How do we protect our passwords and information?

August 5, 2018 | | Comments Off on How do we protect our passwords and information?

What we need to do to protect our passwords and information

  • Never try to get pictures, files or programs from people you do not know. You should also be careful with these kinds of sharing with people you know.
  • Use folder locking softwares to ensure maximum security of your important files
  • Take care not to open every incoming mail. Especially if you do not know who these mails came from, wipe them off without opening them. If you have opened it, do not copy the pictures or files in it, do not download the computer, do not click the links inside it, and do not fill in the places where the form type prepared information is entered. Another danger is the fake mail. It can be prepared in different shapes and headings. (you can give examples such as a custom campaign, a new chat program, a concert ticket, click here or fill out the form, as if you were from your bank). You should always be alert to such fake mails.
  • Any information you seek or want is available on the Internet. Do not forget this rule especially. Your contacts will send you something interesting via e-mail, chat sites or forums and will not try to please you. If such a struggle, you should suspect behavior like this.
  • Take care to download the programs, security patches, or plug-ins you use from the original site. If you can not reach your original site, try to download it from trusted sites using search engines. Some people have a newer version of the program you’re using, so do not pay much attention to the rumor that the security patch is out there or that the plug-in has more features. By using search engines you can reach all kinds of knowledge yourself.
  • You can not be friends on the internet as it is in the outside world. Some people may try to send you files, programs and image-type documents combined with viruses and trojans. They can easily steal your information in this way.
  • If you are in a Chat, Messenger or Forum environment, you should be able to see that the ladies are 100% female. The best method for this is the camera. This item applies to women 🙂 Also remember that most chat programs use fake webcam images. In other words, the image taken from a woman’s webcam is recorded and the images can be displayed to the man or woman who wants to be friends. For this reason, you should check the person you see on the camera with techniques such as “show your hand, blink your eyes.” (This article is very important for those who first met on the internet, so many cheaters who work this way are collecting money from friends.)
  • Do not enter sites that you do not know about, sites that will harm your computer with hack, crack or adult content. If you do, make sure you have an anti-virus software installed on your computer and use a web browser (Opera, Firefox, etc.) other than Internet Explorer. Trojaned or malicious code added to the web sites created by the system to infect the system with malicious software can open ports on the system and can run any kind of command.
  • Your ip and port information is important on the Internet. A person who knows your ip address will try to find a vulnerability that you can attack after reviewing the system you are using, the software you use in your system, and your open ports. You should always keep the system and software you use on the computer up to date. Check the open ports on the system and the services running, if possible, turn off or use encryption outside access to these services.
  • People who call themselves Hacker or Cracker on the Internet do not even come close to these terms. These people are targeting only Internet users who follow sites that publish security vulnerabilities on the Internet and use uninformed internet users, open hosted and un-updated systems and similar systems using programs and exploits they find on the internet. Knowing the system you use to protect yourself from such people will be enough to get you up to date knowing your system and the software you are running on your system, keeping in mind the sites you have entered on the internet and the cryptographic operations you are doing, and sharing files, pictures and programs.
  • Lastly, you should read up on the latest news and resources about computers and develop yourself.

Comments are closed