Network pseudo-common sense 1. What network security knowledge do you have?
1. Personal safety
The physical security of the network is the premise of the whole network system security. In the construction of campus network engineering, because the network system belongs to weak current engineering, the withstand voltage value is very low. Therefore, in the design and construction of network engineering, priority must be given to protecting personnel and network equipment from the harm of electricity, fire and lightning; Consider the distance between the wiring system and lighting lines, power lines, communication lines, heating pipes, cold and hot air pipes; Consider the safety of wiring system, insulated wire, bare wire, grounding and welding; It is necessary to build a lightning protection system, considering not only the lightning protection of buildings, but also the lightning protection of weak current withstand voltage equipment such as computers. Generally speaking, personal safety risks mainly include environmental accidents such as earthquakes, floods and fires; Power failure; Human error or error; The equipment is stolen or destroyed; Electromagnetic interference; Line interception; High availability hardware; Dual-machine multi-redundancy design; Computer room environment and alarm system, safety awareness, etc. Therefore, we should pay attention to these security risks and try to avoid the physical security risks of the network.
2. Network structure
The design of network topology also directly affects the security of network system. If the internal and external networks are interconnected, the machine security of the internal network will be threatened, and it will also affect many other systems on the same network. Propagation through the network will also affect other networks connected to Inter/Intra; The impact may also involve security sensitive areas such as law and finance. Therefore, it is necessary to isolate public servers (WEB, DNS, EMAIL, etc.). ) from the external network and other internal business networks, in order to avoid the leakage of network structure information. At the same time, the service requests of the external network are filtered, and only normal communication packets are allowed to reach the corresponding host, and other requested services are rejected before reaching the host.
3. System security
The so-called system security refers to whether the entire network operating system and network hardware platform are reliable and trustworthy. I'm afraid there is no absolutely safe operating system to choose from. Whether it is Microsoft Windows NT or any other commercial UNIX operating system, its developers must have their own back door. Therefore, we can draw the following conclusion: there is no completely secure operating system. Different users should analyze their networks in detail from different aspects and choose the most secure operating system as far as possible. Therefore, we should not only choose as reliable an operating system and hardware platform as possible, but also configure the operating system safely. Moreover, we must strengthen the authentication during the login process (especially before reaching the server host) to ensure the legitimacy of users; Secondly, the operator's operating authority should be strictly limited, and the operations he has completed should be limited to a minimum.
4. Application system
The security of application system is related to the specific application, involving a wide range. The security of application system is dynamic and constantly changing. Application security also involves information security, which includes many aspects.
5. The security of the application system is dynamic and constantly changing.
Application security involves many aspects. For the most widely used e-mail system on the Internet, there are more than twenty solutions, such as sendmail, scape Messaging Server and Software Post. Office, Lotus Notes, Exchange Server, SUN, etc. Its security means involve LDAP, DES, RSA, etc. The application system is developing constantly, and the application types are increasing. In the aspect of application system security, we mainly consider building a secure system platform as much as possible, and constantly discovering and repairing vulnerabilities through professional security tools to improve system security.
6. The security of application involves the security of information and data.
Information security involves the disclosure of confidential information, unauthorized access, destruction of information integrity, forgery, destruction of system availability and so on. In some network systems, a lot of confidential information is involved. If some important information is stolen or destroyed, its economic, social and political impact will be very serious. Therefore, users must be authenticated when using computers, the exchange of important information must be authorized, and the transmission must be encrypted. Multi-level access control and authority control are adopted to realize data security protection; Adopt encryption technology to ensure the confidentiality and integrity of information transmitted on the Internet (including administrator password and account, uploaded information, etc.). ).
7. Managing risks
Management is the most important part of network security. Unclear rights and responsibilities, imperfect safety management system and lack of operability may all cause management safety risks. When the network is subjected to other security attacks or threats (such as illegal operation by insiders), it is impossible to detect, monitor, report and warn in real time. At the same time, when the accident happens, it can't provide the basis for tracking clues and cracking hacker attacks, that is, it lacks the controllability and auditability of the network. This requires us to record the visit activities of the website at multiple levels and find illegal intrusions in time.
8. To establish a brand-new network security mechanism, we must deeply understand the network and provide direct solutions. Therefore, the most feasible way is to combine a sound management system with strict management. Ensuring the safe operation of the network and making it an information network with good security, expansibility and manageability has become the primary task. Once the above security risks become a reality, it is difficult to estimate the losses caused to the whole network.
2. Network security knowledge
Safe use of liquefied petroleum gas First, liquefied petroleum gas cookers should not be placed in bedrooms, offices, balconies, warehouses, auditoriums and other public places to prevent air leakage and fire.
Second, correctly grasp the use of the switch, wait for the fire, don't wait for the gas, remember to turn off the valve and switch after use, and replace the valve in time if it is broken. Don't let children use cookers or play with switches at will.
Third, when using liquefied gas, someone should guard and stay away. Pay attention to adjust the size of the fire head at any time to prevent the soup from overflowing and extinguishing the flame or being blown out by the wind, resulting in air leakage. Fourth, liquefied gas tanks should be upright, not upside down, not to mention boiling water or baking with fire.
Fifth, if gas leaks, measures should be taken immediately: open doors and windows, ventilate with fans (but not electric fans), and then find the leaking part. Basic knowledge of fire fighting (1) isolation method: this is a method to eliminate combustible materials.
(2) Asphyxiation method: prevent air from flowing into the combustion zone, reduce the oxygen content in the air, and make the fire source go out under the condition of insufficient oxygen. (3) cooling method: spray water or other fire extinguishing agents on the combustible materials to lower the temperature of the combustible materials below the ignition point and force the combustion of the materials to stop; Or spray water and fire extinguishing agent to combustible materials near the fire source to reduce the temperature of combustible materials and avoid the expansion of the fire.
(4) inhibition method. In case of fire alarm, call the fire brigade immediately "1 19" and organize personnel to put out the fire immediately.
When fighting, save people first, then save people, focus first, then put out the fire, and pay attention to disaster relief with the wind, especially in the field fire. When putting out a fire, generally use local materials, such as water, sand, soil and other fire extinguishing equipment, especially try to control the spread of the fire.
It is strictly forbidden to mobilize and organize primary and secondary school students to participate in forest fire fighting. At the same time, it is necessary to strengthen the education and management of primary and secondary school students who are not allowed to participate in forest fire fighting. In case of spontaneous forest fire fighting, schools and relevant departments should dissuade them in time to prevent unnecessary casualties.
Pay attention to the following points when giving an alarm: (1) Explain the district (county), street, town or village where the fire unit or household is located. When there are duplicate names, distinguish them so as not to find the wrong one.
There are similar or confusing words in place names or unit names, which should be emphasized and clarified. (2) You must quote the names of all units and streets, and do not use abbreviations.
(3) Explain what substance is on fire and the size of the fire. This is convenient for the fire brigade to decide the vehicles and police force it dispatched according to the burning object and the size of the fire.
(4) explain the name and telephone number of the alarm person. Because the telephone used by the alarm person is often close to the fire site, the fire brigade can use this telephone to ask the alarm person about the development of the fire site before the dispatched force arrives, which is convenient for command and mobilization. (5) After the alarm, people familiar with the situation should go to the nearest intersection to meet the fire truck or guide the passage, and provide the location of water source so as to quickly put out the fire.
To escape from a building fire, we should calmly analyze and not act blindly. Be clear about your floor, remember the location and direction of stairs and doors; Analyze the surrounding fire, don't blindly open the window to open the door, otherwise it will add fuel to the fire, and don't blindly run and jump off the building, causing undue casualties.
The second is to choose a good way to escape, and don't panic. If you must rush out of the building from fireworks, wrap your head and face, especially your mouth and nose, with wet towels, clothes and other clothes, and walk in a low posture to avoid suffocation.
If there is a fire downstairs, but it is not big, rush out of the stairs. If the stairs are broken and can't be washed out, you can use the tiger window, balcony and leaky pipe of the house, or tie them to solid doors and windows and heavy objects with ropes (which can be torn into ropes by clothes or bedding) and slide down from the windows.
If you are forced to jump from the second or third floor without the above methods, you should also throw some quilts and other things at this position to increase the buffer, and then press the windowsill to reduce the falling height and ensure that your feet land. If all kinds of escape routes are cut off by fire, retreat indoors and close the doors and windows. If possible, water the doors and windows to slow down the fire. You can also throw things out of the window and use a flashlight for help.
There are no elevators in the burning building. If household appliances or gas stoves catch fire, turn off the power supply or the switch of the cooker quickly, and do not splash water on the appliances, wires or gas stoves.
(2) Self-help in case of personal fire. If you are on fire, don't run, or it will burn more and more brightly.
You can try to take off your coat and hat, but you can tear it off and throw it away before it's too late. If it is too late, you can lie on the ground and roll, or jump into ponds, pools and rivers.
If there are other people present, you can use wet sacks, blankets, etc. Put fire on people. Never spray a fire extinguisher directly on a burning person, because drugs can cause wound infection. The third part is the safety knowledge of collective activities inside and outside the school. 1. To organize students to participate in labor and social practice, students must be given safety education in advance, with special emphasis on observing discipline, obeying management and obeying orders.
Activities are carried out under the guidance of teachers, and it is not appropriate to organize students to participate in special operations such as toxic, harmful, high temperature and heavy physical labor. (a), to prevent electric shock 1, don't use wet hands, wet cloth to touch, wipe the electrical shell, don't hang clothes or objects on the wire, or directly hang the wire on the nail.
2. Report the damaged wires, lamp holders, switches and sockets in time and ask someone to repair them. Do not touch them. 3. In case of fire caused by electrical equipment, cut off the power supply quickly and then put out the fire.
4, found someone get an electric shock, to get an electric shock from the power supply as soon as possible, and then take other rescue measures. Stay away from high-voltage charged bodies.
(2), to prevent falling objects 1, enter the construction site, must walk on the road in accordance with the provisions, must wear a helmet. 2, lifting loading and unloading, it is forbidden to stand under the lifting items, traffic.
Second, off-campus collective activities should pay attention to 1. Organizing students to participate in off-campus collective activities must be studied by school leaders in advance, carefully planned and strictly organized, and led by school leaders or teachers. It is necessary to send people to visit the activity site and environment in advance.
It is necessary to establish a system for reporting large-scale collective outing activities to higher authorities for approval. 2. If vehicles need to be used during the activity, they must meet the safety requirements, and must not be overloaded. They must not take cars or boats driven by people without driver's licenses.
3. Places, buildings and facilities participating in off-campus collective activities must be solid and safe, with smooth entrances and exits, complete and effective fire-fighting equipment in the field and properly placed. 4. Be sure to pay attention to the rationality of activities in the browsing area and amusement places.
3. How to enhance the awareness of online fraud prevention?
2. Winning Trap In shopping, some shopping malls will take many unfair commercial means to let you fall into the "trap" of consumption in the joy of winning the prize.
They may take a shopping lottery to let you win the prize, and the prize is to buy some goods at a "preferential" price; Or give you a discount coupon, so that you can buy it again under the attraction of discount, and when you get home, you find that you have bought some unnecessary goods, and you regret it. 3. This kind of ATM should be wary of some swindlers posting "emergency notice" on the bank's ATM: Our ATM is out of order, please follow the following procedures.
This is probably a trap set by a liar, and the money is likely to be deposited in the liar's account, which will bring huge property losses to some unsuspecting citizens. 4. Teach you to distinguish counterfeit money. First, look at the color: bright colors, clear patterns and clear lines; The second is to touch the paper: strong and heavy; The third is to listen to the sound: the sound is crisp when rubbing, and it sounds "squeaky"; The fourth is to identify the watermark: you can see the watermark pattern against the light.
5, go out to avoid chaos "making friends" People who often travel alone will inevitably chat with their peers on the road, but don't be fooled by scammers who pretend to be "general manager", "boss" and princelings' children. Don't talk business on the road and let "friends" cheat money. 6. Beware that the matchmaker is a liar. Some swindlers take advantage of the desire of older men and women and put on the coat of "matchmaker" to cheat.
Therefore, after entering the marriage agency, the first thing to look at is whether there is a license issued by the relevant departments, and the second thing to look at is whether the fees are reasonable and safeguard their own rights and interests. 7. The perpetrators of fake mobile phones lied about parallel imports with each simulated mobile phone worth tens of yuan, and sold them on the street at prices ranging from 200 yuan to 500 yuan.
You have to go to a regular shopping mall to buy a mobile phone. Most of the roadside vendors and "onlookers" are frauds.
8. The perpetrators of fake prepaid cards carried invalid prepaid cards in advance, went to the store to buy the same type of prepaid cards for a pretence, and fled after the salesperson did not pay attention. Precautions: Keep an eye on your sales projects, and don't let scammers distract you. Samples of prepaid cards can be displayed on the counter glass.
9. The criminals who use mobile phones invite netizens to meet in tea rooms and other places, and then borrow their mobile phones from netizens on the grounds that their mobile phones are out of power, making calls outdoors on the pretext that there is no sound indoors, and then fleeing. Precautionary measures: netizens who don't know the details should try not to see it, suggesting vigilance on the grounds that their mobile phones are waiting for a call back.
10, introduced by famous doctors. In the vicinity of hospitals and pharmacies, on the grounds of introducing famous doctors to elderly patients, after gaining the trust of the victims, they defrauded money in the name of charging referral fees. Precautionary measures: you can ask the introducer for information about "famous doctors"; When you go to a private clinic, you must see your medical license clearly.
1 1, the winner of the short message sends the winning information to the mobile phone user (for example, the prize is a computer) through group calling. When the victim contacted him, he was asked to pay a tax and postage to the designated account by remittance. Encounter this kind of "good thing", he might as well ask an experienced person and ask more why. And inform the public security organ of the account number so as to trace the source.
12. Criminals who pretend to be college students often choose busy areas such as roads, food markets, stations, shopping malls, etc., falsely claiming that they are students of a famous university in other places, and defrauding passers-by, especially young women and female high school students, on the pretext that their wallets have been stolen to borrow tolls, in order to achieve the purpose of fraud. Precautionary measures: ask the specific details of the university, call the school on the grounds that the other party looks flustered, and call the police immediately.
4. What are the common sense of college students' fraud prevention?
In today's university campus, college students are cheated from time to time. The main reasons are as follows:
1. Resolution difference
Lack of proper discrimination on some people or things, and lack of habit of asking questions. The analysis of things often stays on the surface, or does not analyze at all, which gives fraudsters an opportunity.
Emotional
When you meet a "victim" who claims to be desperate and in urgent need of your help, you will often be deceived by the liar's sweet words, and then "generously donate", thinking that you have done a good deed, but you don't know that you have fallen into the trap set by the liar.
Ask others for help
Some students are eager to help others when they need help, and they completely relax their vigilance. They always obey each other's requirements and "actively and consciously" meet each other's requirements.
4. Be greedy and cheap
The reason why many fraudsters cheat repeatedly is to take advantage of people's bad mentality to a great extent.
Preventive measures:
1. Don't lend your valid personal certificate to others to prevent it from being fraudulently used.
2. Don't tell personal information to others, such as passbook (financial card) password, address, telephone number, mobile phone number, pager number, etc. , to avoid being used.
Don't trust strangers and don't borrow money.
4. Prevent fraud in the name of "seeking help" or inducement. Once suspicious circumstances are found, report them to parents, teachers or security offices (police stations) in time.
Don't believe the posted advertisements or information such as online work-study programs and job hunting.
5. Several common fraud methods of online fraud
1. Give you a bargain and make you vain.
You think it's worth it, they can do anything, that is, promise anything before remittance.
If there is a problem after remittance, they will say what procedures you need to go through. In other words, you still need the amount of remittance. I just forgot how much it costs. Generally, the cost in the back is more than the previous one, which makes you in a dilemma. Refund takes a long time, or there is a handling fee.
If you remit money again, you will lose a lot, and there is no news, or you will be told to wait, and then your mobile phone will be turned off.
Liars are hateful, and I have been cheated, but it is useless to report them. There are too many such things in China every day, but I still have to report them, at least I have a hope in my heart.
6. What is the common sense of online shop fraud prevention?
It is essential to prevent fraud when opening an online shop for agricultural products sales.
In modern society, there are all kinds of liars. We hope to do business with peace of mind and be honest with every customer. However, your customers are not necessarily good citizens, and some of them may just cheat on the Internet for a living.
As the saying goes, there is no need to harm people, and there is no need to prevent people. Only by knowing some common tricks and having the basic knowledge of fraud prevention can we be comfortable in the online sales of agricultural products.
The following are some common identification methods. Check the credit rating of the buyer.
When opening an online shop, sellers have credit and buyers have credit. If you want to do a lot of business with customers, you must carefully check each other's reputation and the authenticity of credit. For junior users who have no ID card authentication, try not to provide cash on delivery service, and must conduct secure transactions through Alipay.
Second, the contact information left by the other party, such as the mobile phone number, must be communicated with the other party to see if the contact information left is true, reliable and detailed. Third, before delivery, be sure to confirm whether the other party pays and whether the user name of payment is consistent with the account you are calling.
Some agricultural products have low profits and may take a long time to earn back if they are cheated carelessly. If friends have time, simply search and you will see many cases of being cheated.
If you buy goods, you should also be especially careful that some people use low prices to lure you into falling for it step by step, especially the low-priced information in some junk advertisements and news. 4. Individual buyers take advantage of the loopholes in virtual goods and lie that the password is wrong, saying that they are in urgent need.
Ask the seller to replenish the goods immediately. This situation is generally a liar.
Most scammers don't use your password to recharge at all, if you use the serial number to find that there is no recharge. He might say, I just can't fill it in after several attempts.
He tried again, and after a while, it was filled naturally. If you are a novice online shop, you'd better behave yourself and do the following three things to effectively prevent being cheated.
-Trading with Alipay. Don't believe that you won't use Alipay Bank to remit money, use other trading methods, trade in other online payment shops, or many other forms.
Especially for beginners, the probability of novice sellers meeting novice buyers is not high. In order not to be cheated, I advise you not to make money from them Alipay is the patron saint of buyers, and he is also the patron saint of sellers.
As long as you use Alipay, you can reduce the chance of being cheated. Second, be sure to check whether the payment has been made in the transaction management.
Don't believe anything else. No matter what the buyer says and how the system prompts, it depends on transaction management. This should be a habit. More than 80% swindlers cheat you by asking you to deliver goods without paying.
No matter what method they use, the ultimate goal is to make you unable to see or have time to read the information in transaction management. Third, be sure to confirm and contact the users who photographed your products.
There used to be swindlers who cheated both sellers and buyers. Although this method is not used much, you must pay attention to it, because the payment is displayed on your Alipay, which is particularly hidden. There are many patterns, but they can be constantly changed.
7. Where can I find information about network security knowledge?
How about this? Transmission route of QQ virus: 1. The information contains an unknown URL (preventive measures: don't open it in a hurry, please ask the other friend to confirm the source of the information first). 2. Unknown transfer file (including sending pictures as files).
Precautions: It is best not to receive unknown documents and pictures. Basically, QQ spreads viruses in the above two forms. The URL sent by a friend may be partially sent by the system because the other party has been poisoned. So, don't rush to open it.
If you are poisoned, hehe, then slowly find anti-virus software or redo the system. QQ anti-theft: The main forms of QQ anti-theft are as follows: 1. A QQ website gives away QQ coins for free, and you can get QQ coins by entering the QQ number and password (the general page is very similar to the official, except that the login database is not connected to the official, and everything else is connected to the official. As long as you log in to that page for a while, the password of QQ is wrong, which is normal) 2. QQ number wins the prize. Suddenly, a stranger appeared in your QQ, sent you a message saying that your number won the lottery, and then gave you an address to fill in your QQ password or directly asked for your QQ account password. Don't even think about it, it must be a lie! The official won't ask you for the password.
3.QQ mailbox lied about winning the prize, which is out of date. To put it another way, I recently said that 5 or 6 QQ numbers are free at any station. This is to defraud the click-through rate, which is generally harmless to everyone, but it is a bit interesting. I used this to trick people into clicking on the website.
I really talk nonsense. QQ 5。 There are only two official websites of QQ: and there is no third domain name for the time being. So apart from these two websites, there can't be a third official website. Some people use foreign domain names, the front is the same, but the back is the national domain names of other countries, so they are generally liars. Others are slowly updated, I hope everyone will not be deceived and used by scammers! Get something for nothing
There are many online scammers, so be careful of the embankment.