Ten strokes to prevent network computer disclosure

xiaoxiao2021-03-17  205

Will you disclose your Internet online? Yes it is! When opening a file, enter a variety of passwords or chat with your friends, you will leave a trace on the machine, thus leaking personal confidentiality. For security, you should erase these traces when you leave.

1, start menu disclosure

In Windows's Start menu, there will be a record of recently access files. When you leave the Internet cafe, others can open your recent documents by clicking "Start → Document", so, be sure to remember them after the document is completed.

Solution Click Windows "Start" → "Task Bar and Start Menu" → "Start Menu Programs", click the "Clear" button in the Document Menu item. If you just want to delete your own document, you can go to the C: \windows \Recent folder, and you can delete it.

2, Microsoft's Office software leaks

If you have edited important files in Microsoft's Office software in the Internet caf, you have to be careful, because Office software lists the recently opened files in the File menu, others can easily see, even Document replication takes away!

The solution is Word as an example, the specific practice is to select "Tools" → "Options" → "General" in Word, and the check box "lists the" tick "tag before the number of files" can be removed.

3, recycle bin leaked

Win9x / me has a characteristic, often not really deleting files, but transfer it to the recycle bin, and the file in the recycling station can be restored! "Senior people" can be ... so, must be clear and collective in time!

Solution to open the recycle bin, click "File" → "Clear Recycle Bin" or select the file you want to delete, click "File" → "Delete", so that the file is really deleted after operation.

4, some temporary files leak

If you carefully, you will find some temporary files under the computer's C: \WIN-DOWS \TEMP, which is generated when installing or running some software, for some reason (such as the software itself) Or sudden power off, etc.) cannot be deleted in time. These temporary documents are mostly in the personal computer, there is some hard disk space, but there is no hidden danger, but it is different in the Internet cafe. Others can understand your preferences by viewing these files, speculating what you have done. Solution After closing all running software programs, enter C: \windows\Temp, delete files inside. Note: Some temporary files may not be deleted, then you will try again!

5, browse URL (URL) leak

In order to facilitate the user, Windows98 has a history function that records the user's previous operations (such as running programs, browsing websites, looking for content, etc.). But there are two aspects of anything, and historical records also briefings. Some people use these records to get the web page information you have visited, so as to spy your preference.

Solution Click "Tool" → "Inter-Net Options" → "General" in your browser, and then click the Clear History button in the History project. Or start the registry editor regedit, and expand to the HKEY-CURRENT-User \Software \MICROFT \INTERNETEXPLOR \TYPE-DURLS key value, the key value is specifically used to save IE history. Why do you still do it, try your hand to remove them! In addition, when the URL is input, press the Ctrl 0 (Letter O) combination key, fill in the website name or IP address you want to access in the pop-up window, and the URL you entered will not be saved in the address bar. 6, QQ password leak

If you choose to save your password function when you use QQ in an Internet cafe, it is easy for others to get your password. Although the password is only displayed in the form of *, it is too much to watch the *.

The solution does not choose to save the password function, and if necessary to turn off the QQ. It is also useful to apply for QQ password prior application, even if the password is stolen, it can also be made back by password.

7, accessible mesh leaks

The browser will save the online information you have browsed in Folder C: \Windows\Tempo-RaryInternetFiles, which can improve the browsing efficiency when access is next. But once these records are obtained by those boring people, they may find a spider marty about personal information from these records, or even your letter content (if you send and receive letters through the web)!

The solution removes all the files under C: \windows \TEMPO-RARYINTERNETFILES. Or open the IE, click on "Tools" → "Internet Options", click the "Delete File" button in the Internet Temporary File item in the pop-up dialog box, haha, no one knows your secret.

8, cookie leak secret

Cookie is a data file sent to your computer, which records information such as user name, password, and information about user interest. Some people who like to engage in "prank" will use the cookie's function to pretend to do some "terrible" things. In addition, there are many websites, using Usemame and Pass-Word in cookie files are not encrypted flattext information, it is easier to disclose! Therefore, in the Internet cafe, it is necessary to delete the cookies file.

Solution Opens the C: \Windows \Cookies directory inside the resource manager, and you will find a lot of files that record your personal online information, in which the "index.dat" file is selected in this folder (the system itself is formed All files outside the file, then delete them. In addition, click Tools → "Internet Options" in the IE menu bar with a mouse, select the Security tab, then click the "Custom Level" button in the answer to open the "Security Settings" dialog box. Find the settings about the cookie, then select "Disable" or "Tips", you can once once, and don't need to delete each time.

9, clipboard leak

Many people use copies, paste functions to copy files and text, which makes it inevitably have corresponding information in the clipboard. If you don't pay attention to the clipboard in time when you leave the Internet cafe, others have the opportunity to copy the contents of the clipboard to the hard drive (when the board is file) or file (when you are in the clipboard), if you use it Some clipboard enhancements, these tools typically record the contents and quantities you copied, even if it is right and wrong, it will not disappear! The solution can be emptied when the solution is left. If the clipboard enhancement tool is used, you must remember to clear the contents of the scrapbook with the clear recording function that comes with the software!

10, Trojan leak

Dealing with Trojans may be the hardest level. If the Internet cafe is being planted with Trojans, password information, email content, chat records, etc. will be obtained by Trojan clients! On the most convenient place in the next wood, it makes the computer of many Internet cafes become a "horses"! How to protect your personal information is not leaking?

Solution Internet cafes generally have anti-virus and anti-black software, it is recommended to check if there is a Trojan run before the Internet, even if the anti-virus black software report did not find Trojans and be careful. Tell you a brief method: download a process in advance to see tool software (such as prcView), used to see the current running process, if you find a suspicious process, you will immediately terminate!

转载请注明原文地址:https://www.9cbs.com/read-129533.html

New Post(0)