25 internet safety tips - Fashion - Style - Trendy

Thursday, November 25, 2010

25 internet safety tips

These 25 tips to avoid fraud and scams on the Internet should review!

Internet thieves, crooks, not very difficult to come across now. Get all the sweat pouring the purposes of these thieves take away your money you earn. How far these people can stop the continuation of our article will share with you.

Thanks to this article, you will find tips on shopping safely on the Internet can again navigate. Your PC when you are not at the beginning of the peace of mind will be.

1. 'Guerrilla psychology'

Cyber crimes, consisting of technical ways, do not assume that a technical problem can be solved. A firewall and antivirus software, even if your computer Korusan personal information is safe.

Hackers, as a so-called social engineering confidence, ignorance, greed, I will need, such as purity, charity, and even using human niteliklerimizi take control of us. Even the most advanced security software fails to protect us from ourselves.

To avoid this kind of attack, hackers should be wary of these methods applied, inform yourself about social engineering.

More powerful e-mail addresses, passwords, and different

2. Do not be an accomplice

Earn 500 dollars a week working at home may sound very nice. But stealing the money electronically spammer'lar doubt attract people back through the yolluyorlar thieves. If money laundering is done in your business. It sounds too good, think twice before believing the proposals in this genre.

3. Choose a strong password

Having trouble creating a good password, check out this thread about how to create secure passwords.

How safe is your password, after selecting the tool from Microsoft can control the password control.

4. E-mail Divide

Facebook, Twitter, news groups, forums, shopping sites and bank transactions rather than using a single e-mail address, use a different e-mail addresses. Financial dealings with social activities, at least for the use of different e-mail addresses.

Social purposes, to use the email address you use for business and financial transactions will attract more attention and if you lose hack'lenirse financial e-mail address will not lead to dire consequences.

Common networks, virtualization, and fake mağzalar

5. Note that public networks

Monetary transactions from public networks such as internet cafes do not do any time, for example. Just trust yourself or have installed on a network share personal and financial information.

Some hackers using laptop'larını 'Free Internet Access' to set up networks such as the names, trying to steal your information by routing traffic through its own note.

6. Virtualize

Excessive security kaygılananlar, use virtualization. By creating a virtual PC, virtual PC to the Internet if your business hallettikten then delete infected with viruses.

Ubuntu in a virtual version of Ubuntu, using the easiest methods available for such a solution.

7. Get to know your fake internet shops

Hackers, elegant, formal and seemingly safe trick users of the internet shops are trying to steal credit card information. These sites have to pay attention to recognize some of the signs.

First, avoid sites that want you to pay with cash or check, credit card shopping sites that allow you to use. Please note that there is a physical address of the store İkicisi.

Facebook, fake downloads and the 'internet your value'

8. Please note up

Social networks in two important area of security available on the technical and humanitarian. Technical security, the profile can be defined as do the settings correctly. Although technically correct, even if the security settings, everything you said inanmamalı, in real life, do not answer questions on the Internet should not give the answer.

9. Calculate your risk

Unsure about the value of your personal information, how secure is it that you see on the Internet at the address test by solving, for hackers to calculate value.

10. Please note that downloading a fake

StarCraft II day of its publication, security companies, but the game itself is actually a virus thought to have been said a lot was done downloading. Michael Jackson died, the artist's last moments in the day a video on the Internet türemişti alleged. Of course, these 'video' that contained malicious software.

A tactic often used by hackers to use interest issues. You do not get it before clicking from one link can not be true to yourself and ask.


Credit cards, stocks and fake brands

11. Debit card and not use credit card

Do not enter the bank card details on the internet, instead, use your credit card.

Credit cards, insurances against fraud has different levels, so please read carefully the terms and conditions before a card seçmeneden.

12. Stocks lies

Request sent to you even though you do not believe tüyolarına stock. This is probably in the hands of people who have a lot of years and the victims (and you) when they receive stock price climbs up. Unfortunately, you have nothing left when they make sales and Arindam fraudsters will ...

13. Fake brands that

'Best' brands, products, claiming that the auction did a dolandırcı Beware of shopping sites.

Common sense, a false virus alerts and IE6

14. Listen to your suspicions

If you suspect an online store, for example, by doing a WHOIS search, you can control it. www.whois.net visit the web site and is no doubt who owns the site review you need.

15. 'On your PC has a virus' lies

Fake security experts, had found a virus on your computer, you can claim. Cleaning the way for the experts, this fraudulent, you will delete the virus in exchange for promises of payment made.

In fact, the users of a single scare, and large quantities of these fraudsters is to collect the money.

16. Get rid of Internet Explorer 6

Still using Internet Explorer 6, just get rid of him. Except that the full capacity of the Internet yarlanmaya prevent Google and YouTube, but no longer support this browser, even old browser is full of security holes. Therefore, consider yourself a bit and use a newer browser.

Firewall logs, unnecessary services ...

17. Virus Scan suspicious files with total

If you suspect a file from the source, take advantage of www.virustotal.com site. After you install the file to the website to scan for viruses and possible hidden pests.

18. Listen to Bruce Schneier'a

Security expert Bruce Schneier, the security of national security, viruses, gives advice on many issues. Schneier'ın you can visit the web site.

19. Check your firewall logs

Firewalls, reddetikleri transfers are substantial. Review these records. For example, often you ping the IP address of a PORT atılıyorsa or transfer is made too much out of this may be a harbinger of the virus.

20. Remove unnecessary services

More running program, means a greater risk of privacy. Be ruthless about it a bit. Remove unused programs and services that make or passive. This means hackers can use to your PC reducing their work make it more difficult to reach.

File-sharing, updates and URLs

21. Be very careful with file sharing

If you are using file sharing programs, must keep at the highest level of security concerns. When you download a file, check to see if possible, before it is safe to run in a virtual environment.

22. Please update your software

Windows 7 and most advanced programs will automatically update itself. But again, run the update manually, you must be sure that automatic updates. Small practices may need to update yourself, so you should visit the website for updates makers.

23. Enter the URL yourself

Do not use e-mail addresses from the internet, and call your bank's web site on Google. Google, by fraudsters to steal user information, and bogus sites, top positions in some ways be accessible. Therefore, make sure to enter the important internet addresses yourself.

Sites to test the security of your system

24. Sites to check the reliability of

McAffe'nin its SiteAdvisor browser plugin. This useful plug-in sites in the search results according to the security level of green, yellow or red marks.

25. Test your system

EICAR test virus test antivirus software. EICAR, there is no harm in a text file to your computer. Anti-virus software, even if compressed Eicar'ı recognize and warn you.

No comments:

Post a Comment