Saturday, January 1, 2011
【 Weak current College 】 LAN computer settings for the exchange of visits (3)
III. classification set password and make cryptography settings as complex
On various occasions to use a different password. Online you will need to set up a password of many places, such as online
Banking, Internet account, E-Mail, chat rooms, and some of the Web site's membership. Where possible, use not
The same password to avoid a password disclosure causes all information leakage. For important passwords (such as network
On the banks of the password) must be set individually, and you are not the same as with other passwords.
Set the password to avoid using meaningful English words, initials, and birthdays, electric
Words number easily compromised characters for the password, it is best to use characters and numbers mixed password.
Not just for the sake of convenience in the dial-up connection when you select the "Save password" option; if you are using
Email client software (OutlookExpress, Foxmail, Thebat, etc.) to send and receive important
Electronic mailbox, such as ISP mail e-mail, set account properties to do not use "in mind
Recalling password "function. Because although the password in the machine is stored encrypted, but such
Encryption is not insurance, some rudimentary hacker can easily crack your password, and now network
There are many hacking software available for download, for example software, download caption-it! website at
Ftp://www.computerinfo.com.cn/utilities/other/caption-it.zip, Lee
With it you can easily get your saved passwords.
Periodically change your Internet password, at least once a month to change, so you can ensure that even if
The original password disclosure, but will also reduce the losses to a minimum.
Fourth, do not download the dubious software and program, do not open the email from unknown sources and accessories
Do not download the software and dubious. Almost all Internet people are downloading over shared
Software (especially the executable file), in a convenient and fun at the same time, also slipped a
Some of the things you are welcome to your machine, such as viruses. Therefore you should choose the credibility better download
Download software, download software and programs focused on non-boot partition of a directory, in the
Use the best available anti-virus software before killing the virus. Conditional, you can install a real-time monitor virus
Software, at any time to monitor the online delivery of information.
Don't open email from unknown sources and its attachments, so as not to suffer a virus mail. In
Internet there are many kinds of virus epidemics, some viruses are spread through e-mail (such as Merry
Sara, the love bug, etc.), these virus mail normally to the title with gimmicks to attract you open its by-laws
Pieces, if you resist the temptation to resist it, and download or run the attachments, then the next???
So for the mail from unknown sources should be turned away.
5. watch out for "phishing"
At present, some hackers use online "phishing" method for fraud, as set up fake Web sites
Or send an email containing a fraudulent e-mail, stealing online banking, online securities or other e-commerce
User account passwords, steal user funds of criminal activities. Public security organs and
Banking, securities and other relevant departments to remind online banking, online securities and e-business users to improve police
Deemed necessary to prevent the deceived.
At present the "phishing" mainly practices in the following way:
(1) send an email to lure users zhongquantao false information. Fraud molecules to spam
Form a large number of send fraudulent messages, these messages more to win, consultant, reconciliation, and other content to entice with
Fill in the e-mail account and password, financial or in a variety of pressing reason to require recipients to sign a
Web page submit the user name, password, social security number, credit card numberand other information, then steal user funds.
(2) establishment of fake online banking, online securities Web site, the user account password implementation of theft.
Criminals set up domain name and Web page content and real Internet banking system, online stock trading platform
Very similar to the Web site to lure users to enter information such as account password, and then pass true for Internet banking
, Internet securities system or fake bank credit cards, securities trading card theft of funds; the use of cross-
Stop script, that is, use the legitimate Web server program on the vulnerability of the site, some Web pages to insert evil
Italy HTML code, shielding live some can be used to identify Web sites and false information, the use of cookies
To steal user information.
(3) the use of false with the intent to defraud, e-commerce. This type of crime are often established e-commerce
Web site, or in more well-known, large e-commerce Web site for publishing false information, merchandise sales
Criminals in the victim's shopping remittances received after disappeared.
(4) use of Trojans and hacker techniques, and other means to steal user information after theft activity. Horse sculpture
The author by sending a message or in the site, hidden Trojan horse program in a big spread, when infected wood
Ma users online transactions, a Trojan that is the way to the keyboard logging for user accounts and dense
Code, and sent to the specified mailboxes, users would be seriously threatened.
(5) the use of weak passwords, users of crack, guess user vulnerabilities account number and password. Unscrupulous elements
Some users of convenience set weak password vulnerability on bank card password cracking.
> In fact, lawless elements in implementing network fraud criminal activity, often taking more than a few
Way interleaving, facilitate, through SMS, QQ, MSN for a variety of "
Phishing "wrongful activity. Anti-phishingorganization APWG (Anti-PhishingWorking
The latest statistics Group) noted that some 70.8% network fraud for financial institutions. From domestic
The first few years at most Phishing are just being used to cheat QQ password and game point card and equipment, but
This year's domestic numerous Bank has repeatedly been Phishing. You can download some of the tools to prevent
NetcraftToolbar Phishing activities, such as, the software is on the IE Toolbar, when users open
Restart IE's Web site, it will check whether the intercepted dangerous or suspicious Web site, if in the case of this range
Stops connecting to the Web site and display prompt.
VI. protection against spyware (Spyware)
The recently announced a home computer to the survey, approximately 80% of users on spyware into
Invading their computer without knowledge. Spyware (Spyware) is a condition of the user's knowledge
Secretly install under conditions (after installation are hard to find it in me), and quietly to intercept the information sent to the
Three software. Its history is not long, but to date, spyware has tens of types. Room
Spy software is a common feature is the ability to attach to the shared file, executable image and a variety of free
Software, and managed to sneak into the user's system, and the user unaware of this. The main spyware
Purpose is to track a user's surfing habits, some spyware can also log the user's keyboard activity, fishing
Catch and send screen images. Spyware is always comes bundled with another program, the user cannot find it
Who is going to be installed. Once the spyware access to computer systems, to thoroughly clean them
It would be very difficult, and spyware often become criminals in the hands of dangerous tools.
From general users can do in terms of method, to avoid spyware intrusion, available from the following three
These approaches:
(1) the browser to a higher level of security — InternetExplorer preset to provide
Basic security protection, but you can adjust the level set. Will the InternetExplorer
The security level to "high" or "China" can help prevent downloading.
(2) installed on your computer from spyware applications (such as MircrosoftAnti
Spyware is a program specifically for Spyware, support Windows2000/XP/2003, it is
Used to monitor and remove system Spyware and other potentially untrusted program software),
Constantly monitor and clear the computer's spyware to block software external unauthorized communication.
(3) to be installed on your computer select shared software screening, especially those that you
Not familiar with, you can log on their official Web site for details; during the installation of shared software, do not always heart
Not all the way in how to click the "OK" button, and you should carefully read the various steps of the terms of this agreement, the Special
Don't pay attention to those related to spyware behavior.
7. only as necessary to the shared folder
Do not assume that your intranet shared file is secure and you are sharing a file at the same time
There will be a software vulnerability is rendered in front of the unexpected Internet, the public can freely access the
Some files, and is likely to be malicious exploitation and attack. Therefore share files should set a password
Once you do not need to be shared immediately shut down.
Generally do not set the folder sharing, so as not to be malicious from entering your calculation
Machine's springboard.
If you do need to share a folder, the folder must be set to read-only. Typically shared setting "
The type of access do not select the "full", "option because this option will result in a total of as long as they can access this
Enjoy the folder can be all content be modified or deleted. Windows98/ME share
The default is "read only", other machines cannot write; shared default Windows2000 is "writable"
The other machines can delete and write to a file, on user security threat.
Do not use the entire hard drive is set to shared. For example, a visitor will delete a system file, will
Cause your computer to crash the system overall, could not be started.
8. do not randomly browsing the hacker sites, porn site
This needless to say, not only a moral dimension, and nowadays many viruses, Trojans and spyware
Came from a hacker website and porn sites, if you have these on the site, and your personal computer happens to be
Without careful precautions, HA HA, you will in all likelihood.
9, regularly back up important data
The importance of data backup, whether you be admitted that the preventive measures how closely do, nor
Completely prevent "road always prevails over the force of Justice". If you suffered fatal attacks, operation
System and application software can reload, and important data you rely on your daily backup. Therefore, the
No matter how closely you have taken the precaution, do not forget to always back up your important data, Do
The prepared!
Download tips
When we need some information. say, we now need to go to school, graduation thesis (need from the Internet
Down), we need to work in the company of the relevant information (also needs to be downloaded from the Internet). then we
Just a big search on the network (such as GOOGLE, baidu, 3721) search to a suitable drop, of course
Is a Web page form drops, we copy them down, and then paste it into WORD, but others
The author to protect their articles are not infringed, they will be added to your code so few statements, so that you
Cannot select, cannot copy to ... ... In short you can only read the article, then we will have a headache (
Not to copy, to follow this article will use keyboards into Word, and worry too much.), this time!!
Do not be afraid. simply select Favorites-add to Favorites, and then click on the first collection to the properties of the connection,
In URL, enter javascript: void (document.body.oncopy = ' '), and then repeat the
Next, enter javascript: void
(document.body.onmouseup=’’),javascript:void
(document.body.oncontextmenu=’’),javascript:void
(Document.body.onselectstart = ' '), and then click Favorites in the four connection,
You can achieve the usual options are copy-you can easily do you want a copy of the article into Word (
You want to store location). the following figure. According to the map the remaining two statements plus. Description. click four even
The next time there will be no reaction, that's normal. as long as you have a one click can drop
File delete terminator
File delete terminator
Dos-level file deletion methods, creating a clean new mode
Do not have to enter safe mode, you can delete all infected files
You can delete Icesword, killBox, Jinshan grinding, 2007 files cannot be deleted files
Support a restart bulk file delete
Test publishing address: http://egomoo.i170.cn/article_49634
Commonly used computer terms terminology encyclopedia
28VGA: 28 is the color of yellow dots on the display pitch (dots), the smaller the dot pitch, the monitor
Image the more delicate, the better, this is because the color screen each image is composed of a set of red, green,
Blu-ray together, because technically 3 beam of light is not 100 per cent to gather in context, thus
Produces a yellow dot of interval, the interval smaller screen display of the image clearer.
Is VideoGraphicsArray VGA (video graphics array) abbreviation.
Second 3DS or 3DStudio
3DS 3DStudio: ThreeDimensionStudio, or three-dimensional Photography Studio. Autodesk is the United States
The company launched a set of multi-purpose three-dimensional animation software, set solid modeling, static rendering, and animation authoring to
One, greatly popularized the 3-d modeling technology. It can be with the AutoCAD graphic information exchange,
Use scannerinput graphics, VGA and TV conversion interface animation output to TV or video
。
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment