Here are 15 tricks to safely surf the Internet:
1. Password
Do not use simple passwords. Don't use the same one or two passwords on multiple websites, although that's easier to remember. Do not use words, use letters and numbers to mix, and the length of the password is at least 6 characters or more. Do not use birthdays, children or pet names, or simple sorts like XYZ123 to make passwords.
Keep your ID and password well recorded to avoid forgetting, but don't remember it on your PC. Don't save your password for the convenience of logging in next time. Also, change your password frequently.
2. Cache
Do not keep browser cache. By storing images in the hard drive cache, the browser can increase the speed of browsing web pages. Of course, anyone who enters your computer can know which websites you have visited. Therefore, I still recommend clearing the browser cache frequently.
To clear the cache of Internet Explorer 5, select Tools->Internet options. In the General tab, click the "Delete File" button in the temporary Internet file section. In Netscape 4 or higher, select Edit -> Parameters. In the directory tree, double-click Advanced and select Cache. Here, click "Clear Memory Cache" and select "Confirm". Then, click the "Clear Disk Cache" button and select "Confirm".
3. File Sharing
Prohibit file sharing. You don't have to set up your computer as a file and print sharing. If you set up a share, you leave a backdoor for those hackers who can take the opportunity to enter your computer to peek at your files and even do some minor damage.
To prohibit file sharing, follow the steps below: In Windows 9x, select Start->Control Panel, double-click the "Network" icon, and select the "Configuration" tab. Unselect if both the "Allow other users to access my files" and "Allow other computers to use my printer" check boxes are selected.
4. History
Do not keep history. The browser will record every website you visit. If you are using a public computer, you'd better delete the history regularly. To clear the history in IE5, select Tools -> Internet Options.
In the General tab, click the Clear History button. In Netscape 4 or higher, select Edit -> Parameters, and then click "Clear History" in the directory window.
5. Manage Cookies
Do not accept cookies of unknown origin. Useful cookies can recognize you during your return visit. But some cookies will track down your online hobbies and send them over the Internet. In Win 98, IE4 or higher versions store cookies in the Windows\Cookies directory. In Win 2000, the directory where cookies are stored is Documents and Settings\....\Local Settings\Temporary Internet Files\ .
You can select a file first, then press Ctrl-A to select all files, and finally press Delete. Netscape 4 or higher stores cookies in files. You just need to find out the file and delete it and its subdirectories. But you may also accept some cookies, so I suggest you use some cookies management software, such as CookieWall and CookieJar.
6. Don’t chat without need.
Try not to chat with strangers without a firewall. When you chat with someone you know, you may think it is safe. But in fact, some hackers or websites may collect your email address.
The best way is not to run some programs that send messages instantly in the background. If you use these software, it is best to turn it off or set it to hide the user. For example: In AOL Instant Messenger, select My Aim->Edit Options->Edit Preferences->Privacy. In MSN Messenger, select Tools->Options-> Parameters, and then unselect the top three options.
7. Go online anonymously
It is recommended to use anonymous method to avoid leaking your personal information. If you want to hide your ID while surfing, you can use the anonymous service provided online. Most of the services of this type of service work the same way: you first log in to their website and then visit the website you are going to.
In this way, you can hide your actual IP address and use theirs instead. I use the website.
8. Firewall
Don't surf without a firewall. If you are using a broadband connection, such as DSL or fiber optic, you will be connected to the Internet at any time. In this way, you are likely to be the target of those joke hackers. The new high-speed modem has a shutdown function without damaging its internal components, which makes this modem more secure. You'd also be better off installing a firewall on your computer - a kind of anti-invasion program - as the doorman for your computer.
9. Tables and Javascript
Don't disclose your information without need. The more personal information you provide, the less confidential privacy you keep. When you register and fill in the form, fill in the minimum personal information as much as possible. Do not fill in those optional columns. Don't save your credit card number for future convenience. If a website allows you to save your password for future access, I suggest you don't save it.
10. Protect your email
Encrypt your email. Do you think your email is highly confidential? Think about it carefully, your email will be visible to system administrators, hackers, or anyone else who can enter your mailbox. For those confidential communications, the best protection is encryption. Only you and the recipient can decrypt it. There are many easy-to-use encryption programs on the Internet, so you might as well give it a try.
11. Encrypt your network
The Internet tools we usually use on workstations and servers are not secure. Unless your password is strictly encrypted, do not use Telnet, POP, FTP and other programs. Authentication in plain text format is very insecure, and hackers can easily intercept your password through capture tools.
SSH is a good alternative to Telnet, and it can also replace FTP. Also, don't send sensitive information via email. It should also be noted that both the encryption method used is required to support both the encryption method used.
12. Don’t trust others too easily
Don't be careless about the software you download from the Internet. Do not install software downloaded from unknown websites. Some programs may be *s, and once you install these programs, they will change your system without your knowledge or connect to a remote server.
This way, hackers can easily access your computer. Nowadays, many websites have checking functions to check whether a program is safe before installation. I'm not making you distrust anything from the Internet, but even large websites can be compromised by hackers.
13. Regularly upgrade your system
Upgrade your system regularly. Many commonly used programs and operating system kernels often find vulnerabilities. Certain vulnerabilities can make it easy for intruders to get into your system. These vulnerabilities will spread quickly among hackers.
Therefore, it is necessary to be careful. The software developers will publish the patching so that users can remedy these vulnerabilities. I recommend you subscribe to the mailing list about these vulnerabilities so that you can even know about them.
14. Disconnect when not needed It is best to disconnect when not needed. For servers, if you keep connected frequently, turn off those rarely used Deamons.
In newly installed operating systems, Deamon runs according to default settings, so that the system is vulnerable to attacks. Turning off some Deamons does not affect the services of most hosts.
15. Check it clearly when buying a second-hand computer. Do not buy or use computers that have been hacked but have not cleaned their hard drives. Because this is likely to provide hackers with the opportunity to hack your computer. It is best to reformat the hard drive and reinstall the operating system.
1. Password
Do not use simple passwords. Don't use the same one or two passwords on multiple websites, although that's easier to remember. Do not use words, use letters and numbers to mix, and the length of the password is at least 6 characters or more. Do not use birthdays, children or pet names, or simple sorts like XYZ123 to make passwords.
Keep your ID and password well recorded to avoid forgetting, but don't remember it on your PC. Don't save your password for the convenience of logging in next time. Also, change your password frequently.
2. Cache
Do not keep browser cache. By storing images in the hard drive cache, the browser can increase the speed of browsing web pages. Of course, anyone who enters your computer can know which websites you have visited. Therefore, I still recommend clearing the browser cache frequently.
To clear the cache of Internet Explorer 5, select Tools->Internet options. In the General tab, click the "Delete File" button in the temporary Internet file section. In Netscape 4 or higher, select Edit -> Parameters. In the directory tree, double-click Advanced and select Cache. Here, click "Clear Memory Cache" and select "Confirm". Then, click the "Clear Disk Cache" button and select "Confirm".
3. File Sharing
Prohibit file sharing. You don't have to set up your computer as a file and print sharing. If you set up a share, you leave a backdoor for those hackers who can take the opportunity to enter your computer to peek at your files and even do some minor damage.
To prohibit file sharing, follow the steps below: In Windows 9x, select Start->Control Panel, double-click the "Network" icon, and select the "Configuration" tab. Unselect if both the "Allow other users to access my files" and "Allow other computers to use my printer" check boxes are selected.
4. History
Do not keep history. The browser will record every website you visit. If you are using a public computer, you'd better delete the history regularly. To clear the history in IE5, select Tools -> Internet Options.
In the General tab, click the Clear History button. In Netscape 4 or higher, select Edit -> Parameters, and then click "Clear History" in the directory window.
5. Manage Cookies
Do not accept cookies of unknown origin. Useful cookies can recognize you during your return visit. But some cookies will track down your online hobbies and send them over the Internet. In Win 98, IE4 or higher versions store cookies in the Windows\Cookies directory. In Win 2000, the directory where cookies are stored is Documents and Settings\....\Local Settings\Temporary Internet Files\ .
You can select a file first, then press Ctrl-A to select all files, and finally press Delete. Netscape 4 or higher stores cookies in files. You just need to find out the file and delete it and its subdirectories. But you may also accept some cookies, so I suggest you use some cookies management software, such as CookieWall and CookieJar.
6. Don’t chat without need.
Try not to chat with strangers without a firewall. When you chat with someone you know, you may think it is safe. But in fact, some hackers or websites may collect your email address.
The best way is not to run some programs that send messages instantly in the background. If you use these software, it is best to turn it off or set it to hide the user. For example: In AOL Instant Messenger, select My Aim->Edit Options->Edit Preferences->Privacy. In MSN Messenger, select Tools->Options-> Parameters, and then unselect the top three options.
7. Go online anonymously
It is recommended to use anonymous method to avoid leaking your personal information. If you want to hide your ID while surfing, you can use the anonymous service provided online. Most of the services of this type of service work the same way: you first log in to their website and then visit the website you are going to.
In this way, you can hide your actual IP address and use theirs instead. I use the website.
8. Firewall
Don't surf without a firewall. If you are using a broadband connection, such as DSL or fiber optic, you will be connected to the Internet at any time. In this way, you are likely to be the target of those joke hackers. The new high-speed modem has a shutdown function without damaging its internal components, which makes this modem more secure. You'd also be better off installing a firewall on your computer - a kind of anti-invasion program - as the doorman for your computer.
9. Tables and Javascript
Don't disclose your information without need. The more personal information you provide, the less confidential privacy you keep. When you register and fill in the form, fill in the minimum personal information as much as possible. Do not fill in those optional columns. Don't save your credit card number for future convenience. If a website allows you to save your password for future access, I suggest you don't save it.
10. Protect your email
Encrypt your email. Do you think your email is highly confidential? Think about it carefully, your email will be visible to system administrators, hackers, or anyone else who can enter your mailbox. For those confidential communications, the best protection is encryption. Only you and the recipient can decrypt it. There are many easy-to-use encryption programs on the Internet, so you might as well give it a try.
11. Encrypt your network
The Internet tools we usually use on workstations and servers are not secure. Unless your password is strictly encrypted, do not use Telnet, POP, FTP and other programs. Authentication in plain text format is very insecure, and hackers can easily intercept your password through capture tools.
SSH is a good alternative to Telnet, and it can also replace FTP. Also, don't send sensitive information via email. It should also be noted that both the encryption method used is required to support both the encryption method used.
12. Don’t trust others too easily
Don't be careless about the software you download from the Internet. Do not install software downloaded from unknown websites. Some programs may be *s, and once you install these programs, they will change your system without your knowledge or connect to a remote server.
This way, hackers can easily access your computer. Nowadays, many websites have checking functions to check whether a program is safe before installation. I'm not making you distrust anything from the Internet, but even large websites can be compromised by hackers.
13. Regularly upgrade your system
Upgrade your system regularly. Many commonly used programs and operating system kernels often find vulnerabilities. Certain vulnerabilities can make it easy for intruders to get into your system. These vulnerabilities will spread quickly among hackers.
Therefore, it is necessary to be careful. The software developers will publish the patching so that users can remedy these vulnerabilities. I recommend you subscribe to the mailing list about these vulnerabilities so that you can even know about them.
14. Disconnect when not needed It is best to disconnect when not needed. For servers, if you keep connected frequently, turn off those rarely used Deamons.
In newly installed operating systems, Deamon runs according to default settings, so that the system is vulnerable to attacks. Turning off some Deamons does not affect the services of most hosts.
15. Check it clearly when buying a second-hand computer. Do not buy or use computers that have been hacked but have not cleaned their hard drives. Because this is likely to provide hackers with the opportunity to hack your computer. It is best to reformat the hard drive and reinstall the operating system.