settings, which makes the system vulnerable to attack. Closing some deamon does not affect the services of most hosts.
15. When buying a second-hand computer, check to make sure that you do not purchase or use a computer that has been invaded but has not yet cleaned up the hard disk. Because this is likely to provide hackers with the opportunity to invade your computer. It is best to reformat the hard disk and reload the operating system.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.