When people are nothing, it is easier to do "frankly", but if the waist is wrapped, it is hard to avoid "long-distance". Protect yourself in the online game 36, how much do you know?
There is naturally no possible - online game asset protection "3 • 15" topic
With the increasingly mature online game market, its derived hacking, transaction, and plunge market also expands. The author believes that there is no player is willing to find his password when you log in to the game, no one is willing to see the best equipment that has been made to get the best in the trading website. So we may wish to depart from the game itself, game location and players, explore the possibility of "the world without thieves".
The game is up and down: borrowing the knife and killing the military law, "the enemy has been unfained, the friend is unfained, the friend is killing, not self-abortment." Let's put it here means that our enemies are very clear, that is, the thief of theft; The attitude of the game operator is not completely clear, to induce all the allies to destroy the enemy, do not have to pay the price.
The password protection is preserved, "Legend" is just entering China, most players do not pay attention to password protection issues, just filled with meaningless numbers or words perfunctory. Until one day, the "Legend" hacking is beginning to fill the question, if the arbitraries want to find the answer from the customer service, they can't fill out the answer to the question, and they will have the chest, and regret it. Since then, the players generally realize the importance of password protection, password protection into the first level facing the hacking of the online game account. When setting a password protection problem, the players must not be lazy, do not mix their and passwords themselves. Otherwise, just make your password, you can modify your registration information. Tipping is best not to set it too simple, such as "birthday?", "Name?", "Mailbox?", It is easy to be familiar with the heart. In this regard, many manufacturers are also ramping their brains. If the online star enforced new member registration account, you must fill in the password protection function, otherwise it will not be registered successfully; NetEase sets the "security code lock pass account" function, once found to be stolen, Players can lock the account with security code to prevent the hacking from login.
Down to the warehouse is stolen from the password to the player's lost, the player and the property of the property will be robbed. Even if you find an account, the blood has been turned into bubbles, and everything has to come back from the beginning. In view of this, some games add a warehouse password function, allowing the player to set a password separately for the warehouse. In this way, the player will store the valuables into the warehouse every day. After the online, the password will be opened, although it is cumbersome, it is not enough to be effective.
Mobile phone binding, such as the development of mobile phone SMS binding account function, adding a creation of a creation of money for operators. At present, the common service content has the lock and unlocking function of the game account, and the correct password cannot be logged in, if the correct password is used, if you use the correct password, you can find a SMS command, find Back to the membership password, and send a message immediately when the password is modified, and the message to the specified mobile phone, such as the mobile phone secret service. Such services are either monthly charge, charge the player below 10 yuan per month; either single charge, according to the fees when sending a change instruction. In the case of fully separated from the computer, "Mobile Binding Dafa" has cleverly bypasses the siege of various viruses and Trojans. It is worth noting that if the hammer is a familiar friend, it is likely to use the vulnerability of your mobile phone. After stealing the identity, the first applies for mobile phone binding.
Paid Treasures see the 智 static password due to data fixation, there is a congenital security defect. It is not a long time to replace the password repeatedly. Some game companies have begun to consider introducing a dynamic password certification system commonly used in financial systems such as online securities transactions into the field of online games. Promote the most successful "Shengda Treasure", which may have a wide variety of games in Shanda, involving the value of virtual property transactions. This appearance is like a digital BP machine, which automatically generates a string of 6-digit dynamic passwords per minute. On the "secret" screen, the dynamic password is based on the security algorithm once a minute, anyone can't predict . By binding to the game account, combined with static password input, the effect is significant in confrontation of the hacking. Such a product price is naturally not Philippine, the retail price of 98 yuan and the 21-month service life can only accept players who are particularly obsessed with a game. Another password card price called "Game Star" is relatively low, each price is 20 yuan, there is currently "break the sky", "天 2", "Tianjiao 2", "Legend 3G" 4 different The company's game products joined. Its principle is to provide a sheet of paper containing a 6 × 8 password matrix information. The user binds the card with the account, and enters the password of the corresponding location according to the system randomly generated according to the system when logging in to the game or community. Such as coordinates "A4" represents the fourth column of the fourth line of the password table. The defect is never possible to turn the card or be copied and passed by the password table. Other means of five flowers are characteristic of each game, and each game company has also introduced corresponding protection measures. The "Magic Baby" of the online star, the pet value is extraordinary, the official website provides the first-hand transaction record from the date of acceptance of the player to the date of acceptance, and the number of pets within 60 days, the other party's game character name and other important information . The "Conquest" of the network is restricted to the game player character, disabled some unfamiliar special symbols and unrecognizable special symbols, and also adds the role name and role level window display function when the transaction is added, and the players are prevented when they are cheated. NetEase's "Westward Journey 2" adds a "Password Protection" feature on the login interface of the input account and password. After enabling other programs to monitor the player's keyboard input, this feature automatically prevents players from continuing to enter and remind players. Confirm the legality of other programs.
Inside and outside the Internet cafe: The anti-customer is the main fighter, "" Take the slogacity, the host, the gradual progress. "It means that it is in the Internet cafe or in his own home, the system and the game itself must have a vulnerability, we I have to grab the front of the thief, insert it in, and hurt the key key, step by step into the purpose of protecting the account property.
Lonely, such as the snow, restore card, is of course more comfortable, but for conditions, you can only play friends on Internet cafes, please try to choose the Internet cafes installed on the machine. Because such a machine can restore the operating system to the status of the administrator to initially install after restarting. Unless the Internet cafe is moving in the system, it is theoretically, as long as it is restarted, the malware in advance is white. Trouble is that the machine installing the restored card is particularly easy to crash. Every time you restart the justified input method, plug-in, all-in-collection and other personality settings have to come again.
There is no good software, the current word of mouthfuls, the kimoni, a "Mark-Star", which is more suitable for home users, 60 yuan for registration costs, relative to its powerful functions. The anti-virus software and "Tianwang" such as "Rising", "Norton" can control the firewall software that can control data access ports, as long as it is noted to update the virus library and program file, the possibility of the trick is reduced by half. Internet cafes generally don't install the software when you monitor the software, if you don't worry, you can use the "Online Anti-Virus Service" in the QQ interactive service to scan the hard disk over. This service is free, anti-virus 2Q coins / time.
True and false minor keyboard account password input must be operated by keyboard operations, and can record the keyboard button sequential hacker software. If it is targeted by it, our action track will be hidden. The most primitive solution is to disrupt location, interleave input, or simultaneously lose the error in chaos when entering confidential information, disrupting the operation mechanism of such software. You can also enter a string of characters in the address bar of a text file or browser, and then copy the past. To completely get rid of the shadow of the keyboard monitoring software, you can consider using the "soft keyboard" input method input by the mouse click. More than half of this technology is used in online banking password input, and now they have been taken first by a small online game, such as "Paradise II", "Sword Online", etc. But even the soft keyboard, it is also facing a manner that the user's login interface is saved as a picture in a manner that is used by the high-grade hacker software, and the risk of the account password is depleted through the click position of the mouse in the picture. There is no more perfect solution in this regard, and the technical department still needs efforts. Thousands of password strings are known, many friends' passwords are "universal password", boot with it, mailbox use it, QQ uses it, the game is used, and even the bank will pay money or use it! And the password composition is very simple, or the order of the birthday month, or the simple combination of the name is pinyin, the 8 digits, the number is main, and the hacker software violent is very open to the door. A good password should be alphabet, numbers, other symbols of irregular combination, at least 8 digits, not much association with personal information, and often replace. This complex password is also cautious. If you can't remember it, you can't remember it ...
Player words and deeds: the bottom of the taper is a cloud, "I can't afford it, but I'm trying to do it," I don't have rich, if my computer is not enriched, I can't overcome the thief without hole. Strong offensive, they also have to be cautious, weaken the source of the opponent's strength, start from the principle of the performance, separating the easiest and killing power.
Cheap Mo You have received a winning notice from a person who claims to be GM? The other party is always the secret of God. "I am a customer service, congratulations on the lucky prize of lucky player lottery activities, please send me your account and password immediately, verify that we will receive a prize. Contact you. "This is the same as those who are lucky. In fact, any game company will not ask the player to the player in any name, and the result of the prize is usually announced on the official website home page. At this point, you can do this is to report to the real GM, avoiding more innocent players into the trap.
Sybe you may have some bugs after a while, such as copying and brushing money. Although most players claim to resolutely resist the violations of the game fairness and normal life, I really have the opportunity to try again, only a very few people are willing to adhere to the original intention. The liar seized this psychology, spreading the so-called "copy secret" around, or is the address of the website, or bundled the false software of the Trojan, and even the players will give him the equipment or money to him, double double after copying Return. Regardless of whether the copied thing will be deleted by the operator, those "good" will tell you the copy method, you don't hurry to copy a bunch of advanced equipment, but cause the entire server to inflate, what is your motivation?
Li Guan Mo Xin remembers that there is a return, the author suddenly sent a news in the game, saying that I want to find a set of best equipment to wear a few days, I want to return to the city and pick up. Since it is a dead party, I naturally endless, but I didn't see it for several days. I wouldn't help but have a few words. Who knows that he doesn't talk at all, repeatedly reminds me to go to the warehouse. I took a closer look at the chat window. I found that my id and my friend's ID is similar. It seems that there is a sluggish ... The other brothers in the guild are not so lucky. He only discovered something wrong after the transaction. . People in this trick usually and the victim in a Internet cafe or a guild game, usually pay attention to observing the various relationships between players, the opening is countless, "cooked" in invisible. What kind of thief is the thief? Cardship thief. Once the player is forth in the game, the most painful loss is not a virtual property, but sincerely sincere. The author has encountered many names of "Dram Allure", which actively proposes to exchange QQ numbers, and then urgently transmit photos. After receiving, use anti-virus software to sweep it, and there are eight nine embedded malicious code. As for each other, after a period of time, I will not hear the account. It is difficult to have an emotion, it is difficult to have a constructive opinion, nothing more than the beginning of the contact, "the heart is not the heart"; the sweetness of the "generosity, the strength"; after the passion, "there is no reason not to be lost" .