Fix 7: Form anti-phishing habits
"Phishing" attackers use fraudulent emails and fake Web sites to conduct fraudulent activities, and fraudsters often reveal their financial data, such as credit cards. Number, account and password, social security number, etc. In this regard, you can take some simple steps to implement anti-phishing.
The easiest way is to not open links to any unknown websites. Moreover, the habit of using web tags can help you not be scammed by certain websites. If you are too troublesome to do this, then you must use at least the latest version of the browser, such as the latest version of browsers such as Firefox or Opera. These browsers have built-in anti-phishing features.
In addition, you need to pay special attention to the URL address, there are many attacks using phishing to phishing. For example, when you see "http://adwords.google.com.d0l9i.cn/select/Login" (provided by anti-phishing website Phishtank.com, link address: http://www.phishtank.com/blog/2008/05/05/phishtank-april-08-stats-are-live/), it is very likely that I immediately thought of a link to a website under Google. In fact, it does not belong to Google, but an unknown link under d0l9i.cn.
Figure 9: Phishtank Anti-Phishing
Repair 8: Securing Personal Websites
Operating a personal website is not easy. Every web page looks dynamic and digital, but there may be a variety of attacks and counter-attacks, fishing and anti-phishing in the background.
Hackers generally use some automated tools to search for vulnerabilities in websites. Once they find a vulnerability, they implant malicious code and attack visitors to your site. To protect your site's security, you can log in to use the fast security scanning feature on the Qualys.com website, and the services they offer are free. Before you start, you need to log in (click on the link: http://www.qualys.com/forms/trials/freescan/?lsid=7038) and fill out the form to request a free scan.
Figure 11: Qualys scans need to fill in relevant information
Next, download the Scrawlr tool - a SQL injection detection tool developed by Microsoft and HP (click here to download: http://Www.communities.hp.com/securitysoftware/blogs/spilabs/
archive/2008/06/23/finding-sql-injection-with-scrawlr.aspx), then install and use.
Figure 10: Scrawlr tool
In addition to scanning, but can not completely guarantee the security of your website. For example, sometimes scanning can't find malicious JavaScript code. This requires you to spend more time focusing on bug fixes. After all, if your site is hijacked, it will not only damage the site itself, but your reputation.
Fix 9: Remember and protect your passwords
In the current information age, passwords are almost everywhere. Password security is better than any security. However, as network applications continue to grow, more and more passwords need to be remembered. We must not only remember our own passwords, but also protect the security of our passwords. To this end, we have the following suggestions:
Use the soft keyboard to deal with the keystrokes. The soft keyboard is also called the virtual keyboard. When the user enters the password, first open the soft keyboard, then use the mouse to select the corresponding letter input. It is possible to avoid Trojan record keystrokes. In addition, in order to further protect the password, the user can also disturb the order of entering the password, which further increases the difficulty for the hacker to crack the password.
To maintain a strict password management concept, implement a regular password change, which can be changed monthly or quarterly. Never write your password on paper, and don't use passwords that are easily guessed by others.
Use different passwords for different network systems and use more secure passwords for important systems. Never use the same password for all systems. For those forums that log in occasionally, you can set a simple password; for important information, email, online banking, etc., you must set a complex password. Never set a forum, email, and bank account to the same password.
Fix 10: Clean up system garbage and viruses
Sometimes, the garbage and viruses stored in the computer system will not let you discover. In order to eliminate hidden dangers, we need to completely remove the computer. Garbage and viruses.
There are two better ways to clean up system garbage. One is to use third-party tools, such as the familiar Windows Optimizer and Super Rabbit. There is also a command line method, such as one-click cleaning. (Run in DOS environment). These two methods have their own advantages and disadvantages. I believe that everyone has their own experience.
WinXP boot, if there is a Missingor Corrupt Ntfs.sys error, the system will always be in the boot pr
In the process of using the computer, it takes a long time to use, and it will inevitably encounter
In your usual operation, it is inevitable to carry out the wrong operation, so that the system can n
Why is there no sound in the computer? What should I do if the computer has no sound? Computer users
The Internet icon on the desktop is deleted. There is a coup
Three coups to make WinXP system memory read and write errors without a trace
A few key points to avoid Windows XP system crash
Windows XP operating system security settings
Unique insights on WinXP wallpaper settings
Thirty-three coups to deal with malicious modification ie phenomenon
Vista instead of web control router is simpler
XP Explorer tool does not have "folder options" how to fix it?
Windows XP SP3 restarts PC continuously
Windows XP SP3 primary understanding
What should I do if the "My Computer" property of Windows XP system cannot be opened?
Win7 prohibits desktop creation of folder method
How to use the DIR command in the win7 operating system?
How to set wallpapers for multiple monitors in Win10 system?
Drag the computer's electronic calendar to the bottom of the taskbar and drag it out.
Peer: IE browser please give way Windows7 should be built in and highlight us
What should I do if the microphone cannot speak under the Win7 system?
Ubuntu system terminal removal program method
How to view the system backup VHD file
My computer icon in win7 system is gone
Five steps to get Windows 8 operating system can not shut down