Put a helmet on the computer data

Source: Internet
Author: User
Tags continue browser cache

In the daily life may accompany us most should belong to the computer, he has become one of the indispensable equipment in our life, he is not only the office appliance of the work family, is everybody usually at home entertainment, pastime good friend. And with the advent of tablet computers such as the ipad, the status of PCs is rising again: whether we're on the way to work, in the gap or after work, we often habitually hold the ipad online, read, play, or video conversations. He is like a family, around the clock, we can not imagine how the days without computers will be so bad.

Are these impromptu diaries that are recorded in the computer that one day will be discovered by others?

Because of the depth of our reliance on computers, information security issues are getting more and more attention. In the network technology so developed today, some of the network of folk "hackers can easily steal our private information, this is a commonplace thing." So, if we don't let computers connect to the Internet, should we be able to make sure it's safe?

Things are not so simple, hit's "pornographic" incident proved a surprise to us the fact that the original computer data even if deleted can be restored. What's going on here? Please continue reading this article to find the answer. Read the next section to see how deleted data is recovered.

Deleted data can also be recovered?

What happens when important data is mistakenly deleted? As long as you have this question "Baidu" or "Google" can easily find the answer. If you think you have read the online answer or confused, it doesn't matter, you just need to download easy recovery and other data repair software. With a simple step, the lost data can be returned. You may be wondering why you can get it back now that the data has been "deleted".

From the previous release of the "hard disk work" and other articles, we have understood the rough structure of the hard disk. But you may not know exactly how the hard drive is storing data. As we all know, the common code in a computer is binary, which means that all kinds of instructions, programs, and data are represented by 0 and 12 digits in the computer. Therefore, all the files we store on our computers are essentially a series of 0, 1 strings.

Whether flash or hard disk storage devices, most of their space is used to save this string of code, which is called the "data area." The remaining space is relatively small, but very important, roughly divided into four parts, called the MBR, DBR, fat and dir areas respectively. These areas work differently, but in general they are used to search for a specific string and then revert it to the data you need. Figuratively speaking, the role of these areas is to build a document to "release" the Channel.

When you execute the delete command, you actually destroy the channel, and the code string representing the data is still there. Therefore, although you cannot find a file that you deleted through a normal operation, as long as you do not write new code in the data area (overwriting the original code), there is a way to restore it again. The various methods and data repair software introduced on the Web are based on this principle by rebuilding a new "channel" to find the data, so that you can find the deleted files back. But once the area where the file is stored is written into the new code, the original data will no longer exist and cannot be restored.

Therefore, you do not have to mistakenly delete files and regret unceasingly, only a few steps simple operation, the file can be retrieved. At the same time also brings a new problem, since the deletion of things can be restored, that the existence of things on the computer is not easy to be found? Yes, the issue of information security really needs to arouse our attention. Please continue reading the next section.

How to protect our information security?

After seeing the working principle of the hard disk described above, we need to protect the data stored in the computer properly. Because this day and night with your partner, may not be so reliable sometimes. In fact, a few simple strokes can make your PC security greatly improved.

The ability to clean up disk fragmentation can greatly protect our information security

First, it is not enough to use the Delete directive for files that you want to completely delete. Performing a delete operation in window simply puts the file in the Recycle Bin, and the file can be recovered even if you choose to "Empty the Recycle Bin". Therefore, if you are sure that this file is no longer needed, it is best to "smash" it--simply by cleaning up all the code for the file at once, which is equivalent to a format for this part of the area, which is no longer recoverable. You can download a shredding software from the Internet to help you remove files easily and completely.

You can encrypt a file that you do not want to delete temporarily, but that you do not need to see. WPS, such as document processing software with the encryption function, you can also use a higher security third-party encryption software, but the password should be set as far as possible complex (letters and numbers alternating) can be.

In addition, you'd better develop a habit of regularly cleaning the system. In the use of computer process, will continue to produce a large number of garbage files, including some of the files we open the file, browsing the Web page and other records. These records are also likely to expose your privacy. You may wish to use window or third-party system cleanup software to regularly clean up the system, on the one hand to speed up the speed of the computer, on the other hand to enhance information security.

For the records generated by browsing the Web, you can select "Tools"-"IE Options", on the General tab, in the Temporary Internet Files option, click the Delete File button to delete the record that is saved in the browser cache, or before entering a page in the browser, press in the Address bar. Ctrl+0 "key so that browsing records will not be saved. For records that are generated by opening a document, you can turn off the "Open recent Files" feature in office and WPS: in Offic or WPS, select the Tools menu, select the Options menu item, and then go to the General tab and cancel the list recent files (R) in general options The check mark for the previous checkbox.

All of the methods described above are processing files from a software perspective, and many of the storage devices in the market now come with encryption, which is more reliable than software encryption. It is convenient and safe to carry your important personal information and privacy in a mobile storage device with high security and compact size.

At present, Apple's ipad and other electronic devices have relatively high security, but the network has also been cracked methods. So when you're using it, it's best to connect your ipad and iphone to your PC instead of using it on a public computer.

In fact, the introduction of so many ways to protect personal information, it is often difficult to achieve absolute security. Because the speed of hacker decryption is even higher than the speed of software development. Electronic products bring convenience to us at the same time also brings hidden dangers, let us have to increase vigilance. So, confidential information like the bank card number is still on your mind, and no one has been able to decipher your brain at least so far.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.