Inventory hidden computer security risks

  
Often walking by the river, there are not wet shoes. Computers are closely related to our daily lives, and the potential safety hazards in the use of computers have been ignored by many people. The following small series is for everyone to check which computer hidden dangers are easy to be ignored. The easiest to ignore: password that can be stolen in 30 seconds. If you borrow your own computer and use it, if you encounter someone with a heart, he only needs to take care of you. You can steal your account on each website within 30 seconds. password. Do not believe? Then let's do an experiment yourself. If you're using Google Chrome, click the custom control button in the top right corner, select “Set" from the drop down menu, then click “Show advanced settings' in the open page, in the expanded new option Click “Manage saved passwords" to open the password management window. Alternatively, type chrome://settings/passwords directly into the address to open this interface (Figure 1). Here, you can see the website account you saved, click “display” on the right side to display the password. In the Firefox browser, click “Tools → Options → Security & Rarr; Saved Password & Rarr; Display Password & rdquo;, you can also see the plain text password. When we forget the password ourselves, this feature is very useful, but it definitely gives others the opportunity. In fact, in the IE browser, through the third-party tools IE PassView, IEPasswordDecryptor, etc., you can also quickly view the saved website account and password. Figure 1 Chrome settings interface security recommendations: ★ Set a strong password for the Windows system account, because the system password is an important protection door to protect a lot of data including the browser. ★ On public computers, such as offices, Internet cafes, etc., on these non-private computers, do not choose to save passwords when surfing the Internet. After using the browser on these computers, it is best to choose to clear the password data in the options. Take Chrome as an example, press Ctrl+Shift+Del to quickly refresh the browse data window, check the password and other items, and clear it. ★When you leave the computer temporarily, press Win+L to quickly lock the screen. ★ If the computer has to be borrowed from others, it is best to create a new account and let the borrower use the new account. The most confusing: Stealth windows are not really invisible. Many browsers now offer the "Invisible" mode (Chrome's shortcut key is Ctrl+Shift+N, IE's Ctrl+Shift+P). In this mode, The history, search history, website cookies, etc. that you browse will be automatically cleared when you close the browser, and will not leave traces on the machine. This mode is very suitable for the scenario we mentioned above. However, this mode is not really invisible, because it only targets the information on your own machine, and the websites you browse, they may track the pages you visit on the server side, record your browsing behavior, and you post Information, etc., the general user is unable to clear the server-side information. Figure 2 IE's privacy browsing window security recommendations: ★ Each computer will have a unique IP address after accessing the Internet, but this address has been learned by hackers with ulterior motives, he may follow this clue to attack you, so some people like to adopt Hide the IP way to go online. There are two ways to hide IP, either through software or a proxy website. However, the security of these software and the website itself is also open to question, so it is not recommended. ★ There used to be a famous saying, “No one on the Internet knows that you are a dog”, but now it is “On the Internet, dogs know who you are”, after understanding this truth, everyone should be cautious. Because the network is not much different from reality. Most helpless: all the web service providers who have to use the mailbox and network disk will claim that their server is the most secure, what encryption is used, but think about the CSDN confession incident last year, I believe everyone on the website The security will be questioned. The same is true for mailbox and network disk security. Storing files on a mailbox or a network disk server is actually storing your files on someone else's computer. This is undoubtedly the situation of arbitrarily fish. The website service provider does not view the user's document according to the agreement. It is not equal to the hacker who can't view it, and there is no agreement to bind, it is even more unscrupulous. Safety advice:
Copyright © Windows knowledge All Rights Reserved