Online security: 80 steps of defense for NET users - Part II
4. Be careful with bargains
Every time you search for purchases on the Internet, you need to be careful with websites that you do not understand, have no relationship, have no trust or you have not known anywhere. Even the websites listed on Google's search results list or another search engine are not sure to be trusted. The service provider does not have time to check those sites for you.
It can be said that in the past time, security companies in the world have made great contributions in 'masking' many fraudulent sales promotion pages.
Often online scammers put a lot of links to their website on search engines along with great discount offers in the hope of pulling more and more people into their websites. Links of this type will often send users to websites that contain forms that require users to fill in information about the card's owner name, number, expiration date and CVV number. After the user provides all of the above information, they will not get anything but only an error page along with instructions they send money by post. But in fact they have lost their ownership of their payment card, losing their money.
That same scam but now phishing - or the way online scammers fake reputable companies send emails to customers with content containing a link where they must also enter The same information as mentioned above. The measure has completely changed.
So users should always be cautious so look for reliable and well-known online shopping websites. Be careful with offers that offer discounts that are too good.
5. Back-up 'System State' in Windows 2000
Back-up application of Windows 2000 operating system (Start | Programs | Accessories | System Tools | Backup) has a feature of backup copy of 'System State' which allows users to restore Recover the system quickly in case the computer is attacked.
Normally this application will back-up the following parts: boot files, database COM + registration system and registry. If the PC belongs to a domain name (domain), it will copy and store additional dynamic directory systems (Active Directory - NTDS) and SYSVOL. If the system is a server, all data will be copied and stored.
There are many disasters including security disasters as well as other disasters that can be quickly recovered from these back-up versions. Besides, Backup programs also have a convenient scheduling feature for you.
The best solution is to always backup your system for the purpose of quickly protecting and restoring your system.
6. Back-up the Windows operating system Registry
The Windows Registry is a database that stores almost all Windows configuration information. If there is a problem with the Registry, then your operating system will have problems. So to be safe, you should also backup them regularly in case you have to kill a virus that requires intervention in the Registry, for example, or restore the Registry.
To backup the Registry, please do the following:
You go to Start | Run, and then type Regedit
When the Windows Registry Editor window appears, click on the My Computer icon in the left-hand pane.
Go to File | Export, select the folder you want to save the Registry, check 'All' instead of Selected Brach then select Save as done.
To restore the Registry you just need to go to File | Import then click on your Registry back-up file to finish.
Online security: 80 steps of defense for NET users - Part I
You should read it
- Learn about the Windows Registry - Part I
- How to turn on automatic registry backup in Windows 10
- How to enable automatic backup of Registry on Windows 10
- How to Make and Restore a Backup of the Windows Registry
- Backup and restore Registry in Windows XP (Part 1)
- 36 best free registry cleaning software 2018
- Backup and restore the Registry in Windows XP (The last part)
- Backup and Restore Registry in Windows
May be interested
- Chronic ... Bluetoothyou've probably heard a lot about bluetooth connectivity. your mobile phone supports bluetooth connectivity. bluetooth supports data transfer rates of up to 720 kbps in the range of 10-100m. unlike infrared (irda), bluetooth connectivity is scalar and uses 2.4ghz frequency band.
- Search for simplicity in Googleinnovation is always a confirmed advantage of google (goog). within 5 years, google's number of employees has skyrocketed from 100 to 4,200. revenue also increased from 19 million usd to over 3 billion usd respectively. encapsulating these two development trends is an increase in the number of categories
- Computer user manual: Fix some common errorsthis section will introduce you to some tips and tricks to help you use your computer and network in the most effective way.
- WEP - Security for wireless networksin recent years, the information technology industry has witnessed a boom in the wireless network industry. wireless communication capabilities are almost inevitable in handheld devices (pdas), laptops, mobile phones and mobile phones.
- Upgrade Windowsyou think windows is powerful and handy based solely on what microsoft offers? true but only in a very small part, because this 'glamorous' operating system always receives countless gifts and features
- Online security: 80 defensive steps for NET users - Part 3whether your computer is 3 years old or only 3 days old, they all face similar security problems. viruses and worms computers always stalk your system every time you l & e