Ten ways to prevent leaks through Internet cafes

Source: Internet
Author: User

Will Internet access leaks in Internet cafes? Yes! When opening files, entering various passwords, or chatting with friends via QQ, the system will leave traces on the machine to leak personal secrets. To ensure security, you should clear these traces when you leave the website to protect yourself from the Internet.

1. Start Menu leaks

In the Windows Start Menu, there will be a record of recently accessed files. After you leave the Internet cafe, others can click "Start> document" to open the files you have recently viewed. Therefore, remember to clear the documents after you complete the operations.

Solution: click "start"> "Settings"> "Taskbar and Start Menu"> "Start Menu program" in Windows, and click "clear" in the "Document menu" project. If you only want to delete the documents you have read, go to the C: windowsecent folder and delete them one by one.

2. Microsoft Office software leaks

If you have used Microsoft's Office software to edit important files in Internet cafes, be careful, because the Office software will list recently opened files in the "Files" menu, others can easily see and even copy these files!

The solution uses Word as an example. The specific method is to select "Tools"> "options"> "general" in Word ", remove the "tick" mark before the "list recently used Files" check box.

3. Recycle Bin leaks

Win9X/ME has a feature, which usually transfers a file to the recycle bin instead of deleting it. The files in the recycle bin can be recovered! "People with heart" can ...... Therefore, you must clear the recycle bin in time after use!

Solution: Open the recycle bin, click "file"> "Clear recycle bin", select the file to be deleted, and click "file"> "delete". Then, the file is deleted.

4. Temporary File Leakage

When the file is careful enough, you will find some temporary files under C: win-dowsemp on the computer, these temporary files are generated during installation or running of some software, for some reason (such as the software itself or sudden power failure), the software cannot be deleted in time. These temporary files occupy at most some hard disk space on the PC, and there is no hidden danger, but they are different in the internet cafe. Others can view these files to understand your preferences, speculate on what you have done.

After closing all running software programs, go to c: windowsemp and delete the files. Note: Some temporary files may not be deleted. Restart and try again!

5. Url Leakage

For the convenience of users, Windows 98 has a history function that records all previous operations (such as running programs, browsed websites, and searched content ). However, there are two aspects to everything, and the history also brings about the possibility of leaks. Some people will use these records to obtain the Web page information you have accessed, so as to snoop your preferences.

Solution: click "Tools"> "Inter-net options"> "general" in the browser, and then click "Clear history" in the "History" project. Alternatively, you can start the Registry Editor Regedit and expand it to the HKEY-CURRENT-USERSoftwaremicrosoftInternetExplorerType-dURLs key value, which is used to save the IE history. Why are you still waiting to delete them! In addition, when entering the URL, press Ctrl + 0 (letter O) and fill in the name or IP address of the website to be accessed in the pop-up window, the URL you entered will not be saved in the address bar.

6. QQ password Leakage


If you select the Save Password function when using QQ in Internet cafes, it is easy for others to get your password. Although the password is only displayed in the form of *, there are too many tools to view!

The solution is not to save the password. When you leave, you must disable QQ. It is also useful to apply for QQ password protection in advance. Even if the password is stolen, it can be retrieved through the password theft statement.

7. leakage of the accessed network Surface

The browser will save the Web browsing information in the c: windowsTempo-folder-

In raryInternetFiles, you can improve the browsing efficiency during the next visit. However, once these records are obtained by boring people, they may find clues about personal information from these records, even your mail content (if you send and receive emails via WEB )!

Solution: delete all files under c: windowsTempo-raryInternetFiles.

Or open IE, click "Tools"> "Internet Options", and click

The "delete file" button in the "Internet temporary file" project. Haha, no one knows your secrets.

8. Cookie Leakage

A Cookie is a data file sent from a Web server to a computer. It records user names, passwords, and information about user interests. Some people who like "prank" will use the Cookie function to pretend that you are doing some "terrible" things. In addition, there are many websites. Usemame and Password in the Cookie file are non-encrypted plaintext information, making it easier to leak information! Therefore, it is necessary to delete Cookies when surfing the Internet in an Internet cafe.

Solution: Open the c: windowscookies directory in the resource manager. You will find many files that record your personal information on the Internet. In this folder, select "index. "dat" files (files generated by the system itself), and then delete them. In addition, click "Tools"> "Internet Options" in the IE menu bar, select the "Security" tab, and click "Custom Level" in the Q &, in the "Security Settings" dialog box that appears, find the Cookie settings and select "Disable" or "prompt" to delete the Cookie once and for all.

9. Clipboard Leakage

Many people will use the copy and paste functions to copy files and text, which makes it necessary to have the corresponding information in the clipboard. If you do not clear the clipboard in time when you leave the Internet cafe, others will have the opportunity to copy the content in the clipboard to the hard disk (when the clipboard is a file) or file (when the clipboard is a text, if you use some clipboard enhancement tools, these tools will automatically record the content and quantity of the files you have copied, even if the shutdown is abnormal, it will not disappear!

The solution is to clear the clipboard content when you exit. If you use the clipboard Enhancement Tool, remember to clear the clipboard content with the clear record function provided by the software!

10. Trojan leaks

It may be the most difficult thing to deal with Trojans. If the computer in the internet cafe is infected with Trojans, personal information such as password information, email content, chat records will be obtained by the trojan client! Internet cafes are the most convenient place for Trojans, making computers in many Internet cafes a "horse farm "! How can I protect my personal information from being leaked?

Solution: computers in Internet cafes are generally equipped with anti-virus and anti-Black software. We recommend that you check if Trojans are running before accessing the Internet, even if no Trojans are found in the anti-virus software report. The following describes how to download a process View tool software (such as Preview) in advance to view the processes currently running. If suspicious processes are found, they will be terminated immediately!

With these techniques, you can enjoy surfing the Internet and enjoy the endless pleasure of the Internet.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.