What to pay attention to when ordinary users surf the internet

Source: Internet
Author: User
Tags strong password firewall


Like ordinary people, cyber criminals also want to live a relaxed, comfortable life, such as lying on the road can make a lot of money, copy "shortcut" directly to the wealth of freedom ... The best way to thwart attackers, therefore, is to make their "work" more difficult, not to be labeled as "simple" by the hacker, to force the attacker into a desperate attempt to find prey in another place.

The following tips to prevent cyber-crime are believed to be helpful to ordinary netizens.

1: Use a password to restrict access

A password of at least 8 characters is considered a strong password, of course, 10 or more should be better. Your password is best mixed with uppercase and lowercase letters, numbers, and symbols.

Perhaps you will lightly use your name, birthday or personal introduction as a password, absolutely not. The use of such a password is often human, but please do not forget: hackers are people. These combinations are preferred when they crack.

You should change your password frequently, but not on a regular basis. The more common scenario is to change the password every 90 days or less.

If you have a lot of accounts, this means there will be multiple user names and logins: another scourge. Be sure to record all this, but not the sticky paper lying on your desk. Find more secure places, such as safes, Dropbox, or memory cards. You can even use some free software to manage your passwords, such as last pass.

Password policies can be extended to mobile devices-especially if you use them frequently at work. Perhaps, a strong password for you caused a little inconvenience, please think seriously once someone malicious access to your personal or corporate documents, you have to pay a much higher price than every time you enter a complex password irritable.

Screen lock is a complex line of defense. You can use the phone itself, or install a mobile security kit with a screen lock.

2: System hint: I need to strengthen

Firewalls block unknown or untrusted Web sites and regulate communication conversations between the computer and the outside. Currently, they are built into the operating system, and all versions of the Windows operating system have their own software firewalls since Windows Me.

Please make sure your firewall is active. When your specific work is interfered with, you may need to adjust the settings, especially if the personal or corporate firewall is what you get from a third party.

Viruses, trojans, worms, adware, and spyware are all charge weapons to cyber attackers, so you need to be protected.

There are a few free security packages from reputable manufacturers to download, you can use a different brand of independent components to assemble a shield, or directly use a multi-function kit.

In any case, you need a anti-virus, anti-malware, anti-rootkit and Anti-spyware module. Likewise, anti-adware and record-keyboard viruses are essential, and the latter can record the keyboard sequence and other sensitive data entered for the password keystroke.

It is particularly noteworthy that you should examine the source of the message in the mobile app. Software can only be downloaded from the Trustworthy App Store: Amazon and Google. The selected software must be used by a number of people, and you need to know what software reviews you want to download.

Mobile apps will require some privileges--see your contacts, get incoming calls, and more. Some programs even want to take over your device. If the app is asking too much, try another option. There will always be another, less demanding, similar program at the App Store waiting for you to download.

Please press that all your security software (including the modules in the operating system) needs to be updated regularly! If you have an option to automate the update, don't hesitate to choose it, and you'll save a lot of work.

3: Be careful, this is a public place.

In social media, set privacy protection, and quickly set your profile to "privacy"!

When posting, be cautious and restrained. Pay attention to your personal point of view, and there will always be times when you choose the wrong button-or your comments are made public through other channels. And there is a bad tradition in the network that things always exist and exist forever. You cannot erase those traces, or hurt yourself, by your own power.

Be careful in everything. Repeatedly stressed that must be "careful" is not because I am an early aunt.

Be careful when connecting to WiFi, especially in public places. Setting up a bogus WiFi hotspot is a favorite form of entertainment for some network villains. Lurking in the halo of a popular brand or store, an attacker can link access to the account information and personal data of WiFi users. Therefore, it is a good habit to seek the attention of the employee to obtain the certification.

Disable any settings in your device that automatically link to the most recent wireless network and insist that all links are https.

If you need to handle a lot of sensitive things on the way, sign up for a VPN (virtual private network; a personal encryption server).

Otherwise, just wait patiently. Do these things in a more secure environment, such as home or office.

4: Common sense is important

There is no free lunch in life-at least not often. You get 1 million dollars in an online game and you don't remember when you took part (in fact, you didn't), and that's more than a free lunch.

These are bait, bait to trap--and traps are never a good place to be. So you have to choose carefully what you believe--especially the messages in the emails.

Here are some clues you might find.

Urgent notices from your bank, the World Bank or the United Nations (note that I am not joking here), usually the sender's email address has nothing to do with the agency they claim to represent.

You can hover in the monitor by the mouse over the sender's name to view the address, will pop up a text box prompts the account's original address.

Use your brain before doing anything. If there is a path exception message from a person or organization you know, it is best to contact them by phone or other means to verify the authenticity of the information.

Please don't forget

Use Help, and the Help files in your hardware and software exist to help you. If you are unsure of the security or privacy settings which compare with you, you can view the Help menu for guidance. The website of software or computer manufacturer also provides service consulting or technical support, where you can also solve more complex or special problems.

Many banks and credit card attacks have used fraud detection software to monitor the abnormal behavior of accounts. Banks will have the potential to abuse their accounts and the risk of their information being stolen, based on testing. Once such activity is on the record, the bank will give you a warning. You should take this warning seriously, and then look into the account.

Law is also a way to solve problems-especially if you find a case of alleged infringement or crime. If necessary, you can report to the police or the superior department.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.