First level network security common sense
Friends who have a little common sense for network security can not be seen here, because it is the most primary knowledge here. This article is aimed at the network security of individual users, I am 009_lang.
One: Password security
Whether you apply for a mailbox or a online game, you can't register, so you will fill your password. Most people will fill in some simple numbers or letters. It also sets your own mailboxes, several QQ and online game passwords. You may tell your friends online because you need it, but if the friend's curiosity is very strong, he may use your password you give him a password or QQ, your online secret He raised his hand. Therefore, it is recommended that the mailbox password you most often sets a password that is not less than 7 bits, and there is no regular password consisting of no regularity and at least once a month. Other uncommon number of mailbox passwords do not want to set with the password of the main mailbox, the password can be relatively simple or the same. However, the password should not be involved in his own name, birthday, phone (many password dictionary is made according to these information). Other password settings are also the same, the most commonly used passwords are set to other different, so exclude being "all the way".
By the way, please don't put the notebook that you have your password in the place you think safely.
2: QQ security
QQ is OICQ, is a network instant chat tool from Tencent, now more amazing now! So now the tool for QQ is also very much. Here is the password security of QQ, you will be important to apply for password protection on the service area of Tencent's homepage, but it is also easy to neglect.
Now the words change, say QQ security, use QQ check IP addresses online (IP address is a 32-bit binary number, divided into 4 8-bit bytes, is used to identify computers using TCP / IP protocol The things that are uniquely identified with network devices are extremely common. QQ check IP can use specialized software, you can also use firewall or dos commands, not detailed here. After IP is found, the uncomfortable people can use a variety of bombs to attack you, although these attacks are not harmful to your personal privacy, but often fry off the line, this taste must be good.
There are two solutions:
1. Don't let the strangers or people you don't trust join your QQ (but this is very un practical, at least I think this).
2. Using the proxy server (the proxy server English full name Proxy Sever, its function is the agent network user to obtain network information, more specifically, the transfer station of network information). The setting method is to click the QQ menu ==> System parameter ==> Network setting ==> Proxy setting ==> Click to use the SOCKS5 proxy server, fill in the proxy server address and port number, determine it, then quit QQ, Log in, this is getting it. (The address of the proxy server can be found to "Cuba Nebula" or "Act Hunter http://ipsky.3322.net"
There is also a lot of cracking tools for QQ password, you will generally not be cracked with complex points to set the password. Therefore, malicious attackers may use GOP Trojans, this is a Trojan with QQ password, I haven't used it, so I am not talking here. It is understood that after running GOP Troja, I will pop up the window. "Congratulations! You have a big prize! Please come to the company to claim prizes! With your relevant documents, remember!". Specific about Trojans, I will say next section.
Three: Agent Server Security
Being able to prevent malicious attackers from damaging you after using the proxy server. But there is no white lunch in the world, because your Internet profile will record the log from the agent service after using the proxy server, if you want to "care", you are a little bit of life. (Unless you enter the proxy server deleted his log: P) 4: Trojan prevention
Trojans, also known as the back door, straightforward, Trojans have two programs: one is a server program, one is a controller program. When your computer runs the server, malicious attackers can use the controller program to enter such a computer, and reach the purpose of controlling your computer through the command server program. Don't underestimate your mouse, record your keyboard buttons, modify the registry, remote shutdown, restart, etc. If you want to know how big the hazards of Trojans, I suggest you go to http://www.starkun.com to download a "ice river" research. This can make you step by step to become the best tools in the cross-risotic bird, don't learn bad because of the "Ice" ~~
If you want to know how Trojan, you must first understand the path of communication:
1: Mail spread: Trojans are likely to be sent to you in the attachment of the mailbox. So the people you don't know, you are best not to download, especially the attachment name * .exe.
2: QQ propagation: Because QQ has file transfer function, there are now many Trojans spread through QQ. Malicious destroyers typically tied Trojan server to tie together by merged software and other executable files, then lie to you is a fun stuff. If you accept it, you have become a hippo.
3: Download Communication: It is possible to download Sites with Trojan Server when downloading software in some individual sites. So it is recommended to download the tool to best get a well-known website.
In case you don't miss the Trojan, open your anti-virus prior, and then wait for the wood horse! kill! kill! (The current anti-virus program can kill a big wooden horse). In addition, I don't say it, I don't say it, this involves registry knowledge, and no anti-virus program is convenient (I think so).
5: Virus anti-killing
Computer viruses refer to destroying or destroying data inserted or destroyed in computer programs, affecting computer usage, and self-replicating a set of computer instructions or program code.
From the current discovery virus, the main symptoms after computer infectious viruses are:
1: Because the virus program hides a part of the person or the operating system hides the bad cluster, the disk is neutralized to increase.
2: Because the virus program is attached to the executable head or inserted, the can be increased.
3: Due to the virus program puts its own special sign as a label, the contactless disk appears special label.
4: Due to the virus program itself or its replica constantly invading the system space, it makes the available system space becomes small.
5: Due to the abnormal activity of the virus program, there is an abnormal disk access.
6: Slow system guidance due to the virus program attached or occupied by the guiding portion.
7: Lost data and programs.
8: The interrupt vector changes.
9: Print the problem.
10: Cancer is increasing.
11: Generate an invisible table file or a specific file.
12: There is an abnormal activity in the system.
13: There are some meaningless picture greetings, etc.
14: The program runs an abnormal phenomenon or unreasonable results.
15: Disk volume label name changes.
16: The system does not know the disk or hard disk, and cannot boot the system.
17: Cannot call the Chinese word library or print the Chinese characters in the system.
18: The prompt of the floppy write protection appears on the screen when using the floppy disk without a write-protected software. 19: Exceptions require the user to enter the password.
You want to try the taste of the Chinese virus to go to cn.yeah.net> http://badbocn.yeah.net to download the viral infection simulator.
If you have the above situation now, don't hesitate to follow the following steps:
1: Turn off the power immediately.
2: Look for "declare clean" DOS system disk launch computer. At this time, remember to close this disk write protection.
3: Scan the virus with anti-virus software.
4: If the detection is a file poison, there are three square test processing: delete files, rename files, or remove viruses. Remember: Don't make ingredients to poison files, especially you can't stay in the executable.
5: If you detect a virus in a hard disk partition or boot area, you can perform the fdisk / mbr command with the fdisk command in a clean DOS disk to restore the boot information of the hard disk; or drive in A A: /> SYS C: (C: is a poisoning disk) to save the information of the hard disk boot area.
6: Now, you can re-establish the file, reinstall the software, or prepare backup materials, please remember that backup information should be scanned before re-importing the system, to prevent first.
7: Millions Remember, re-establish the document until start running. The entire system should be scanned again to avoid poisoning files in the system.
8: You can now operate your computer at your heart.
Note: Remember to update a virus library every week.
Six: Internet cafe safety
The content here is very simple, let you understand. If you use QQ when you go online online, go your own mailbox (or other places you need to enter your password). Then please leave the Internet cafe is, to C: Program FileStence deletes your own QQ number in the folder. Go to C: WindowsCookies deleted the contents of you inside. You can rest assured that you can delete your password.
But now many Internet cafes are installed with "Me Ping", so you can't access the local C drive directly, so I suggest not use QQ and enter the need for password in Internet cafe (more disgusting network management setup keyboard records in Internet cafes) . If you are sitting in a network, you will see this article, and there is QQ and friends chatting. Then you can type C:, so you can access the C drive on the address bar of Tencent's browser. But now the safety software of Mad Internet cafes rose, this trick is not necessarily available. The theme of this article is not here, I will not say much. 7: Safety anti-black tool
Download a Tianwang firewall personal version (http://www.sky.net.cn download) and Jinshan drug tyrants (all major websites have downloaded). This is sufficient for individual users.
This site is also available