How to be safe on the internet?

Before introducing the technical content, I would first like to introduce the basic content of the Internet. The Internet is just a network, a huge network of devices, all connected to each other in some way. These devices include web servers, file servers, personal computers, and the like. This article focuses on the PC. These are all connected by cable or satellite.
Now we know that data sharing is possible when things get connected. This is a job of the Internet. Data is always transferred from one place to another. Now we are coming to the dark side of the transfer data. The problem here is that there is too much data to check what each bit is and where it is. Who is visiting this? Is he correct with this data? Unfortunately, there is no effective way to check this out. One day, I think there are ways to control this situation and limit access to data that malicious users should not access.
I now list all possible adverse effects of the Internet, then I will explain them and try to share possible solutions.
Internet Crime
Lost privacy
Data corruption.
5. Materials for adults (not suitable for children).
Forbidden knowledge.
waste time.
Health hazard
In fact, many of us know the term and think we know what it means. Unauthorized access to any content. Today, worldwide, hacking is at the expense of many ordinary people, businesses and even computer companies. This is something you can do at any level. Because if you say "If you can do it, then you can break it."
Today, billions of people have accounts on many free email sites, social networking sites, etc., many of whom have lost accounts that contain important personal data. For those who have experienced this situation, for those who know how terrible this is, for those who do not, if they believe in me, then it may be your worst night martyr.
Well, this is technical. There are many types of hacking attacks. We only focus on Internet hacking attacks involving ordinary people. What do ordinary people have on the Internet? Two things: email accounts and profiles for social networking sites. He has most of the personal data in both places, which is where his privacy is attacked. If you are sorry that he is not a good person and has some acquaintances who are familiar with the Internet, then this person may face results somewhere in the future.
Hackers use different methods to access victim data. On the Internet, "social engineering" is the easiest and most effective way. Hackers build relationships with victims and abuse them. One way is to send an email with a link to another website. Opening the link will prompt the user for a username and password. Then the hacker and the user get some error messages. The irony is that the victim never knows what happened. This is called "phishing." Only those with God's programming knowledge can do this.
If you visit the site via an indirect link, you can get rid of this trick without having to open a small email from an unknown person without entering a password.
Another method is to install the software to record all the data entered and the activity on the computer on the website where the data is entered. So if you use a university, school, work or public computer, this happens.
Therefore, always remember where you are and the information you are trying to access. Try to avoid using your personal account on a public computer because you don't know who is watching you.
You can use the instant messenger to complete the wok. A hacker can send you a link that could cause your email account to be lost.
Don't focus on links that don't seem to matter, even if someone close to you sends it because you don't know who is using the account. Hackers use people's accounts to access friends.
Your secret question can also lead to your destruction. Many people do not recognize the importance of secret issues, they just write something very obvious to their friends and those around them.
Therefore, do not use predictable security issues. If some friends, colleagues or acquaintances are right, he is in your account. The same is true for passwords. Make the password more complicated and difficult to guess. Many people use obvious words such as their date of birth, mobile number and "password" as their password. This will allow hackers to work on the cake. So don't do it for yourself. Internet


This page contains user generated content.

My Gothic Past Login | Register

© 2019 Trinity College Dublin