To protect you and others on the use of micro-blogging rights, the system will automatically identify with the following sites outside the site link:
1, the user concentrated report a large number of published profit-making nature and affect the use of the outbound links;
2, phishing website, disguised as a bank, E-commerce, micro-blog, games and other sites, and the real site interface is exactly the same, requiring visitors to submit accounts and passwords of the site. In order to defraud the user of the relevant accounts, passwords and other information, resulting in privacy disclosure and property losses
3, Hang Horse website; The Web page is embedded with malicious code, and when users visit it, they will download and execute malicious software such as Trojans without their knowledge.
4, trojan, download Web site, through the invasion of other people's computers, stealing accounts, passwords, damage system files, delete data malicious programs.
5, malware download website, malware download site, malicious software (commonly known as "rogue Software") refers to the user in the user's computer or other terminals without the user's permission to install the operation, infringing the legitimate rights and interests of users of software.
6, tamper with the Web site, the attacker to gain control of the site, the content of the site to modify, seriously affect the user to browse the Web page, or embedded in the Web page malicious code