Thursday, December 23, 2010
Weak current College】 【prevent QQ stolen several article proposals.
<br> Now the Internet has many ways to steal passwords, OQ QQ users without extreme to protect only remember QQ password to protect your privacy, in order to effectively prevent the chat transcripts, and other local information loss and theft can take the following measures .: <br> <br> 1. put your OQ upgrade to latest version <br> <br> Upgrade OQ, this is currently prevent hacker programs more convenient, more effective way. The latest official version with safety QQ2005, greatly enhanced the QQ .security. <br> <br> 2. use a complex password and uses the security settings, set the password for the local news <br> <br> First press the right mouse button, choose from the QQ on the icon "system parameters ."in the" system parameters "window select the" security settings "tab. Then select" enable local message encryption ", enter the password and confirm password. At the same time to insurance must tick the" enable local message encryption password hint, " .set question and answer, press the "OK" to make the setting to take effect. Start enter the account number and password OQ, the software also will be asked to enter the password for the local message, otherwise it cannot access. <br> .<br> 3. change the communication port address QQ <br> <br> QQ default communication port value is 8000, there are many OQ attack tools curing port value is 8000. Modify your QQ communication port value, it will be possible to reduce .the incidence of being attacked. <br> <br> 4. avoid spyware attacks <br> <br> Current network can find a lot of stealing QQ password Trojan software, but these Trojan software generally only record number of digits not exceeding 9 - .digit QQ login password, we can use for this feature, the "bait" to QQ number is set to more than 9 digits; for simple Trojan program, simply press [Ctrl + Alt + Del] can view their whereabouts; for concealed wonderful wooden .horse, you can click on the [start], Üí [attachment], Üí [System-Tools], Üí [System], see the software environment of "running tasks", if you discover a suspicious file, hurry up and write down .the path that follows it, into the appropriate directory to delete the file, and finally click on [start], Üí [run], enter "regedit" command to start the registry editor, locate the [HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ .CurrentVersion \ Run], [HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ Current \ Version \ Run \ Services] primary key, delete the key value that contains the path to the file. <br> <br> 5, stealth login methods <br .> <br> First find a previously successful login the QQ, QQ user login "," box to find your number, check the following "stealth login" box above, you can login. stealth If you are a first time on this PC log .on QQ, after a successful login you will be easy to get your address, it is best to select the "offline right now," and later you then choose the "stealth login". So that other people can't find your address. .<br> <br> 6. use the "select a proxy server" approach <br> <br> Set in the QQ one proxy server for others only see the proxy server's IP address. <br> <br> 7. do not .long-term online <br> <br> This can reduce the risk of being black. Because hackers to invade through a set of processes, including locate IP, scan address book, operation system analysis, vulnerability analysis, password cracking, etc, always .takes some time, so if you stay longer on the Internet, the hacker will have the opportunity to complete the invasion process. <br> <br>.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment