Part 1: Securing Identity Information
1. Use a strong password. Passwords are like the keys to an account. Only those who have keys can access this account. When choosing a password, make sure that the password you choose is unique and powerful, and it is not easy to be guessed by strangers or close people. The selected password should include letters, numbers, uppercase and lowercase letters and characters. Choosing "password" or "1234" as the password is too simple and easy to guess. And choosing the birthday of someone close to you (or yourself) is not safe enough. The longer the password, the harder it is to guess. You can try to omit some letters, or replace letters with numbers, spell a word skillfully like this, or change it into a password obtained by replacing words, which is difficult to guess.
Try to use phrases or things that only mean something to you as passwords. For example, the name of your favorite goldfish as a child is "SirBubbles". Try to change some letters in the word into numbers, and you will get a good password, such as''' s1rububb735'''', which only you can understand.
Choose an easy-to-remember password or write it down. If you write down the passwords, don't put them in a conspicuous place or on the computer desk.
Don't use the same password on different accounts. If you don't want to come up with dozens of different passwords, you can first come up with a basic password (such as''' s1rububb735'''), and then make some logical changes according to each account based on this basic password, such as using''' amzns1rububb735''' in Amazon. Use'''' Gmail1rububb735'''' on Gmail and'''' twits1rububb735'''' on Twitter.
It is a good habit to change your password every few months.
2. Be careful when installing the program or agreeing to the terms. Please read the details carefully when subscribing to newsletters, installing programs or agreeing to anything. If you don't want to receive spam or be included in the telemarketing list, remember to find the check box at the bottom of the detailed rules page asking if you would like to get information or quotations from other companies, and then do the corresponding operation. A good website will provide a statement that they will not sell your name to other companies (although this company may send you an email by itself). Many times, some advertisement-driven downloads, installation packages, malicious advertisements and even smuggled viruses have the ability to let inexperienced users download junk software. For example, the Java online installer in Oracle Bone Inscriptions bundled the installation of Ask Toolbar (the search application of Ask) in its fast installation mode. If you want to know more about this case, you can look at the pictures below for further reference. In order to prevent this forced promotion of bundled software, people should take active measures to prevent this kind of software, such as scanning downloaded executable files through the latest virus protection or online malware scanner (such as Google's VirusTotal.com), always choosing "pure" installation mode or custom installation mode, and unchecking any optional extra "options" during installation.
Many websites can put advertising software on your computer to track your behavior and browsing habits. Be careful when you encounter such a website.
Some websites will ask you to provide all the information they need to get their products. Just fill in the fields marked with an asterisk (*). If the information box is not marked with an asterisk, it is optional and can be left blank.
Don't disclose personal information to strangers. Don't tell your full name, address or telephone number to anyone you don't believe or know online. This is especially important when chatting with others online, discussing work or transactions, or making plans through dating sites. Be careful when making friends online. Although some people cultivate deep friendship through social media, many people pretend to be others to gain goodwill.
Be careful in online dating. No matter how great the other person looks, don't use his full name and don't disclose specific personal information. Don't give money to people you meet online. When you want to meet, choose to meet in a crowded public place, such as a restaurant or coffee shop. Let relatives and friends know where you are going, and don't let the other person pick you up or go to the other person's place.
Providing personal information to strangers may not only damage accounts and identity information, but also endanger personal safety. Although most people on the Internet are kind and friendly, it is necessary to realize that some people may use chat rooms, social media or other websites to collect information, which may cause personal injury at work or at home.
When shopping online, be sure to check the legality of the website. If the website design is messy or there are many pop-ups, the website may be illegal. In addition, be careful of websites that don't allow PayPal or credit card payment. Be careful when shopping on websites like Craigslist.
4. Don't be the victim of phishing scam. Phishing emails will pretend to come from legitimate companies, such as banks or online stores where you have bought things. They will provide you with links to fake websites and ask you to provide personal information. Check email addresses frequently. Many senders of online scams do not actually come from the e-mail address of the company they claim to represent, or they may change their real e-mail address slightly, which may deceive those who are not careful.
Beware of people who claim to be from Yi Bei, PayPal, banks or companies you are familiar with, and ask them for personal or sensitive information. This kind of email may claim that there is something wrong with your account number or password and then give you a link. If you receive such an email, don't click on the link inside. Enter the website address in the browser and go directly to the website for confirmation.
Hover the mouse over the suspicious link. You can see the real URL at the bottom of the screen. Many phishing websites display another URL at the bottom of the browser or when the mouse hovers over the link.
Forward any suspicious email to the company it claims, and these companies will further confirm whether the email you receive is true or false.
Email programs such as Yahoo, MSN, Hotmail and Gmail require you to provide your email password. Don't fall into this trap, let alone reveal your password.
5. Be alert to online fraud. Internet scams can be seen everywhere. These scams may appear in emails, Twitter messages, Facebook posts and many other places. Don't click on links that don't look like real addresses, or links that contain many letters and characters that look like nonsense. Don't click on pop-ups or emails claiming that you have won millions of dollars. These are all scams.
Don't believe in email scams that invite you to participate in foreign gambling. Also be careful of those emails asking for help, and send a long touching story, hoping you can help transfer a large sum of money or legacy from their country.
6. Be careful to share personal information posted on social media. Facebook, Twitter, Google+, Instagram, LinkedIn and other social media sites are part of many people's daily lives. On Facebook, people will post their maiden name, parents' names, personal birthdays, children's birthdays, hometown, home address, family and personal mobile phone numbers and many other personal information. By publishing this information, everyone who owns a computer actually gets all the basic information about himself. Share information posted on the Internet within a limited scope to protect your identity information and privacy. Sharing too many details on social networking sites may lead to personal danger. Post the address, departure time, etc. On the Internet, people may take the opportunity to break into their homes-especially when they see published photos and new TVs, computers and jewelry. Too much personal information, such as home address, telephone number, daily whereabouts and habits, will make the stalker get a lot of information, which may have serious consequences.
Security websites such as banks, insurance, loans and school homepages generally need to set security questions. These questions include: "What's your mother's last name?" "What's your grandma/dad's name?" "What town did you grow up in?" Or "When is your father's birthday?" Wait a minute. The answers to these questions may be easy to find on some people's Facebook pages.
Enjoy this kind of information on the internet at will, and it is easy to cause identity information to be stolen.
When setting security questions, try not to choose those questions whose answers are easy to find on social media, but choose some difficult questions whose answers are only known to you.
7. Have multiple email accounts, and the recommended number is three. Different electronic accounts can help you distinguish different aspects of your life, such as formal occasions and daily life, and also reduce spam and better protect your privacy. Work-related letters are best sent through the office email account. In most cases, this account number is given to you by the company where you work.
A major personal email account can usually be used for banking, job hunting, insurance and other official needs or personal letters. It can also be used to contact family and friends.
Set up a spam account, which can be used on the internet, shops, restaurants and other places where you don't want to reveal your real information, or on social media. Even if this account receives spam, it will not have much impact on your personal life or work.
Part 2: Protecting connections
1. Use anti-virus programs, anti-spyware software and firewalls. Without these protective measures, the internet will become unsafe, and spam, hackers and viruses will also enter the computer. And when the computer has these security measures and ensures that it is updated to the latest version, it can be protected from threats that you may not realize at all. Trojan horses, spyware, malware and viruses will not only cause identity theft and privacy violations, but also slow down the processor of the computer and make it unable to operate normally. Anti-virus programs and anti-spyware software can protect the computer from these problems and keep the computer system running normally. There are many different products available for purchase in this kind of program, and there are also free versions online.
Firewalls are divided into hardware and software. It is a barrier between your network and the outside world, allowing only part of the data transmission to pass through. You can use the standard firewall that comes with the operating system, or you can choose your favorite third-party software program.
2. Ensure the security of the wireless router. Many families have installed wireless networks, which can easily connect computers, mobile phones, tablets and game systems. However, if you are not careful, your equipment or information may be attacked. Change the default router name to a unique name that is difficult for others to guess.
Set a strong password for the router that others can't easily guess. According to the same principle as above, set the corresponding strong password for any online site that needs protection.
Set WPA2 or WPA security options that are more secure than WEP on the router.
Disable the guest login settings on the router. If you want your friends to use your Wi-Fi, but don't want to give them a password, please set a unique and powerful guest password.
3. Turn off file sharing and network discovery when using public wireless networks. Both options can expose your files and systems to "anyone" in the wireless network, not just hackers. If you are in a public wireless network area, but you don't need to use the network, you can temporarily turn off the wireless function of your computer. In Windows, these options can be found in control panel > >: network and internet > network and * * * enjoyment center.
In MacOSX, all the above options are in System Preferences > >: * * * Enjoy''.
On some devices, the wireless function can be turned on or off by an external switch, while some devices need to configure themselves (for example, on a Mac, click the Wi-Fi icon to turn the wireless function on or off).
Use public wireless hotspots with caution. There may be weak passwords in public hotspots, and they are not encrypted connections, which may easily lead to information leakage. If you can, you should consider choosing an effective and professional VPN service provider.
4. Before every online transaction, check the security first. Good companies will be equipped with many security facilities, such as a golden lock at the bottom of their web pages, indicating that this is a secure website. When you need to provide bank information or other information, please make sure that the connection is secure first. The secure website will be "et.com Website". Be careful when downloading resources. For example, when downloading games, applications or even browsers, download links may contain browser toolbars or other unnecessary add-ins. When downloading free programs, please select "Custom Install" when installing, which is convenient to cancel other unnecessary programs, or other download sites automatically add downloaded things, such as toolbars and add items.
If you are not sure whether the resource you want to download is credible, you can search the resource name online, or search the resource name together with the word "fraud" to see if you can get any clues.
Don't download illegal copyright resources without paying.
6. Unless you can confirm that a friend sent you a. doc. Pdf or other files, don't open the attachment of the email at will. Because some emails may contain viruses or spyware, which may damage your computer, such emails are usually automatically marked as "spam", but some virus emails may bypass detection without your friends' knowledge. Try not to open email attachments that end in. exe。
If you are using an e-mail program such as Outlook or Thunderbird, you can set the attachment preview to be disabled. Of course, you can't decide whether to open the attachment by previewing it. Check the relevant options of the e-mail program, and you can set whether to enable some functions, such as "Display Attachment Preview" and "Inline Display Attachment".
Tip Even if the other person is your friend, don't reveal your password.
Websites such as online banking or insurance companies need you to provide accurate information, while on some websites, it is not necessary to give your real age or address. You can use pseudonyms, birth dates and addresses on such websites. Even if this website is hacked, this information will not be used by hackers.
Don't click on any pop-up web pages. Some people can steal your identity information in this way, or install adware or viruses on your computer without your knowledge.
When setting passwords and security questions, please use tips and answers that only you know.
Be alert, even if your network environment is secure, hackers may still track you down according to your Internet Protocol (IP) address.
Beware of hackers and swindlers that may exist in online games.
Don't post some photos on the Internet that may expose your whereabouts, including school signs or local signs.
Warning: Once the computer is hacked, the information may be leaked, so it is necessary to update the antivirus software immediately and delete the virus. If you find that important documents or information are stolen or leaked, you should inform the relevant bank or work unit and report to the police if necessary.
Some emails may pretend to come from a friend of yours, but in emails, you will find something that your friend is unlikely to say. At this time, you need to be alert immediately, considering that your friend's account may be hacked.
If the required content is backed up, you can abandon an account after the account information is leaked, and immediately notify the relevant units, such as banks, work units and related parties. If your account information is leaked by email, you need to change all account and password information immediately and report this problem to the email provider.
Do not use any of the password examples mentioned in this article as your password.
Back up important emails and files to a USB flash drive, or print them as paper files, or back up one copy in both directions.
Don't give in to emails that force you to do something or threaten you. This is a kind of cyberbullying, and the situation mentioned in the email will not really happen. This situation can be reported to the network police.
There is no real privacy on the internet, so if you want to keep it secret, don't post any information about it online.