Tips for using QQ to avoid Trojan viruses

Source: Internet
Author: User

The security of QQ passwords, personal data, and chat records is critical. to effectively prevent the loss and theft of local information such as chat records, take the following effective measures:

A. Set the local message password:

First, right click, select "System Parameters" from the QQ icon, and select the "Security Settings" tab in the "System Parameters" window. Select enable local message encryption, and then enter the password and confirm the password. In addition, to ensure security, you must check "enable the local message encryption password prompt", set the prompt and answer, and press "OK" to make the setting take effect. After you start OICQ and enter the account and password, the software also requires you to enter the local message password. Otherwise, you cannot enter the password.

B. Avoid Trojan attacks:

Many Trojans can be found on the network to steal QQ passwords. However, these Trojans only record QQ logon passwords with numbers not more than 9, set the QQ number to more than 9 digits by means of "Crossing the sea in the sky. We can do this. When logging on to QQ, select "Registration Wizard" and add a long string of 0 before the QQ number entered in "use existing QQ number, the number of digits is more than 9 digits after the number of digits of the original QQ number is added. As a result, normal QQ login is not affected, and the trojan software can be avoided to secretly monitor the QQ password. At the same time, proper selection of Anti-trojan software can also prevent problems, such as: Anti trojan, TheCleaner, Iparmor ...... These software have powerful Trojan clearing capabilities.

C. You can use the stealth logon method:

First, find the QQ that you have successfully logged on to, find your number in the "QQ User Logon" box, and select the box in front of the "invisible Logon" box. Then you can log on to it. If you log on to QQ for the first time on this computer, it is easy for others to obtain your address after successful logon. You 'd better select "offline" immediately, and then select "stealth login ". In this way, no one else can find your address.

D. You can select "reject stranger messages" in "System Parameters ":

On the "personal Settings" tab, select "identity verification required to list me as a friend ".

E. You can use the "select Proxy Server" method:

Find a proxy server and set it in QQ so that others can only see the IP address of the proxy server.

F. Know Yourself And know yourself to reduce risks:

Hackers need to go through a set of intrusion procedures, including searching IP addresses, scanning address books, job system analysis, vulnerability analysis, and password cracking. This takes some time, if you stay on the Internet for a longer period of time, hackers will have the opportunity to complete intrusion programs. Therefore, do not connect to the Internet when there is no such thing to reduce the risk of being hacked.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.