Online security: 80 defensive steps for NET users - Part 3
Whether your computer is 3 years old or only 3 days old, they all face similar security problems. Viruses and worms computers are always stalking your system every time you go online; Spyware hides in e-mails or attempts to break into the system through online advertisements; malicious trojans at any time and follow your footsteps in life online and ready with the phishing worms to tear up the system to steal your personal information, destroy the system your system
7. Be careful with public hotspot Wi-Fi
Good public wi-fi hotspots are becoming increasingly popular. Some connection points are free, while others are chargeable, but all have the same point of security risks. Statistics show that a lot of hotspot points are insecure that could allow malicious hackers to access to store or take away many things from this network. In an enterprise environment, a wireless connection system that lacks security can allow competitors to access the network and steal corporate secrets or even turn the company's network into archive of copyrighted works or pornographic websites.
For laptop users, the easiest way to get rid of any attack threats when accessing a public wireless network is to disable file sharing and install a personal firewall. .
8. Be careful when reading online email archives (Mailing list)
Online Mailing is a huge resource for all kinds of information, especially online mailing archives. Messages collected and stored in public warehouses can be found via Google. These repositories are quite similar to Inbox in your mailbox, just another thing that anyone can read without logging in.
While such collections are really a 'bargain' for those seeking online information, it also has many potential security threats. If the information storage server of this type is not regularly scanned for viruses or removes attachments in messages, there may be a number of different security threats such as the worm worm virus. Trojans or other malicious scripts.
During the experimental study of this fact, we found some W32 / Netsky viruses hidden in attachments .
9. Beware of 'fake' antispyware and pop-up software
Spyware is a threat to today's online life, as well as pop-ups that always annoy you when you're online.
If you are looking for an application that can block pop-ups, the free apps from Google, MSN or Yahoo are also quite good, or Windows XP SP2 has built-in pop-blocking. Very effective upload. Even a good set of anti-virus software often comes with a pop-up blocking application.
For spyware, you can use popular spyware-blocking software such as Ad-Aware, Spybot Search and Destroy or SpySweeper - all of which have a free version and perform tasks. Its pretty good.
However, sometimes the popularity of these software depends too much on the ads that polish them in magazines. Especially antispyware software is advertised through pop-ups or other types of advertising that make users feel annoyed because they try to convince users to download them. But it is worth it when these software only allow you to scan your entire system, but if you want to exclude these types of spyware, you must register to use the license. Not only that, but some of the software also offers fake reports that your computer is seriously infected with spyware to force users to buy their software. Even using some malicious code affecting the connection, not allowing users to remove it is also just to force users to buy their software.
So how can you distinguish a completely reliable product from a fake product?The usual rule is that if software developers advertise their products through pop-ups, the software is worth suspecting.Pop-up ads often recommend that your system is infected with spyware.While some commercial software often offers a free scan service and accurately informs your system's status - not reporting the serious spyware infection status of the system . so you should be cautious.
Online security: 80 steps of defense for NET users - Part II
Online security: 80 steps of defense for NET users - Part I
You should read it
- New variant CoolWebSearch & SARS
- Online security: 80 steps of defense for NET users - Part 4
- New Alliance against spyware
- The standard of spyware is adopted
- How to use SpyHunter to remove spyware, anti-keylogger
- 14 most effective anti-spyware software
- 5 basic steps to eradicate Spyware
- 90% of computers infected with spyware ?!
May be interested
- What security measures should be used when paying bills online?paying bills online is a convenient way for you to stay in compliance with your obligations to service providers. however, this option comes with some payment security risks. here's how to minimize them and stay as safe as possible when paying online.
- Growth is booming, reaching $ 38 billion but Zoom is facing security and privacy concernsdespite the explosive growth in the number of users, zoom is being doubted by security experts about the security and privacy of users.
- Experts from Kaspersky make recommendations on organizing secure online meetingsmeasures to avoid cyber security risks when working online during an epidemic season
- Some popular fake security software - Part 2in the last few years, the number of rogue security software users has been increasing, especially for desktop users.
- MobiSafe - 'Armor' protects users against online threatsthe more open the cyberspace is, the more information security risks increase. this requires users to be more vigilant and equip themselves with additional security solutions to prevent harmful risks.
- 9 Free Online Privacy and Security Tools Worth Consideringthere are many online security tools that can provide on-demand security and enhanced privacy, no matter what device you're using.
- Everything You Need to Know About Hardware Security Keysfrom phishing to database breaches, protecting yourself online is becoming more and more difficult these days. hardware security keys are a viable solution to add an extra layer of protection to your online accounts.
- 5 things to do to avoid malwarestaying safe and online security is simple, as long as you have the right precautions. besides installing security suites or online antivirus software, follow these steps to keep your computer safer.
- The world is at risk of virtual warsecurity experts believe that the stuxnet virus, infiltrating some computers in iran's nuclear program, is part of a darker plan: to start an online war.
- Device security in 12 stepsthese 12 security steps will help you protect your computer, mobile phone or other digital devices safely.