Personal Computer anti-Black 15 basic methods

Source: Internet
Author: User

The following are 15 tips for safe surfing on the Internet:

1. Password

Do not use a simple password. Do not use the same one or two passwords on multiple websites, though this is easy to remember. Do not use words. Use letters and numbers in combination. The password must contain at least six characters in length. Do not use the name of your birthday, child or pet, or simply sort the password like XYZ123.

Record your ID and password so that you do not forget it, but do not remember it on the PC. Do not save the password for next login convenience. Also, change the password frequently.

2. Cache

Do not retain the browser cache. By storing images in the hard disk cache, the browser can speed up Web browsing. Of course, anyone who enters your computer can know which websites you have visited. Therefore, we recommend that you clear the browser cache frequently.

To clear the cache of Internet Explorer 5, select Tools> Internet. In the "General" tab, click "delete file" in the temporary files section of the Internet. In Netscape 4 or later, select Edit> parameter. In the directory tree, double-click "advanced" and select "cache ". Click "clear memory cache" and select "OK ". Then, click "Clear disk cache" and select "OK ".

3. File Sharing

File Sharing is prohibited. You do not need to set your computer to file and print and share. If you set up sharing, you will leave a backdoor for those hackers who can access your computer to peek at your files, or even make some minor damages.

To disable file sharing, follow these steps: in Windows 9x, choose Start> control panel, double-click the "network" icon, and select the "configuration" tab. If the check boxes "allow other users to access my files" and "allow other computers to use my printer" are selected, deselect.

4. History

Do not keep history records. The browser records the history of each website you visit. If you are using a public computer, you 'd better delete the history regularly. In IE5, select Tools> Internet.

In the General tab, click "Clear history. In Netscape 4 or later, select Edit> parameter and click "Clear history" in the Directory window ".

5. Manage Cookies

Do not accept cookies of unknown origins. Cookies can recognize you when you return. However, some cookies track your Internet interests and send them over the Internet. In Windows 98, IE4 or later stores cookies in the Windows \ Cookies directory. In Win 2000, the directory for storing cookies is Documents and Settings \... \ Local Settings \ Temporary Internet Files \.

You can select A file, press Ctrl-A to select all files, and then press Delete. A higher version of Netscape 4 stores cookiesin the cookies.txt file. You just need to find the file and delete it and its subdirectories. However, you may also accept some cookies, so I suggest you use some cookies management software, such as CookieWall and CookieJar.

6. Do not chat without any need.

Try not to chat with strangers without a firewall. When you chat with people you know, you may think it is safe. But in fact, some hackers or websites may collect your email addresses.

The best way is not to run some programs that send messages in real time in the background. If you use these software, you 'd better turn it off or set to hide the user. For example, in AOL Instant Messenger, choose My Aim> Edit Options> Edit Preferences> Privacy. In MSN Messenger, select Tools> Options> parameters and deselect the top three options.

7. access the Internet anonymously.

We recommend that you use an anonymous method to access the Internet to avoid leaking your personal data. If you want to hide your ID when surfing, you can use the anonymous service provided on the Internet. Most of the services on the internet work in the same way: you first log on to their website, and then access the website from there.

In this way, you can hide your actual IP addresses and use them instead. My website is Safeweb.com.

8. Firewall

Do not surf without a firewall. If you are using a broadband connection, such as a DSL or optical fiber, you will be connected to the Internet at any time. In this way, you are likely to become the target of the attackers. The new high-speed modem has a function to disable without damaging its internal components, which is highly secure. You 'd better install a firewall on your computer-an anti-intrusion Program-as the guard of your computer.

9. Tables and Javascript

Do not disclose your information unless necessary. The more personal information you provide, the less privacy you will have. Fill in as few personal information as possible during registration. Do not enter optional columns. Do not save your credit card number for future convenience. If a website allows you to save your password for future access, I suggest you do not save it.

10. Protect your email

Encrypt your email. Do you think your email is highly confidential? Think about it. system administrators, hackers, or other people who can access your email can view your email. Encryption is the best protection for confidential communications. Only you and the recipient can decrypt the data. There are many easy-to-use encryption programs on the Internet. Try again.

11. Encrypt Your Network

The Internet tools we usually use on workstations and servers are not secure. Do not use Telnet, POP, FTP, or other programs unless your password is strictly encrypted. Authentication in plain text format is very insecure. Hackers can easily intercept your password through the capture tool.

SSH is a good substitute for Telnet. It can also replace FTP. In addition, do not send sensitive information by email. Note that both the client and server must support the encryption method used.

12. Do not trust others too easily

Do not be careless about the software you download from the Internet. Do not install software downloaded from unknown websites. Some programs may be Trojans. If you install these programs, they will change your system or connect to a remote server without your knowledge.

In this way, hackers can easily access your computer. Currently, many websites have the check function to check whether a program is secure before installation. I don't mean you don't trust anything from the Internet, but even a large website may be damaged by hackers.

13. Regularly upgrade your system

Upgrade your system regularly. Vulnerabilities are often found in many common programs and operating system kernels. Some vulnerabilities make it easy for intruders to access your system. These vulnerabilities will soon spread among hackers.

Therefore, you need to be careful. The software developers will publish the dingtalk so that users can remedy these vulnerabilities. I recommend that you subscribe to a list of emails about these vulnerabilities so that you can even be aware of these vulnerabilities.

14. It is best to disconnect a connection when you do not need it. For servers, if you keep the connection frequently, close Deamon, which is rarely used.

In the newly installed operating system, Deamon runs according to the default settings, so that the system is vulnerable to attacks. Disabling Deamon does not affect the services of most hosts.

15. Check whether to purchase or use a computer that has been intruded but has not cleaned up the hard disk before buying a second-hand computer. This may provide hackers with the opportunity to intrude into your computer. It is best to reformat the hard disk and reinstall the operating system.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.