Ten repair methods to eliminate hidden dangers in one step (3)

  

Fix 7: Form anti-phishing habits

"Phishing" attackers use fraudulent emails and fake Web sites to conduct fraudulent activities, and fraudsters often reveal their financial data, such as credit cards. Number, account and password, social security number, etc. In this regard, you can take some simple steps to implement anti-phishing.

The easiest way is to not open links to any unknown websites. Moreover, the habit of using web tags can help you not be scammed by certain websites. If you are too troublesome to do this, then you must use at least the latest version of the browser, such as the latest version of browsers such as Firefox or Opera. These browsers have built-in anti-phishing features.

In addition, you need to pay special attention to the URL address, there are many attacks using phishing to phishing. For example, when you see "http://adwords.google.com.d0l9i.cn/select/Login" (provided by anti-phishing website Phishtank.com, link address: http://www.phishtank.com/blog/2008/05/05/phishtank-april-08-stats-are-live/), it is very likely that I immediately thought of a link to a website under Google. In fact, it does not belong to Google, but an unknown link under d0l9i.cn.

Figure 9: Phishtank Anti-Phishing

Repair 8: Securing Personal Websites

Operating a personal website is not easy. Every web page looks dynamic and digital, but there may be a variety of attacks and counter-attacks, fishing and anti-phishing in the background.

Hackers generally use some automated tools to search for vulnerabilities in websites. Once they find a vulnerability, they implant malicious code and attack visitors to your site. To protect your site's security, you can log in to use the fast security scanning feature on the Qualys.com website, and the services they offer are free. Before you start, you need to log in (click on the link: http://www.qualys.com/forms/trials/freescan/?lsid=7038) and fill out the form to request a free scan.

Figure 11: Qualys scans need to fill in relevant information

Next, download the Scrawlr tool - a SQL injection detection tool developed by Microsoft and HP (click here to download: http://Www.communities.hp.com/securitysoftware/blogs/spilabs/
archive/2008/06/23/finding-sql-injection-with-scrawlr.aspx), then install and use.



Figure 10: Scrawlr tool

In addition to scanning, but can not completely guarantee the security of your website. For example, sometimes scanning can't find malicious JavaScript code. This requires you to spend more time focusing on bug fixes. After all, if your site is hijacked, it will not only damage the site itself, but your reputation.

Fix 9: Remember and protect your passwords

In the current information age, passwords are almost everywhere. Password security is better than any security. However, as network applications continue to grow, more and more passwords need to be remembered. We must not only remember our own passwords, but also protect the security of our passwords. To this end, we have the following suggestions:

Use the soft keyboard to deal with the keystrokes. The soft keyboard is also called the virtual keyboard. When the user enters the password, first open the soft keyboard, then use the mouse to select the corresponding letter input. It is possible to avoid Trojan record keystrokes. In addition, in order to further protect the password, the user can also disturb the order of entering the password, which further increases the difficulty for the hacker to crack the password.

To maintain a strict password management concept, implement a regular password change, which can be changed monthly or quarterly. Never write your password on paper, and don't use passwords that are easily guessed by others.

Use different passwords for different network systems and use more secure passwords for important systems. Never use the same password for all systems. For those forums that log in occasionally, you can set a simple password; for important information, email, online banking, etc., you must set a complex password. Never set a forum, email, and bank account to the same password.

Fix 10: Clean up system garbage and viruses

Sometimes, the garbage and viruses stored in the computer system will not let you discover. In order to eliminate hidden dangers, we need to completely remove the computer. Garbage and viruses.

There are two better ways to clean up system garbage. One is to use third-party tools, such as the familiar Windows Optimizer and Super Rabbit. There is also a command line method, such as one-click cleaning. (Run in DOS environment). These two methods have their own advantages and disadvantages. I believe that everyone has their own experience.



Copyright © Windows knowledge All Rights Reserved