Online security: 80 steps of defense for NET users - Part II

Every time you search for purchases on the Internet, you need to be careful with websites that you do not understand, have no relationship, have no trust or you have not known anywhere. Even websites are listed on Google's search results list or a degree

Online security: 80 steps of defense for NET users - Part II Picture 1Online security: 80 steps of defense for NET users - Part II Picture 1 4. Be careful with bargains

Every time you search for purchases on the Internet, you need to be careful with websites that you do not understand, have no relationship, have no trust or you have not known anywhere. Even the websites listed on Google's search results list or another search engine are not sure to be trusted. The service provider does not have time to check those sites for you.

It can be said that in the past time, security companies in the world have made great contributions in 'masking' many fraudulent sales promotion pages.

Often online scammers put a lot of links to their website on search engines along with great discount offers in the hope of pulling more and more people into their websites. Links of this type will often send users to websites that contain forms that require users to fill in information about the card's owner name, number, expiration date and CVV number. After the user provides all of the above information, they will not get anything but only an error page along with instructions they send money by post. But in fact they have lost their ownership of their payment card, losing their money.

That same scam but now phishing - or the way online scammers fake reputable companies send emails to customers with content containing a link where they must also enter The same information as mentioned above. The measure has completely changed.

So users should always be cautious so look for reliable and well-known online shopping websites. Be careful with offers that offer discounts that are too good.

5. Back-up 'System State' in Windows 2000

Back-up application of Windows 2000 operating system (Start | Programs | Accessories | System Tools | Backup) has a feature of backup copy of 'System State' which allows users to restore Recover the system quickly in case the computer is attacked.

Normally this application will back-up the following parts: boot files, database COM + registration system and registry. If the PC belongs to a domain name (domain), it will copy and store additional dynamic directory systems (Active Directory - NTDS) and SYSVOL. If the system is a server, all data will be copied and stored.

There are many disasters including security disasters as well as other disasters that can be quickly recovered from these back-up versions. Besides, Backup programs also have a convenient scheduling feature for you.

The best solution is to always backup your system for the purpose of quickly protecting and restoring your system.

6. Back-up the Windows operating system Registry

The Windows Registry is a database that stores almost all Windows configuration information. If there is a problem with the Registry, then your operating system will have problems. So to be safe, you should also backup them regularly in case you have to kill a virus that requires intervention in the Registry, for example, or restore the Registry.

To backup the Registry, please do the following:

You go to Start | Run, and then type Regedit

When the Windows Registry Editor window appears, click on the My Computer icon in the left-hand pane.

Go to File | Export, select the folder you want to save the Registry, check 'All' instead of Selected Brach then select Save as done.

To restore the Registry you just need to go to File | Import then click on your Registry back-up file to finish.

Online security: 80 steps of defense for NET users - Part I

4 ★ | 1 Vote