How can we protect ourselves in the online world?

Network security is also a very troublesome problem in our country. Every year, information trafficking cases occur frequently. So how can we protect our information security in the network world?

I used to be very high school, I wanted to be a hacker, and kill people thousands of miles away. I was so envious when I saw those big guys on Internet forums breaking illegal websites. Things, such as joining the Clean Net Association in the QQ group (it’s just a bunch of sand sculptures using the name of clean net to check other people’s information, maybe the one I added is not authentic, but now thinking about it, it’s really naive, too sand sculpture) , Whenever I see a group of "elementary school students" discussing social work, dark web, and a bunch of people asking him to teach in the comment area below, I feel embarrassed when I see it. Haha, but I will not expose them. After all, who When I was not in secondary school, today I will teach you how to guard against a stupid young man like me in the online world

social worker

Presumably everyone has heard of social engineering, social engineering library, etc., which are actually means of querying information. I think the superficial level is to find out who is not pleasing to the eye on the Internet, and find out the information of the eighteenth generation of other people’s ancestors. It's like a national spy agent.

method

As the saying goes: know yourself and the enemy, and you will win every battle. Only when you know the offensive tactics of others, can you know how to defend against them.

In my knowledge, there are several ways to query a series of information through the mobile phone number. The most important thing is the mobile phone number information, because the mobile phone number is bound to your many accounts, how much can the mobile phone number be found out? Where is the information? Will you be afraid if I tell you that a mobile phone number may be able to find out your ID card? (Don’t tell others that I used a QQ to perfectly pull out important information such as the ID card and name of a scammer, I have never done it)

There are WeChat, QQ and many other software where mobile phone numbers can attack, because registering an account requires a mobile phone number, and adding friends only needs to enter the mobile phone number. Adding friends is the first step to start infiltration. Social workers like to use QQ very much. QQ is one of the best software for account checking (checking information), while WeChat is like a software designed to prevent account checking. You can understand the meaning of it yourself. If you take someone else’s QQ, you can Browsing through other people’s spaces, there may be a lot of information, such as home addresses, photos of people, birthdays (I found that people who have experienced the lunar calendar are actually anti-social workers haha), browsing the spaces of people who like and comment, etc., through a What can you tell from the photos?

For example, my blogger’s circle of friends for a long time, what information can you find out?

Colorful buildings, the third grade of junior high school, people, places, and bicycles. From these, we know that the blogger was near the Canton Tower at the time. From the appearance of the third grade of junior high school, we can probably guess that the blogger was around 16 at the time. Changed, changed the location, it means that the home of the blogger is not in Guangzhou, maybe he is studying in Guangzhou or traveling in Guangzhou, three bicycles, and most people have all the photos posted on Moments like this, so we boldly guess here There are three bloggers, of course there are three, and the other two are two of my good brothers. One circle of friends can know a general information about this person, don’t you think it’s scary? For example, this blog post I posted mentioned the circle of friends a long time ago, which shows that I am not the same age as I was then, and this can be regarded as information leakage. If we know how to attack, we can know that the circle of friends or the space should close strangers , cannot be seen by strangers. In order to prevent people with ulterior motives.

You can use Alipay, WeChat, etc. to find out the name of someone else, transfer 0.01 to that person with a bank card, and then go to the mobile bank to check the transfer record. Of course, I haven’t thought of a way to prevent this, because Alipay transfers only need a mobile phone. The number seems to be, but you don't have to be afraid, it's just the name.

With this information, we can boldly guess how much that person's sfz is. I won't say much here, just take care of it. Of course, human flesh is against the law. Don't do it just to pretend to be coercive. Then you will stay in prison and ruin your life.

Summarize

Knowing many ways to attack, we also know how to defend against it

1. Disable querying mobile phone numbers on social platforms and add them to yourself

2. Block the message list chat before others add friends, and open it after knowing who it is. Don’t add you with a pretty girl’s profile picture, just like a girl you have never met, and say everything (don’t ask me how I know, you Do you understand the pain of a young teenager pretending to be a girl to go to the liar cpdd?) Girls are the same, protect your information security

3. Less pretense, pretend to be struck by lightning

4. If you really meet those network tyrants who want to check your information, you can just give them your geographical location. Most of them don’t dare. If you lose the needle, if you really encounter those middle school and high school kids who don't understand the severity of the fight, I will give you a knife when you come up. The gain outweighs the loss

In fact, blocking the circle of friends has blocked the attacks of many beginners. As long as you don’t cause trouble in the online world, basically no one will be idle, but that doesn’t include people in reality, but people in reality want to know about you For more information, it’s as simple as asking more people. There must be no evil star, and the heart of defense is indispensable.

Guess you like

Origin blog.csdn.net/zxcvbnmasdflzl/article/details/128237926