How to do a good job in network security prevention, you can easily get started after reading these 6 points

The biggest culprits behind cybersecurity are so-called hackers

In fact, hackers are also human beings, and they are very common. They just take advantage of some loopholes. Ordinary hackers exploit loopholes in the system, while advanced hackers exploit loopholes in human nature.

------------------------The Poet in Grey

  • Since I have been engaged in network security for so long, I am less and less afraid to publish my privacy on the Internet. In addition, I have gone through many online frauds before, and I am really a good doctor after a long illness.
  • I usually use pseudonyms when posting articles on the Internet, my personal mobile phone number is never published on the Internet, and my passwords are all kinds of difficult to remember.
  • Let me share the basic knowledge of network security around us for everyone to understand and prevent.

Unearthing the secrets behind network security

1. Be cautious when registering a mobile phone number

Don't easily register your mobile phone number on various unknown websites. After registration, your information will be leaked everywhere.

2. Attention should be paid to the contact information of recruitment

Regarding network security, the mobile phone number left on the recruitment website must be the company's public mobile phone, and do not use a private mobile phone number. If you are in a certain 8 city, you will be overwhelmed with various marketing calls after the online registration of a certain episode.

What do you think of the majestic hackers

3. Password security rejects weak passwords

The information security mentioned above, let’s talk about the personal financial security of the network. Your various account passwords must not be set to be the same, or simple. The technical term is called weak passwords. For weak passwords, hackers have a system called Kali The tools can crack your simple passwords, and there are also methods such as taking off your pants, hitting databases, etc., so that your passwords can be leaked at a glance in minutes.

4. Think Twice Before Downloading

Is the network safe? It must be inseparable from the network. You must be cautious when downloading files from the Internet. Various Trojan horses are hidden in each file. For example, if you want to install a certain software, you download a file ending in .EXE. You must be more cautious about this kind of file. The general Trojan horse virus files are in this format. If you download it, it will be controlled and all kinds of information will be stolen simultaneously.

Generally, they are young men who are obsessed with technology

5. Be cautious when answering unfamiliar QQ voices

In the field of network security, there is something called IP. I don’t know if you understand it. It doesn’t matter. Simply put, you can locate your current specific address based on your own IP address. Function, for example, if you suddenly find that someone is using QQ to play your voice, at this time, unless you are someone you know, strangers must not answer. Once connected, the other party will capture your current IP and directly locate your location. Follow-up It's up to them how to cheat.

6. Do not install apps sent by strangers

Some time ago, there was a popular rogue software. How can I say that it is a rogue? This is a kind of rogue that is circulated among students. It is a person who sends you an APP. Once you install it, this software will control your phone and turn it off. Turn the volume to the maximum, and then play that kind of obscene cry. Some students don’t listen to the class well, and they play with their mobile phones during class, but they are recruited. It’s very embarrassing. The rogue software is still installed on you After that, you can’t turn it off, and keep it on until the battery is exhausted. This is a trick for tricking people. If you change it to steal your personal information, there are usually all kinds of shady photos of people you see in your phone. will be taken away, and your address book and the like will be synchronized.

So to install the APP, you must go to the official website to download it.

hacker also called hacke

There is still a lot of network security knowledge that cannot be covered one by one. If you are just getting started in network security, it is enough to understand these six points.

Well, let's talk so much today, and I will update it at any time in the future.

​finally

In order to help you better learn about network security, the editor has prepared a set of introductory/advanced learning materials for network security for you. The content in it is all notes and materials suitable for zero-based beginners. I understand, all the information is 282G in total. If you need a full set of network security introduction + advanced learning resource package, you can click to get it for free (if you encounter problems with scanning codes, you can leave a message in the comment area to get it)~

CSDN spree: "Introduction to Network Security & Advanced Learning Resource Pack" for free sharing

Network security source code collection + toolkit
Network
security interview questions
Finally, there is the network security interview questions section that everyone is most concerned about.
insert image description here

The total data is 282G. If you need a full set of network security introduction + advanced learning resource package, you can click to get it for free ( If you encounter problems with scanning the code, you can leave a message in the comment area to get it)~

Internet Security Gift Pack: "Introduction to Internet Security & Advanced Learning Resource Pack" for free sharing

​Video supporting materials & domestic and foreign network security books and documents

Internet Security Gift Pack: "Introduction to Internet Security & Advanced Learning Resource Pack" for free sharing

Guess you like

Origin blog.csdn.net/Wufjsjjx/article/details/129932686