Several small tips on network security protection

Source: Internet
Author: User
Tags strong password

with the rapid development of Internet technology, many users ' key businesses are more and more based on WEB applications, while showing and interacting through the browser, are subject to threats from the user's business system, and the threat is growing rapidly as business systems complicate and the Internet environment changes. Gradually become the most serious, the broadest, the most harmful security problems.

One, to teach you how to ensure that your Internet security

1, refused to contact with the source of the Wi-Fi connection, most hackers use is the user want to free the internet to take advantage of the psychological, be cautious to use free and no password to the Wi-Fi. Many businesses have a place to provide free internet, but we also want to stay simpleton, must ask the detailed name, avoid being injected "Starbucks 1" and other fake Wi-fi spoofing;

2, use mobile phone login Online banking and online shopping must be cautious, in order to fund the security is not bad that point of traffic, with 3/4g Online mode to do it!

3.turn off the "Choose automatic Connection" option in the phone settings project, because if this feature is turned on, the phone will automatically scan the area where the Wi-Fi network is connected and connect to a network that does not require a password, which will greatly increase the "phishing Wi-Fi "The odds.

4, refuse to use the "Wi-Fi master key" and other Wi-Fi connection, password access tools, because they are based on the principle of data upload and sharing, you or other people connected to the Wi- fi information to share, if someone has connected " Fishing Wi-Fi "or" Trojan wi-Fi ", happen You are also nearby, that congratulations, you also recruit!

Two, want your own router will not become someone else's "Trojan Wi- fi "To do the following:

1, strong password is the most important cornerstone of Wi-Fi security. The so-called strong password, refers to the combination of uppercase and lowercase letters, numbers and symbols of more than 8-digit complex password, such as Gt/[email protected]. As long as WPA/WPA2 encryption is used for Wi-Fi, and strong passwords are set, it is almost impossible to compromise.

2, hide your SSID, refers to the router management interface for the relevant settings, so that the SSID of the wireless network is no longer broadcast out, become a "stealth network", so that the same can greatly reduce the probability of hackers attack.

3. Turn off the QSSandWDS functionsof the wireless router and open the Guest Network for others to use. First QSS,WDS features It greatly reduces the security of the wireless router, so if not necessary, should be turned off these two functions, and the Guest network as long as the function is limited, can effectively protect the security of the router.

4, the common network device for MAC binding. mac bindings are settings that are related to the router and turn on the Mac address blacklist or whitelist feature. Of course, this is the recommended way to use the whitelist. The user simply adds the physical address (MAC address) of the device that needs to connect to the network to the whitelist list, and only these added devices can connect to the wireless network.

5,In addition, should also start from the source, do not purchase a known vulnerability to the router products. If the router is used for a long time, update the latest firmware version. If not high-play, try not to brush the third-party firmware. As for the background management password, take paper pen write down can think of the most troublesome password and change the router management interface landing address, to ensure foolproof!

users should also install personal firewall software to prevent black Due to the development of the network, the user computer is facing more and more serious hacker attacks, many network viruses have adopted a hacker method to attack the user's computer, therefore, users should also have a Software Management , set the security level to medium and high so that the hacker attacks on the network can be effectively prevented.


Several small tips on network security protection

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.