5, using data encryption
For those security-conscious computer users or system administrators, there are different levels of data encryption can be used, according to the need to choose the correct level of encryption is usually based on specific The situation is determined.
Data encryption can range from encrypting files one by one to encrypting file systems, and finally encrypting the entire disk. In general, these encryption levels do not include encryption of the boot partition, because that requires decryption help from specialized hardware, but if your secret is important enough to spend this part of the money, you can also achieve this to the entire system. Encryption. In addition to boot partition encryption, there are a number of solutions to meet every level of encryption, including both commercial proprietary systems and open source encryption for every major desktop operating system. system.
Friendly Tips for Web Teaching: Regardless of the operating system you are using now, there are always some general recommendations for enhancing system security. If you want to harden your system to prevent unauthorized access and unfortunate disasters, the following precautions will definitely help you. 1. One of the easiest and most effective ways to increase security with a high-security password is to use one that doesn't easily
6. Protect your data by backup
Back up your data. This is one of the most important ways you can protect yourself in the face of disasters. A data redundancy strategy can include both simple and basic periodic copying of data onto a CD, as well as complex periodic automatic backups to a single server.
For systems that must maintain continuous online service without downtime, RAID provides automatic error redundancy to prevent one of the disks from failing.
Free backup tools such as rsync and Bacula can integrate automated backup solutions of any complexity level. Version control tools such as Subversion provide flexible data management, so you can not only do backup work on another computer, but you can also synchronize the same data with multiple computers without the hassle. Using subversion in this way, I was spared when the hard drive of my working notebook was damaged in 2004, which also illustrates the importance of regular backup of critical data.
7. Encryption-sensitive communication
A cryptosystem for protecting communications from eavesdropping is very common. The OpenPGP-enabled software for e-mail, the Off The Record plug-in for instant messaging clients, and the encrypted channel software for maintaining communications using secure protocols such as SSH and SSL, as well as many other tools, can be easily used to ensure Data is not compromised during transmission.
Of course, in personal-to-person communication, it is sometimes difficult to convince the other party to use encryption software to protect communications, but sometimes this protection is very important.
8. Don't trust external networks
In an open wireless network, such as in a local coffee shop with a wireless network, this concept is very important. If you are very cautious and alert enough to security, there is no reason to say that you can't use this wireless network in a coffee shop or some other untrusted external network. However, the key is that you must ensure security through your own system, and don't believe that external networks are as secure as your own private networks.
For example, in an open wireless network, it is necessary to use encryption to protect your sensitive communications, including when you connect to a website, you might use a login session cookie. To automatically authenticate, or enter a username and password for authentication. Also, be sure not to run network services that are not required, because if there are unpatched vulnerabilities, they can be exploited to threaten your system. This principle applies to network file system software such as NFS or Microsoft's CIFS, SSH servers, Active Directory services, and many other possible services.
Check your system from both internal and external sources to determine what opportunities can be exploited by malicious security breachers to threaten your computer's security and ensure that these entry points are closed as much as possible. In some ways, this is just an extension of the two security recommendations for turning off unwanted services and encrypting sensitive communications, and you need to be more cautious when using external networks. Many times, protecting yourself in an external, untrusted network will actually require you to reset the security configuration of your system.
9. Using Uninterruptible Power Supply Support
If you just don't lose files during a power outage, you may not want to choose to purchase a UPS. In fact, it is recommended that you use UPS, there are more important reasons, such as power conditioning and avoid file system damage. For this reason, make sure your operating system can remind you when it will be turned off so that you don't be at home when the power is exhausted, and be sure to ensure a UPS that provides power conditioning and battery backup.
A simple surge protector is not enough to protect your system from "dirty electricity." Remember, UPS plays a key role in protecting your hardware and your data.
10, monitoring system security is threatened and intrusive
Never think: because you have taken a series of security measures, your system will not be vulnerable to security breaches Invasion. You should set up some types of monitoring programs to ensure that suspicious events can quickly get your attention and allow you to track whether it is a security breach or a security threat. We not only monitor the local network, but also perform integrity checks and use some other local system security monitoring technologies.
There are many other security precautions depending on the operating system you are using. Some operating systems have larger security issues due to design reasons. And some operating systems allow experienced system administrators to greatly improve system security. However, whether you are using Microsoft's Windows and Apple's Mac OSX, or use open source operating systems like Linux, FreeBSD, etc., when you are strengthening their security, the above suggestions must be kept in mind.
Do you feel that your computers system has too much garbage, and there is no way to clean it up. Is
Some users will set a power-on password for their computer in order to better protect the privacy of
Many friends of WinXP system installed the latest SP3 patch, found that the Internet speed is slower
We know that in Microsofts Windows XP/Server 2003 operating system, when we browse BMP, JPEG, GIF, G
How to integrate Tomcat with Apache server under Windows system
How does WinXP compress and increase the capacity of the hard disk?
System technology: reloading is not the first choice, the repair system has a coup
Details the applications of the ignored spacebars
Explain how the windows program runs
Optimize system BIOS 14 big moves
What method can enhance the system startup password
Several reasons why Windows systems are slowing down
Why can't I install Windows XP in DOS mode
Teach you how to disable the worm to replace the explorer file
Windows Notepad software automatically adds date and time methods
How does Win8 remove the white loading words and progress bar at startup
Give xp installation disk to lose weight
How to change the system sound scheme in Windows 8
Can hiberfil be deleted? How to delete hiberfil.sys hibernation file?
Win10 folder can not be renamed how to do win10 can not rename the folder solution
Use the Windows 7 file library to collect important files
Windows system setting boot menu Select timeout waiting time method
How to get super administrator rights in Win8 system
Win10 can not enter the BIOS after booting how to install Win10 can not enter the BIOS how to do