The Internet is a two-edged sword, and on the one hand, the Internet is convenient for everyday life, and on the other hand, it is also open to the hacker invasion computer system. How should a general netizen guard? Please see the top ten basic knowledge of your personal privacy information:
1. Browse with anonymous way, because many websites use cookies to track users' internet activities, thus making a good friend. You can turn off the computer to receive the cookie option when using your browser to avoid tracking of cookies.
2. In response to any online transaction or send email, remember to read the privacy protection policy of reading the website, because some websites will sell your personal information to third parties.
3. Install your personal firewall to prevent personal data and financial data from being stolen. Timely upgrade is a very important ring, otherwise the role of the firewall is not fully played, and the possibility of attack is still very large. In addition, you can also use security software to keep important information, reducing the possibility of accidentally sending these materials to unsafe websites.
4. Use the security software or firewall to prevent hacker attacks and spyware (a software that connects to the external server and transmits personal data to the network). These software protect your personal computers and materials from hackers, and prevent Spyware from automatically connecting to the site and send your information.
5. Make sure that secure connection is used when shopping online. You can use the Closed Lock icon above the browser to determine if the connection is safe.
6. Hackers sometimes pretend to represent the representatives of Internet service providers and ask your password and personal information. Do not reveal these information to anyone when internet access.
7. Change your password frequently, use seven-digit passwords containing letters and numbers, thus interfere with hackers utilize software programs to search the most commonly used passwords.
8. Turn off these features when you do not need files and print shares. Although the files and print sharing features are very useful, it will also expose your computer to find a hacker for security vulnerabilities. Once a hacker enters a personal computer, it can steal private information.
9. Do not open an email attachment from a stranger. These attachments may contain a Trojan horse program that makes hackers drive the Identip computer documentation, even control peripherals, and some hackers can even submit into the Internet camera (Web Camera) to monitor. In addition, you should also install software with antiviral programs, protect computers from viruses, Trojana programs and worms.
10. You can use the real-time check of network security. For example, the Security Check feature is used in the Symantec website to determine if the computer is equipped with the ability to protect computer viruses and malicious code. This feature can also scan your computer to find security vulnerabilities and viruses, and compare the scan results with other scanned systems. So far, more than 3 million users have viewed this website, recommended.
In short, today, it is more important in the network, and every netizen should not hold the luck "being black, it will not be me", only to do a good defense work.