5 ways to be safe when using public computers

Are public computers safe in libraries, Internet cafes, airports or in stores?

It depends on how you use them! Follow the tips below to keep your personal and account information safe.

1, Do not save access information

Always log out of the logged-in websites by clicking 'log out' or 'Exit' on the website. It is not safe if you simply close the browser window or enter another web address, because you really have not exit the system you have accessed.

Many programs (especially instant messaging programs - like Yahoo Messenger, etc.) have automatic access features by saving user and password names. Please disable this feature before you visit.

2, Do not leave the computer when sensitive information still appears on the screen . If you are not using a public computer, exit all programs before you leave and close all windows that display sensitive information.

3, Delete the saved information

Web browsers such as Internet Explorer always keep password information on the pages you have visited, even if you have closed the browser window or logged out.

5 ways to be safe when using public computers Picture 1 Disable password storage

Before going to the web, turn off the feature that can save your password on Internet Explorer by following these steps:

- In Internet Explorer window, click Tools > Internet Options

- Select the Content tab and click AutoComplete (in IE7 is in the AutoComplete section click Settings )

- Completely remove all relevant fields of user, password.

Delete temporary Internet files and history on the browser

When not using a public computer, you should delete all temporary files and history on your browser by:

- Go to Internet Explorer, select Tools > Internet Options

- On the General tab, under Temporary Internet files , click Delete Files , then Delete Cookies .

- Under History , click Clear History .

Delete other files saved from company information (like Sharepoint Portal Server)

If you use the company's corporate website to allow internal company documents to be viewed, you can casually save sensitive computer memory. Follow these steps to remove them from your computer

- Delete all files located in the temporary folder of the account in use, this folder is located in the path C: Documents and SettingsusernameLocal SettingsTemp

- If your company uses Microsoft Office SharePoint Portal Server, delete the temporary folder of this section ( My DocumentsSharePoint Drafts )

4, Watch out for those snooping over your shoulder

When using a public computer, you must always watch out for information thieves by watching you enter sensitive passwords, to collect your information, as this is the simplest and most effective way. Pay attention, be on the lookout or behind you!

5, Do not enter sensitive information into public computers

This method is intended to prevent those who accidentally get information, who use the computer behind you.

But there are also a few "diligent" thieves who use the installation of sophisticated software on public computers. These software will retrieve all information through keyboard typing and then email address information for the installer.

Nothing will happen if you don't save important information or delete all sensitive information according to the steps above.

If you really want to be safe, avoid entering credit card information, financial information or any other sensitive information on any public computer.

4 ★ | 1 Vote

May be interested

  • Learn about 'Honeypot' and 'honeynet'Photo of Learn about 'Honeypot' and 'honeynet'
    in the myriad of measures to prevent hackers from breaking into the system, the 'honeypot' and 'honeynet' are considered one of the pitfalls designed with the item. this destination.
  • Solution to increase enterprise application performance and secure remote accessPhoto of Solution to increase enterprise application performance and secure remote access
    carlsberg a / s, one of the world's largest beer brewers, announced the deployment of juniper networks dx data center application accelerators to enhance the performance of hyperion applications in the background. web platform. access to this application will also be secured by the application
  • 10 simple tips to keep your instant messages (IM) safePhoto of 10 simple tips to keep your instant messages (IM) safe
    communication using an instant messaging program (such as yahoo messenger, msm, google talk, ...) has become more and more popular and is one of the privacy secrets for information rather than email. but whatever it is & agra
  • Vietnamese costume on Yahoo MessengerPhoto of Vietnamese costume on Yahoo Messenger
    the avatar (avatar) in the chat window becomes more dear when the character has its own character of the country. a girl can wear a four-piece or three-piece shirt. and the boy will wear a hat, park a motorbike on ho guom lake.
  • 10 tips for using IM in businessesPhoto of 10 tips for using IM in businesses
    instant message - an original technique designed for personal conversation between one person and another in a work place. many people are choosing im communication in writing rather than phone calls or emails.
  • Instructions for choosing a Web Hosting providerPhoto of Instructions for choosing a Web Hosting provider
    do you feel confused, complicated and difficult to make decisions? that is the symptom of those who have designed the website but have not found a suitable web hosting provider.