Online security: 80 steps of defense for NET users - Part II

Online security: 80 steps of defense for NET users - Part II Picture 1 4. Be careful with bargains

Every time you search for purchases on the Internet, you need to be careful with websites that you do not understand, have no relationship, have no trust or you have not known anywhere. Even the websites listed on Google's search results list or another search engine are not sure to be trusted. The service provider does not have time to check those sites for you.

It can be said that in the past time, security companies in the world have made great contributions in 'masking' many fraudulent sales promotion pages.

Often online scammers put a lot of links to their website on search engines along with great discount offers in the hope of pulling more and more people into their websites. Links of this type will often send users to websites that contain forms that require users to fill in information about the card's owner name, number, expiration date and CVV number. After the user provides all of the above information, they will not get anything but only an error page along with instructions they send money by post. But in fact they have lost their ownership of their payment card, losing their money.

That same scam but now phishing - or the way online scammers fake reputable companies send emails to customers with content containing a link where they must also enter The same information as mentioned above. The measure has completely changed.

So users should always be cautious so look for reliable and well-known online shopping websites. Be careful with offers that offer discounts that are too good.

5. Back-up 'System State' in Windows 2000

Back-up application of Windows 2000 operating system (Start | Programs | Accessories | System Tools | Backup) has a feature of backup copy of 'System State' which allows users to restore Recover the system quickly in case the computer is attacked.

Normally this application will back-up the following parts: boot files, database COM + registration system and registry. If the PC belongs to a domain name (domain), it will copy and store additional dynamic directory systems (Active Directory - NTDS) and SYSVOL. If the system is a server, all data will be copied and stored.

There are many disasters including security disasters as well as other disasters that can be quickly recovered from these back-up versions. Besides, Backup programs also have a convenient scheduling feature for you.

The best solution is to always backup your system for the purpose of quickly protecting and restoring your system.

6. Back-up the Windows operating system Registry

The Windows Registry is a database that stores almost all Windows configuration information. If there is a problem with the Registry, then your operating system will have problems. So to be safe, you should also backup them regularly in case you have to kill a virus that requires intervention in the Registry, for example, or restore the Registry.

To backup the Registry, please do the following:

You go to Start | Run, and then type Regedit

When the Windows Registry Editor window appears, click on the My Computer icon in the left-hand pane.

Go to File | Export, select the folder you want to save the Registry, check 'All' instead of Selected Brach then select Save as done.

To restore the Registry you just need to go to File | Import then click on your Registry back-up file to finish.

Online security: 80 steps of defense for NET users - Part I

4 ★ | 1 Vote

May be interested

  • Chronic ... BluetoothPhoto of Chronic ... Bluetooth
    you've probably heard a lot about bluetooth connectivity. your mobile phone supports bluetooth connectivity. bluetooth supports data transfer rates of up to 720 kbps in the range of 10-100m. unlike infrared (irda), bluetooth connectivity is scalar and uses 2.4ghz frequency band.
  • Search for simplicity in GooglePhoto of Search for simplicity in Google
    innovation is always a confirmed advantage of google (goog). within 5 years, google's number of employees has skyrocketed from 100 to 4,200. revenue also increased from 19 million usd to over 3 billion usd respectively. encapsulating these two development trends is an increase in the number of categories
  • Computer user manual: Fix some common errorsPhoto of Computer user manual: Fix some common errors
    this section will introduce you to some tips and tricks to help you use your computer and network in the most effective way.
  • WEP - Security for wireless networksPhoto of WEP - Security for wireless networks
    in recent years, the information technology industry has witnessed a boom in the wireless network industry. wireless communication capabilities are almost inevitable in handheld devices (pdas), laptops, mobile phones and mobile phones.
  • Upgrade WindowsPhoto of Upgrade Windows
    you think windows is powerful and handy based solely on what microsoft offers? true but only in a very small part, because this 'glamorous' operating system always receives countless gifts and features
  • Online security: 80 defensive steps for NET users - Part 3Photo of Online security: 80 defensive steps for NET users - Part 3
    whether your computer is 3 years old or only 3 days old, they all face similar security problems. viruses and worms computers always stalk your system every time you l & e