Select Menu

Combined Post

Mag Posts

Popular Posts

windows

Hardware

Laptop

news

internet

computer repair

Video Posts

» » how to be safe on the internet


Unknown 12:44 PM 0


how to be safe on the internet

Use Quality Passwords




The dictionary defines a password "as an agreed formula to be recognized as a friend to has kept open a passageway." The word computer password allows access to the computer and the data it contains. It is, therefore, essential to know how to choose passwords quality; that is to say, difficult to find using automated tools, and easily guessed by a third party.



 Having an operating system and software update system browser, antivirus, office, personal firewall...


Most attacks are attempting to use a computer faults (faults of the operating system or software). In general, attackers look for computers whose software has not been updated to use the unpatched vulnerability and thus manage to get inside. That is why it is essential to update all software to correct these faults.




 Perform regular backups


One of the first principles of defense is to keep a copy of their data in order to respond to an attack or malfunction. Backing up your data is a prerequisite for the continuity of your business.



 Disable default ActiveX components and JavaScript


ActiveX components enable JavaScript or attractive features, but they also present security risks up to the takeover go by an intruder a vulnerable machine. Despite the inconvenience, this may cause; it is advisable to disable their default interpretation and choose to activate only when necessary and is believed to be a trusted site.




 Do not click too fast on links


Conventional attacks aimed at deceiving the user to steal personal information is to encourage them to click on a link within the message. This link may be misleading and malicious. Rather than clicking on it, you better grab yourself the website address in the address bar of the browser. Many problems will have avoided.




 Never use an administrator account to navigate


The computer user has privileges or rights thereon. These rights allow or not to conduct certain actions and to access some files on a computer. One distinguishes rights referred administrator rights and so-called single user. In most cases, a simple user rights are sufficient to send messages or surf the internet. Limiting the rights of the user's risk of infection or compromise the network also limit.

- See the configuration guides on the rights of users


Check the dissemination of personal information


The internet is not the place of anonymity, and the information is allowed to escape it instantly! In this context, it is good practice never to leave personal information in forums, never enter personal and sensitive information (such as bank account details) on sites that do not provide the necessary guarantees. When in doubt, it is best not ...




 Never relay hoaxes


Never relay messages like chain letters, lucky or financial pyramids, call solidarity, virus alerts... Whatever the sender rebroadcast these words may be confusing and saturating the network.




 Be careful: the internet have populated by unknown street!


We must remain vigilant! If, for example, a well-known correspondent and with whom you regularly exchange mail in French, send a message with a title in English (or other language) should not open it. In the case of doubt, it is always possible to confirm the message by calling. In general, do not trust mechanically to sender's name appears in the message and never meet a stranger without a minimum precaution.


 Use caution when opening attachments to an email: they often peddle malware.


One of the most effective ways to spread malicious code methods is to use email attachments. To protect themselves, never open attachments with the following extensions: ..... Pif (eg an attachment called "photos.pif) com, bat, exe, vbs, lnk A l.. Conversely when you send files attachments to emails prefer sending attachments in the most "inert" possible as RTF or PDF for example. This size room reduces the risk of information leakage


«
Next
Newer Post
»
Previous
Older Post

No comments

Leave a Reply