Board logo

subject: Prevent Hacker Access To Personal Information Security Complete Defense Manual [print this page]


Do not open unsolicited e-mail: Many Hacker Invade Host Way, are first sent to contain the invasion process of E-mail to each other, cheating each other within the message open attached executable file, as long as the recipient without the knowledge of the situation in the implementation of the invasion process will be silent The presence to the computer, the hackers left and out, is not only important confidential documents stolen, and even Damage Out the whole computer Hard disk Information.

Therefore, we strongly recommend regular e-mail friends (especially in Company ), Open every message, we might pay more attention to encounter unsolicited mail (eg spam), in particular, contain additional files, and EXE file extension, do not open, because this is probably hackers invasive procedures. The best way is to directly remove the entire letter.

(2) care in the message page: Even if the message does not contain executable files, may be dangerous! E-mail support for the relationship between HTM format, so the sender can use this Technology The message content to website (WebPage) sent out way, but using IE browser security vulnerabilities. These vulnerabilities could allow hackers to write some simple JAVA program, as long as Internet users click on the button above, you can allow hackers to steal from your hard disk important documents (eg, password files, etc.). Thus, even if you just open the page, are vulnerable to hackers.

(3) Do not set the password is too simple: the average user, in the face, or e-mail account password settings, often on a simple random number, or simply the English name, word set. Is even more ridiculous, it was straight to the password configured with the same account, is equal to the most easily guessed by hackers chances. Because sometimes hackers to invade your computer, if faced with password-protected host, usually a simple try before the other party may guess the password, if this line of defense to be so easily break, meaning it lost password. Therefore, it is recommended you set the password, preferably in English with a particular number (such as your birthday), as long as the password more complex, on the right Network Security Protection more secure.

(4) non-loan account number and password to others: Some friends often lend their own account and password to others, although only by thinking about it does not matter, but do not know this is a very dangerous behavior. Even if the other is how my friends, but after all, they know the password has not only just, and this may result in account number and password outflow, was brought to do things the offense.

This situation often occurs in the beginner online friends, because I do not know how to set the password, then get a friend or computer engineers to help, then if the other party is conscientious, will probably remember your account with password into the other "free" account, but often the victims are receiving the dial-up bill when alerted to when it is too late. So if you are forced to lend the account number and password to others, also hope you can in the shortest possible time to change the original password, to prevent others using the original password for your account.

(5) to strengthen the independence of the host server: as long as local area network architecture, there must be more than one host server, provides links to all the computers and be controlled. Typically, these computers are the target of hackers. Therefore, Enterprise Should be for the internal security of the host server to enhance control, as much as possible its independence, not to put important information here, use of confidential information in some way important independent of other machines, then another by the company's internal network connection.

by: wowo




welcome to loan (http://www.yloan.com/) Powered by Discuz! 5.5.0