Online security: 80 defensive steps for NET users - Part 3

Whether your computer is 3 years old or only 3 days old, they all face similar security problems. Viruses and worms computers always stalk your system every time you l & e

Picture 1 of Online security: 80 defensive steps for NET users - Part 3
Whether your computer is 3 years old or only 3 days old, they all face similar security problems. Viruses and worms computers are always stalking your system every time you go online; Spyware hides in e-mails or attempts to break into the system through online advertisements; malicious trojans at any time and follow your footsteps in life online and ready with the phishing worms to tear up the system to steal your personal information, destroy the system your system

7. Be careful with public hotspot Wi-Fi

Good public wi-fi hotspots are becoming increasingly popular. Some connection points are free, while others are chargeable, but all have the same point of security risks. Statistics show that a lot of hotspot points are insecure that could allow malicious hackers to access to store or take away many things from this network. In an enterprise environment, a wireless connection system that lacks security can allow competitors to access the network and steal corporate secrets or even turn the company's network into archive of copyrighted works or pornographic websites.

For laptop users, the easiest way to get rid of any attack threats when accessing a public wireless network is to disable file sharing and install a personal firewall. .

8. Be careful when reading online email archives (Mailing list)

Online Mailing is a huge resource for all kinds of information, especially online mailing archives. Messages collected and stored in public warehouses can be found via Google. These repositories are quite similar to Inbox in your mailbox, just another thing that anyone can read without logging in.

While such collections are really a 'bargain' for those seeking online information, it also has many potential security threats. If the information storage server of this type is not regularly scanned for viruses or removes attachments in messages, there may be a number of different security threats such as the worm worm virus. Trojans or other malicious scripts.

During the experimental study of this fact, we found some W32 / Netsky viruses hidden in attachments .

9. Beware of 'fake' antispyware and pop-up software

Spyware is a threat to today's online life, as well as pop-ups that always annoy you when you're online.

If you are looking for an application that can block pop-ups, the free apps from Google, MSN or Yahoo are also quite good, or Windows XP SP2 has built-in pop-blocking. Very effective upload. Even a good set of anti-virus software often comes with a pop-up blocking application.

For spyware, you can use popular spyware-blocking software such as Ad-Aware, Spybot Search and Destroy or SpySweeper - all of which have a free version and perform tasks. Its pretty good.

However, sometimes the popularity of these software depends too much on the ads that polish them in magazines. Especially antispyware software is advertised through pop-ups or other types of advertising that make users feel annoyed because they try to convince users to download them. But it is worth it when these software only allow you to scan your entire system, but if you want to exclude these types of spyware, you must register to use the license. Not only that, but some of the software also offers fake reports that your computer is seriously infected with spyware to force users to buy their software. Even using some malicious code affecting the connection, not allowing users to remove it is also just to force users to buy their software.

So how can you distinguish a completely reliable product from a fake product?The usual rule is that if software developers advertise their products through pop-ups, the software is worth suspecting.Pop-up ads often recommend that your system is infected with spyware.While some commercial software often offers a free scan service and accurately informs your system's status - not reporting the serious spyware infection status of the system . so you should be cautious.

Online security: 80 steps of defense for NET users - Part II
Online security: 80 steps of defense for NET users - Part I

Update 25 May 2019
Category

System

Mac OS X

Hardware

Game

Tech info

Technology

Science

Life

Application

Electric

Program

Mobile