Forum rules for safe operation on the Internet. Basic Internet safety rules. Phishing or identity theft

If you want to increase the security of your online travel, then read the recommendations below, the implementation of which will help you avoid many problems associated with business or simply surfing the Internet.

The main recommendations here are aimed at developing the ability to use passwords. If you are a more or less advanced user of a computer and the Internet (so, at an intermediate level), then you probably have approximately the following list of passwords.

List of typical passwords for any user

To your mailboxes(usually to two or three mailboxes);
-- To social network accounts(usually two, three...);
-- To Internet messenger accounts(aka Internet pagers), such as ICQ (popularly ICQ), QIP, Miranda, M-Agent, Skype, Yahoo and others (usually everyone has at least a “login/number” account in two or three of them ;
-- To the forums where you communicate(usually a person registers in 2-10 forums), and this is also a login and password for each forum;
-- To mailing services(usually two or three, where you are subscribed to mailing lists and where you can change settings - refuse or subscribe to mailing lists)
-- To affiliate program accounts(from one to dozens or even more) in which you participate as a partner (username/password is also used).
-- To your account in the electronic payment system(as well as passwords to the key file, to the wallet program itself, or to the operation of confirming the withdrawal of funds from the account, as well as the “secret key” itself to the settings of your wallets - if you decide to configure them yourself, for example, for premium payments on your website). Typically, a user registers in two or more payment systems. And rightly so, because it gives more opportunities!
It turns out, on average, about 10-20 logins, and passwords, as a rule, are a third more! But I haven’t listed everything. It is passwords that turn out to be the most vulnerable point in any security system - no one wants to remember 15 complex passwords, so they use their last name, change the keyboard layout (they write in Russian, but on the English layout or vice versa), use the names of children and loved ones as passwords, your mobile phone numbers, pet names, etc. - these are all completely naive and unreliable passwords, especially if they are repeated!

So, here they are very simple and very important recommendations, the importance of which for you will increase in proportion to your income:

attention!
take it as seriously as possible
to the recommendations below!

1. The password exists only for you!

Never, under no circumstances Neither I nor any serious service (or service) will ask you to give any password, for example, a password to access your affiliate program page (your personal account), your mailbox, your bank card, etc.! Consider any requests or demands of this kind as the actions of intruders or, at best, “jokers.” Keep in mind that even if the demand came in a letter from supposedly my address or the address of your bank, do not believe it! The fact is that now it is quite easy to change the name and address of the sender of a letter.

The same applies to any email service (mail.ru, new mail, yandex.ru, etc.) - never, none of them, under any circumstances, will ask you to hand over your password (including for supposedly solving problems with your box).

Absolutely the same applies to electronic payment systems and any banks(no matter where they are located): no bank, no payment system will ever send you a letter asking you to send a password, confirm your plastic card number or its PIN code online!!! There is a whole system of phishing (forgery) and other methods of Internet fraud, the purpose of which is to gain access to your passwords from your accounts, credit cards, payment system accounts, etc. For example, you may receive a letter from a “supposedly bank” and following the link in this letter you will find yourself on the website of “supposedly this bank” (which will look exactly the same as the real one), where you will be asked to enter your passwords... That’s all. .. The only thing that can save you is the knowledge that no bank will ever ask you for this. If you doubt anything, call your bank’s support service (at the number you have written down in advance) and ask - they will tell you everything and give you advice. Don't be shy, they work for the people! Now, with the development of Internet banking, this is especially important. In addition, pay attention to the address in the address bar of the browser through which you open sites.

Moreover, more and more often, any references to anything are excluded from real letters from payment systems or banks.(which is usually specially emphasized in such letters - for security purposes). If you receive a letter from a “supposedly bank” or “supposedly a payment system” and they ask you to follow a link, do not do this (this way you can open the way to a special spyware program or virus). Perhaps the only exception is the moment of registration/activation in the payment system, when you really need to follow the link in the letter received in your mailbox to activate the registration. But in this case (!) - you know in advance that such a letter will come to you and you know why it came to you (as a rule, it arrives instantly at the time of registration). Treat any unexpected mail very carefully! You cannot click on links in SPAM email!!! In no case!!! If you are interested in something and decide to follow the link, then it is better to type this link in the address bar of the browser manually (or copy it first into Notepad, and from there into the clipboard and into the address bar of the browser, but not click on it with the mouse (this will protect you from hidden link substitution). Be careful!

2. Store your passwords in a paper notepad or in a special, secure program!

Never (!) do not store passwords in your electronic mailbox(including in the form of a picture) . All passwords, secret keys, answers to security questions, etc. It is safest to store it in a specially designated for this purpose simple paper notepad (exclude access to this notepad for everyone except you). Designate a separate spread of your notebook for each account - indicate your login and password there, and everything you need to regain control of your account, even from scratch. When you change your password to a new one, simply cross out one and enter another.

Do it:

Go to your email inbox and delete all emails containing passwords!First, of course, write down all the necessary passwords in your paper notebook.
-- Search your local computer(at home, at work, ...) and delete all records of passwords and logins for anything.

Special tip:Buy yourself a separate notebook that you will use only for these purposes. And this notebook should easily unfold and remain open! If it is inconvenient, you simply will not use it. A good option is a paper notepad on a wire spiral. Why? Because you will often have to look into it and holding it in your hand will be inconvenient (especially if you use the ten-finger typing method) - your hands should be free. A notebook with stitched pages looks beautiful, but does not stay open. On the contrary, a notebook with a spring folds out easily and you will feel comfortable working with it.

If you use a special program to store passwords, then duplicate the password database to a special flash drive or external drive(which are stored separately from your computer) so that if your hard drive breaks or your computer is lost, you do not lose all your passwords, which will then be a very labor-intensive task to recover. At the same time, remember that “there is always strength”, this means that there is always a certain risk if you store passwords on a computer and not in a paper notepad. You can store passwords for forums and social networks in the browser, but I do not recommend storing the password for your email and online banking in the browser.

3. Make all passwords complex!

All passwords, code words, secret keys, etc. always make COMPLEX to your email mailboxes, payment system programs and any other account, i.e. consisting of at least 11 characters, necessarily including numbers and letters of different registers (the ideal option is a random set of letters, numbers and symbols, for example: e & 2m @ k1E #39DJ8we).

4. Change your passwords regularly!

Don't worry about forgetting your password - you will definitely forget it(unless you decide to specifically train your memory in this way), because the password will not only be unmemorable, the main thing is that you will change your passwords every time there will be a suspicion that the passwords could be spied on or stolen, for example, by spyware detected by the antivirus of your computer. If there were no such suspicions (for example, the antivirus did not respond to a single threat during all this time), change the main passwords anyway at least every year.
Change passwords only after updating the antivirus installed on your computer and after it has scanned the entire computer
(this will reduce the risk of your password being leaked due to active malware).
In addition, the number of passwords you use will increase along with the number of forums and other services in which you register to participate. Therefore, forget about making the password “beautiful”, “convenient”, “memorable”, etc. - beautiful and convenient Your password can only be used by an attacker.

Special tip: If you use manual password entry, you can make your life easier by using a small fragment of the password, say 5-7 characters, in all main (i.e. frequently used, not all) passwords, the same for all passwords. Such a code fragment is a certain sequence of symbols that means something only to you and no one else. This sequence of symbols must be remembered and never (!) written down anywhere! Further, when writing down any password in a paper notepad, designate this universal sequence of characters with any one icon (for example, an asterisk - " * "). For you it will be clear what the “asterisk” means, but for others it will not. Thus, even if someone gains access to your notepad, he will not be able to use the main passwords). Naturally, if you yourself forget what it means " asterisk", then you will lose access to your accounts (mailbox, your “personal account” in the affiliate program, etc.), so as a secret sequence of characters, choose something that only you know, but that you will never forget Also, where possible, be sure to set up a password recovery feature for your mobile phone number.

Special tip:This sequence of characters (your secret code word), which you denote by the asterisk symbol, should not be simple and easy to select. The ideal option is something very cleverly coded, but clearly understandable and memorable for you. Example: "pr01EsK".

5. Use mnemonics to remember your most frequently used passwords!

How to remember a complex password that you use often? (For example, for your mailbox and your messenger)

Special tip: Most often, you probably use a password for your mailbox and a password for chat communication using a messenger (ICQ, M-Agent, etc.). It is precisely because of the frequent access to your mailbox that you want to make the password for it simpler or store the password in your browser or email client.
Under no circumstances should you simplify the password for your mailbox!
The fact is that in most services (including affiliate programs, electronic payment systems Webmoney, RBK Money, Z-PAYMENT, etc.), if you have forgotten your password, the support service will send it to your email . Consequently, an attacker can get hold of almost all of your passwords by knowing just one - from your email inbox. Naturally, if you do not want to lose control over your messenger, then make the password complex for it too. The passwords for your ICQ and your mailbox should not match!!! Passwords should never be the same.

However, regarding passwords that you use frequently: You you can use mnemonics and thus, you will easily remember the most complex password for your mailbox or messenger (but still write down your password in a notebook to completely prevent its loss). How to remember?

For example, your password might look like this:
*moy1GODvRAYU
* is your secret code word or a sequence of symbols known only to you and not written down anywhere (you can’t forget it), and then you can read it like this: “my first year in paradise” (naturally, you must also remember where which register is for letters you use). From experience I can say that the register is easy to remember, you don’t even have to doubt it.

Another example:
ost125KGdoKMS*
We read: there are 125 kilograms left until the candidate for master of sports and then a secret sequence of symbols instead of an “asterisk”. This example is good for athletes. Let's say in the sum of three competitive movements (bench press, deadlift and squat) you need to perform 505 kg for a weight category of 75 kg, and as soon as the athlete has moved further, he changes the password to his box. Agree, in this situation it is not only easy to remember a complex password, but also pleasant to change it! ;-)

But such a password is not only easy to remember, but also impossible to guess! Consequently, the use of mnemonics allows you to make a password not only complex and, at the same time, memorable, but also unpredictable, which is very important for controlling your mailbox. For all others (programs, forums, etc.) - feel free to type random characters. If you decide for each program, forum, etc. come up with passwords using mnemonics, you will soon begin to avoid the procedure of changing the password itself, because you will spend too much time on it. Therefore, do not deceive yourself - use mnemonics to remember only the most frequently used passwords, and simply write the rest randomly in a notepad - “as you wrote it yourself,” or using a program with a “password generator” function, of which there are many.

6. Enter the password from your address book!

When changing the password, first write it down in your notebook and only then (i.e. from the notebook!) enter it into the input field.This rule eliminates possible errors when entering a password into a notebook. The easiest way is to come up with a strong password by randomly hitting the keys in any text editor, then supplement what you get with letters of different cases and numbers. You can immediately write a random set of characters into a notepad- this becomes a very convenient way, but only after you are able to give up the desire to make all passwords meaningful. However, first of all, write down the password you come up with in your paper notepad, and only then(while looking in a notepad, and in no case copying from the screen) type it in the required input field. In this way, you will avoid possible mistakes when entering your password, and even more so, you will insure yourself against immediately forgetting the entered password (which, oddly enough, happens to people very often).

7. When working from someone else's or public computer, delete the history!

What if you were forced to log into your account from someone else’s computer?, then before entering your username and password, disable the function of saving personal information in the browser you are using (otherwise, anyone from this computer will be able to log into your account - for example, to your email inbox). After working on someone else's computer, delete the history for the period of time you used it. However, you should remember that “someone else’s computer” (especially in an Internet cafe) is always a high risk. You may not be aware of programs installed on other people's computers - spyware, keyboard monitors (which are often installed for network administration purposes), etc. If you still had to use “someone else’s computer” to enter one of your main passwords (from email, from online banking, etc.), then at the first opportunity (!) change the passwords that you used on someone else's computer!

If you are entering a password from someone else's computer, then put a checkmark in the "Someone else's computer" field, and if there is none, then before entering your password, go to your browser settings and disable the "saving passwords" function.. This can be done in a few seconds if you know where it is. And if you don’t know, then find out in advance, find and remember. Remember: knowledge is power!

8. Use an updated antivirus + firewall!

Benefit from comprehensive, always-updated software anti-malware protection(viruses, Trojans and spyware, etc.). If you DO NOT use protection, then all the above recommendations are almost meaningless. Go to the settings of your security programs and set the parameters to ensure high security(usually everything is clearly written there, and if you don’t understand something, look for visual videos on YouTube or write to the user support service and they will explain everything to you). It is comprehensive protection, at least “antivirus + firewall” or antivirus with a firewall function, that can keep data relatively safe.

9. SPAM is dangerous!

DO NOT open attachments to letters from recipients unknown to you, and DO NOT click on links or pictures in received spam.Although, there are viruses that act on behalf of recipients recorded as known to you, so in any case, configure your antivirus to scan all files downloaded from the Internet. Opening files received by email (Word - .doc, Excel - .xls, etc.) don't allow macros(after all, your friends may not even realize that they are sending you a virus along with a letter). Ask those who write to you to indicate clear email subjects- this measure protects against accidental deletion of a normal letter along with spam. In addition, avoid “hot places” - for example, all kinds of “erotic-crack sites” - this is a favorite habitat for viruses of all stripes.

10. Set your browser to safe mode!

First, use the "update browser version" function(developers are constantly improving the functionality and security of their product, do not neglect this).
And secondly, set your browser to the most secure mode for surfing the Internet. Read articles on the Internet about how to increase the security of using your favorite browser. It won't take much time, but on the contrary, it can help save a lot of time and nerves.

With strict security settings, problems may sometimes arise when downloading files from sites you visit or when displaying all sorts of “bells and whistles” in them. In such cases, either add the site you need to the list of trusted ones (for the browser Internet Explorer this is adding the site to the "trusted sites" zone - menu Settings/Internet Options/Security), or use manually switching settings for this page, or (but only as a last resort!) temporarily Lower the overall security level in your browser's Internet Options. I remind you that you must have configured different security parameters for both the “trusted nodes” zone and the “Internet” zone in general. If you are engaged in e-commerce, then I recommend setting the most stringent security settings for the general “Internet” zone (disable all sorts of them in “Internet Options” / “Security Settings” Java Script, ActiveX, etc.).

In general, I recommend using a browser Mozilla Firefox . It's free, easy to download and install, and working with it is infinitely more pleasant than with a regular one. Internet Explorer`om. If necessary, install the necessary extensions (plugins), for example, a plugin for removing ads or a site reputation plugin, to do this, take advantage of the offer to go for extensions (plugins) using the link that the browser will offer you when updating.

If you cannot open the page you need on a reliable site you know, then it may be that your firewall or antivirus is doing something weird (but the browser has nothing to do with it) - then for these security programs, indicate that this site can be trusted. Look through the settings of these programs and you will see everything.

Always follow the security recommendations offered by the resource you use.(for example, a website, mail system, payment service or mailing server) or program(for example, Keeper Classic, necessary for working with Webmoney). Take your time and do everything as recommended. If you can use additional security settings that a web resource offers, then use them! For example, go to your mailbox settings and enable restricting access by IP address. Next, create a complex answer to the security question that is used to recover your mailbox password (and be sure to write down this unique answer in your paper notepad). For example, you can select the question “what is the name of your dog” (although you may not have any dog) and write down “JimmK007*” as the name (this answer can be read as follows: Jim Carrey is agent 007, and “asterisk” is this is your code word). And so on, use all possible security settings.

Mnemonic technology helps not only to remember, but also subsequently to easily enter the password from a notepad into the required input field. At the same time, be sure to keep in your paper notepad an indication of the type of question used (for example, “what is your dog’s name”) and the answer to the security question itself! Otherwise, it may happen that you wrote down the answer, but forgot which question... Remember that your mailbox is the key to many of your passwords! Following the security recommendations of a particular web resource will not be difficult for even the most inexperienced user (nowadays everything is done for people), and if difficulties arise, the support service of the corresponding resource will always answer and help you.
Remember the truth: knowledge is power!

Type in the search bar a request to search for security holes in the email services you use, payment systems and other accounts that are important to you!For example, a request may sound like “security holes in mail.ru” or “how to protect a mailbox on mail.ru”, etc.
You will find a lot of useful tips - use them, however ignore any methods that require you to enter your personal data(otherwise you’ll send your passwords straight to the hacker, who, under the guise of helping, does exactly the opposite). Spend your time on this, otherwise you will lose much more in the future. In a good situation, for example, if you noticed a leak of funds in time and contacted the support service and blocked your accounts, then you might save the money, but what if not? Then who will return the time spent on earning them?
No one will return the time of your life to you! Therefore, find out in advance how to quickly block (by phone or via the Internet) the accounts you use.

Special tip:Try to create your email accounts only on those email services that support secure ( SSL) connection.

Special tip:Do not store large amounts of money in your electronic accounts. As soon as the amount has become significant for you, withdraw funds from your electronic account by transfer to a bank account or into your own hands. By and large, this is the only measure that reliably allows you to protect your money.

13. Back up the files you need onto removable media!

This applies to everyone. I have twice experienced what “hard drive death” means and I wouldn’t wish it on my enemy. The first time this happened was when I was writing my Ph.D. thesis... This is generally a separate topic: on the computers of many dissertants, hard drives break down (after my bitter experience, I began to remember such stories about others), and in general, it was noticed that what The more technologically advanced and advanced the technology, the more sensitive it is to the human condition - after all, everything that exists ultimately consists of energy... I am sure that with the massive transition of humanity to computers developed and operating using nanotechnology and ultra-low energies, a real problem of interaction will arise computer with the mental state of the user. This will create considerable difficulties and endless new opportunities...

But let's return to the realities of the present day. If you do not copy important files (for example, a copy of your website, customized scripts, etc.) to a removable hard drive or large flash drive, then you are risking a lot. As soon as you have made a lot of changes to files that are important to you, copy them to a replaceable hard drive, flash drive, floppy disks, etc.

Special tip:get yourself a separate portable hard drive - for the Archive (for important files, for example, key files, licenses, important documents). Keep it only at home and nowhere else. Never take it anywhere. Never plug it into someone else's computer! It doesn’t matter how much you trust the owner of this computer - he may not even know what’s going on on his machine! Are there many of your friends who know everything about their computer? That's it... Copy all important files to this removable disk. And on this disk, store the key file from your electronic wallet management program (for example, the Keeper Classic program). Separately, I emphasize once again: store the key file only on removable media(this file will only be useful to you when reinstalling Keeper or the operating system). If you still don’t have one, then archive the key file (after changing its name and extension (Keeper allows this)) into a password-protected archive. Make the password as complex as the system allows, and simply delete the original (unarchived) key file (and from the basket too). Write down the password itself in your paper notepad; part of the password should be a secret sequence of characters that you remember, but write down only with the asterisk symbol.

14. Free programs can be dangerous!

Be careful and do not download or install free programs from sites that you have no reason to trust.Along with such a program (or under its guise), you can install a virus or spyware. If you are an avid experimenter, then it is better to get yourself a separate computer (or a separate virtual operating system, or at least a separate account) for experiments and install whatever your heart desires there. Naturally, then it should not store confidential data, installed programs for working with electronic payment systems, and the like.

15. Turn off the "keyboard monitor"!

I also recommend NOT using programs to record all keys pressed.(“keyboard scanners” or “keyboard monitors” - your passwords will also be stored in their memory, since these programs record all actions with the keyboard - every key pressed). All your passwords should be stored only in your notebook (and, possibly, additionally in a special program for storing passwords), and preferably with a “code fragment” (remember about the “asterisk”? - see paragraph 3 above - Special advice).

16. Don't be a fool!

Don’t get involved in the games “magic wallets”, “reading letters - highly paid remote work on the Internet”, “send us 100 bucks and you will receive 1000”, etc. Don't be fooled by this!
If some supposed "employer"
asks you to pre-deposit a certain amount of money (it doesn’t matter under what pretext and why - to open an account for you, make a pre-payment, register you in something, etc.), i.e. in fact asks you for money BEFORE you receive your earnings, then these are scammers , this is guaranteed to be deception in its pure form or in the form of a financial pyramid (in the second case, you yourself can become an unwitting deceiver). Never buy into this. Well, if you buy it, it’s your own fault, as they say. Then learn from your mistakes. A good rule of thumb is: if you lose money on something, think of it as a paid lesson. Draw all the necessary conclusions so that the lesson will benefit you.

Remember these two simplest and truest principles that help you see deception and fraud:

1. Know firmly: If you haven’t earned anything yet, and some “employer” is already asking you for money, then this is definitely a scam!

2. Know firmly: If you are offered to “earn” decent money, but there is no real product or service (that people really need and would sell), then this is a scam.

The difference between normal civilized network marketing (or MLM) and financial pyramidsThis is exactly what it is - in network marketing (in MLM companies, for example, in the Oriflame company) there is a product or service that is sold that people need, but in the financial pyramid there is no product, or there is only its appearance, but in reality money is simply transferred from the pockets of some people to the pockets of others. So don't "throw the baby out with the bathwater" ;-) ! Those. Do not confuse real network marketing with financial pyramids and other scams.

I wish you an interesting and useful surfing on the Internet!

Best regards, Vadim Levkin

| Personal safety on the Internet

Lesson 33
Personal safety on the Internet

Reminder for schoolchildren's safety on the Internet

From Tatyana Vladimirovna Orlova's blog

Every year there are more young people on the Internet, and schoolchildren are among the most active users of the Runet. Meanwhile, in addition to a huge number of opportunities, the Internet also brings problems. This guide should help you stay safe online.

Computer viruses

Computer virus is a type of computer program, the distinctive feature of which is the ability to reproduce. In addition to this, viruses can damage or completely destroy all files and data controlled by the user on whose behalf the infected program was launched, as well as damage or even destroy the operating system with all files as a whole. In most cases, viruses are spread via the Internet.

Anti-malware methods:

Use modern operating systems that have a serious level of protection against malware;
Constantly install patches (digital patches that are automatically installed to improve the program) and other updates to your operating system. Download them only from the official website of the OS developer. If there is an automatic update mode, turn it on;
Restrict physical access to the computer for unauthorized persons;
Use external storage media, such as a flash drive, disk or file from the Internet, only from qualified sources;
Work on your computer as a user, not an administrator. This will prevent most malware from installing on your personal computer;
Use anti-virus software products from well-known manufacturers, with automatic database updates;
Do not open computer files obtained from untrusted sources. Even those files that your friend sent. It’s better to check with him whether he sent them to you.

WI-FI networks

WiFi- this is not a type of data transmission, not a technology, but just a brand, brand. Back in 1991, the Dutch company registered the “WECA” brand, which stood for the phrase “Wireless Fidelity,” which translates as “wireless precision.” Another abbreviation has reached our time, which is the same technology. This is an abbreviation for "Wi-Fi". This name was given with a hint of the highest standard of audio technology, Hi-Fi, which means “high precision”.

Yes, free Internet access in cafes, hotels and airports is an excellent opportunity to access the Internet. But many experts believe that public Wi-Fi networks are not secure.

Safety tips for working on public Wi-fi networks:

Do not share your personal information over public Wi-Fi networks. When working in them, it is advisable not to enter access passwords, logins or any numbers;
Use and update antivirus programs and firewall. This way you will protect yourself from downloading a virus to your device;
When using Wi-Fi, turn off File and Printer Sharing. This function is disabled by default, but some users activate it for ease of use at work or study;
Do not use public WI-FI to transmit personal data, for example to access social networks or email;
Use only a secure connection via HTTPS, not HTTP, i.e. when typing a web address, enter “https://”;
On your mobile phone, disable the “Connect to Wi-Fi automatically” function. Do not allow your device to automatically connect to Wi-Fi networks without your consent.

Social networks are actively entering our lives, many people work and live there permanently, and a billion people are already registered on Facebook, which is one seventh of all the inhabitants of the planet. Many users do not understand that the information they post on social networks can be found and used by anyone, including those who may not have good intentions.

Limit your friends list. Your friends should not include random or unfamiliar people;
Protect your privacy. Do not include passwords, phone numbers, addresses, your date of birth or other personal information. Attackers can even use information about how you and your parents plan to spend the holidays;
Protect your reputation - keep it clean and ask yourself: would you like other users to see what you upload? Think before you post, write, or upload anything;
If you are talking to people you don’t know, do not use your real name and other personal information: name, place of residence, place of study, etc.;
Avoid posting photographs online that show you in a location that could indicate your location;
When registering on a social network, you must use complex passwords consisting of letters and numbers and with at least 8 characters;
For social networks, mail and other sites, you must use different passwords. Then if you are hacked, the attackers will have access to only one place, and not all at once.

Electronic money

Electronic money- This is a very convenient method of payment, but there are scammers who want to get this money.

Electronic money appeared quite recently and it is precisely because of this that in many countries it is still not spelled out in laws. In Russia, they function and are already spelled out in the law, where they are divided into several types - anonymous and non-anonymous. The difference is that anonymous ones are those in which operations are allowed to be carried out without user identification, and in non-anonymous ones, user identification is mandatory.

You should also distinguish between electronic fiat money (equal to state currencies) and electronic non-fiat money (not equal to state currencies).

Basic tips for working safely with electronic money:

Link your mobile phone to your account. This is the most convenient and fastest way to restore access to your account. A linked phone will help if you forget your payment password or access the site from an unfamiliar device;
Use one-time passwords. After switching to enhanced authorization, you will no longer be in danger of theft or interception of your payment password;
Choose a complex password. Criminals will have a hard time guessing a complex password. Strong passwords are passwords that are at least 8 characters long and include lowercase and uppercase letters, numbers, and multiple symbols such as dollar sign, pound sign, exclamation point, etc. For example, $tR0ng!;;
Don't enter your personal information on sites you don't trust.

Email

Electronic mail is the technology and services it provides for sending and receiving electronic messages that are distributed over a computer network. Typically, an email mailbox looks like this: user_name@domain_name. Also, in addition to transmitting simple text, it is possible to transfer files.

Basic tips for using email securely:

You need to choose the right mail service. There is a huge selection of free email services on the Internet, but it is better to trust those you know and who are first in the ranking;
Do not include personal information in your personal email. For example, it is better to select “music_fan@” or “rock2013” ​​instead of “topic13”;
Use two-step authentication. This is when, in addition to the password, you need to enter a code sent via SMS;
Choose a complex password. Each mailbox must have its own strong, hack-resistant password;
If you have the opportunity to write your own personal question, use this opportunity;
Use multiple mailboxes. The first is for private correspondence with recipients you trust. This email address does not need to be used when registering on forums and websites;
Do not open files or other attachments in emails, even if they come from your friends. It’s better to check with them whether they sent you these files;
After finishing work on the mail service, before closing the tab with the site, do not forget to click on “Exit”.

Cyberbullying or virtual bullying

Cyberbullying- harassment by messages containing insults, aggression, intimidation; hooliganism; social boycotting using various Internet services.

Basic tips to combat cyberbullying:

Don't rush into battle. The best way: seek advice on how to behave and, if there is no one to whom you can turn, then calm down first. If you start responding to insults with insults, you will only inflame the conflict even more;
Manage your cyber reputation;
Anonymity on the Internet is imaginary. There are ways to find out who is behind an anonymous account;
You should not lead a hooligan virtual life. The Internet records all your actions and stores them. It will be extremely difficult to remove them;
Maintain your virtual honor from a young age;
Ignore the single negative. One-off offensive messages are best ignored. Usually aggression stops at the initial stage;
Ban the aggressor. In instant messaging programs and social networks, it is possible to block sending messages from certain addresses;
If you are a witness to cyberbullying. Your actions: speak out against the stalker, show him that his actions are assessed negatively, support the victim who needs psychological help, inform adults about the fact of aggressive behavior online.

Mobile phone

Modern smartphones and tablets contain quite mature functionality, and now they can compete with desktop computers. However, there are still very few protection measures for such devices. Testing and searching for vulnerabilities in them is not as intensive as for PCs, the same applies to mobile applications. Modern mobile browsers have almost caught up with their desktop counterparts, but expanding functionality entails greater complexity and less security. Not all manufacturers release updates that close critical vulnerabilities for their devices.

Basic tips for mobile phone security:

Nothing is truly free. Be careful, because when you are offered free content, there may be some paid services hidden in it;
Think before you send an SMS, photo or video. Do you know exactly where they will end up?
It is necessary to update the operating system of your smartphone;
Use antivirus programs for mobile phones;
Do not download applications from an unknown source, as they may contain malicious software;
After you leave the site where you entered personal information, go to your browser settings and delete cookies;
Periodically check which paid services are activated on your number;
Only give your mobile number to people you know and trust;
Bluetooth should be turned off when you are not using it. Don't forget to check this sometimes.

Online games

Modern Online Games are colorful, exciting entertainment that unites hundreds of thousands of people around the world. Players explore the world given to them, communicate with each other, complete tasks, fight monsters and gain experience. They pay for pleasure: they buy a disc, pay for a subscription or purchase some options.

All these funds go towards maintaining and developing the game, as well as security itself: authorization systems are being improved, new patches (digital patches for programs) are released, and server vulnerabilities are closed. In such games, you should be afraid not so much of your opponents as of the theft of your password, on which the authorization system of most games is based.

Basic tips for the security of your gaming account:

If another player behaves badly or causes trouble for you, block him from the list of players;
Complain to the game administrators about the bad behavior of this player, it is advisable to attach some evidence in the form of screenshots;
Do not provide personal information in your game profile;
Respect other participants in the game;
Do not install unofficial patches and mods;
Use complex and different passwords;
Even while playing, you should not disable your antivirus. While you are playing, your computer can be infected.

Phishing or identity theft

The usual theft of money and documents today will not surprise anyone, but with the development of Internet technologies, attackers have moved to the Internet and continue to do their “favorite” business. This is how a new threat emerged: Internet fraud or phishing, the main goal of which is to obtain confidential user data - logins and passwords. In English, phishing is read as phishing (from fishing - fishing, password - password).

Basic tips to combat phishing:

Keep an eye on your account. If you suspect that your profile has been hacked, then you need to block it and inform the resource administrators about it as soon as possible;
Use safe websites, including online stores and search engines;
Use complex and different passwords. Thus, if you are hacked, the attackers will have access to only one of your online profiles, and not all of them;
If you have been hacked, then you need to warn all your friends who are added as your friends that you have been hacked and, possibly, spam and links to phishing sites will be sent on your behalf;
Set a strong password (PIN) on your mobile phone;
Disable password saving in the browser;
Do not open files or other attachments in emails, even if they come from your friends. It’s better to check with them whether they sent you these files.

Digital Reputation

Digital Reputation- this is negative or positive information about you on the Internet. Compromising information posted on the Internet can seriously affect your real life. “Digital reputation” is your image, which is formed from information about you on the Internet. Your place of residence, study, your financial situation, character traits and stories about loved ones - all this accumulates on the Internet.

Many teenagers are frivolous about publishing personal information on the Internet, not understanding the possible consequences. You won’t even be able to guess that a photo posted 5 years ago was the reason they refused to hire you.

  • Be careful with links contained in emails. They may lead in a completely different direction than the text information indicates.
  • Do not submit sensitive personal or financial information unless it is encrypted (if you are on a secure website). Regular emails are not encrypted.
  • Be careful! Fake websites that look like large company websites are designed to deceive customers and collect their personal information. Make sure that the websites you interact with contain privacy and security statements and review them carefully. Make sure the URL you want appears in the "address" or "host" field of your browser. Some websites may appear similar to what you need, but may in fact be fraudulent. Take a few extra seconds and type the URL yourself.
  • When transmitting sensitive information, look for the padlock symbol in the lower right corner of the web page. This symbol indicates that the site is running in secure mode. You must see it BEFORE you enter sensitive information.
  • Use strong passwords or PINs for your online accounts. Choose words that will be difficult for others to guess, and use a different password for each account you have. Use letters and numbers, and a combination of uppercase and lowercase letters if passwords or PINs distinguish between lowercase and uppercase letters.
  • When exiting the program, do so in accordance with established procedures. Don't just close your browser! Follow instructions when leaving the safe area to ensure your safety.
  • Avoid conducting any banking transactions in places where Internet services are publicly available, such as Internet cafes. It is very difficult to determine whether such computers are free of hacker programs that capture your personal information and account information. If you need to perform a transaction from a public computer, change your PIN from your computer after you have used the public computer. This is of great importance, since there is a risk of recording keystrokes (including bank card and credit card numbers, as well as PIN) using special programs built into the shared computer, without your knowledge.

Login and password

Login is your unique identifier, a “name” that makes it possible to protect your computer connected to the Network from unauthorized entry into the network by another person. When registering on our network, you indicate your login and enter a password known only to you.

Basic rules for handling Login and Password

  • Please do not share your password with others!
  • Do not respond to emails asking for your personal information!
  • Be suspicious of any company or person asking for your password, passport number or other sensitive information. NetByNet employees never request this type of information via email.
  • Periodically check your computer with an antivirus program for spyware that steals passwords and personal data.
  • Remember that all actions performed under your login/password are legally considered to have been performed by you.

Viruses

A computer virus is a program that violates the integrity of information on your computer, in some cases also leading to the failure of the equipment included in your computer. In modern conditions, computer viruses are an integral part of the information contained in local and global (Internet) networks, however, the influence of viruses on the operation of your computer can be neutralized by adhering to the following rules.

Basic rules of antivirus security.

  • Install reputable antivirus programs
  • Despite the large selection of anti-virus systems, you should use only packages that have proven themselves on our market. You can contact us for antivirus software recommendations. You should also give preference to well-supported products from our region, since, despite the global nature of the network, most viruses are specific to the Runet (Russian-language Internet).
  • Update your antivirus program periodically
  • Anti-virus scanners are capable of protecting only against those computer viruses whose data is contained in the anti-virus database. This is not enough to guarantee absolute protection, if only because new types of virus programs appear. Therefore, it is necessary to update anti-virus databases regularly. The more often this simple operation is performed, the more protected the workplace will be.
  • Be careful with files in emails. Never open suspicious files that come from people you don't know.
  • Never run programs sent by an unknown person! This rule is well known and does not need explanation. However, files received from “reliable” correspondents (acquaintances, colleagues, friends) can also be infected. Your friends may not know that unauthorized letters are being sent from their computer: the virus is capable of sending messages on someone else’s behalf, unnoticed by the computer owner! Before opening any file, you must scan it with anti-virus tools. Naturally, good antivirus packages scan automatically.
  • Limit the circle of people using your computer
  • The ideal situation is when no one except you has access to your computer. However, if this is not possible, it is necessary to clearly delineate access rights and determine the range of permitted actions for other persons. First of all, this concerns working with floppy disks and CDs, the Internet and e-mail.
  • Make regular backups
  • By following this rule, you will be able to save data not only if your computer is infected with a virus, but also in the event of a serious breakdown in the computer hardware.
  • Do not panic!

We in no way want to create the impression among users that viruses are an irreparable disaster. Viruses are the same programs as, say, a Windows calculator or notebook. Their distinctive feature is that viruses are able to reproduce (that is, create copies of themselves), integrate into other files or boot sectors, and also perform other unauthorized actions. Rash actions aimed at neutralizing the virus can cause much more harm. When working on a corporate network, you should immediately contact your system administrator. If you are just a home user, then contact the company from which you purchased the antivirus program. Give the opportunity to professionals to take care of the security of your computer, otherwise you may forever lose the information stored on your computer.

In conclusion, it should be added that malware may not be a virus as such, but it can certainly create difficulties when working on a computer. These could be, for example, intrusive advertising programs that enter the address of their page into the system as the starting page when browsing the Internet, and do not provide the opportunity to change it in the future. Therefore, in addition to antivirus software, it is a good idea to install AdAware programs that protect against such malware.

Work via WiFi radio modems

Wireless networks have a lot in common with wired networks, but there are also differences. In order to penetrate a wired network, a hacker must physically connect to it. In the Wi-Fi version, it is enough for him to install an antenna in the nearest gateway within the network coverage area.

What could an attacker theoretically gain from a wireless network whose configuration has not been given due attention?

Here is the standard list:

  • access to resources and disks of Wi-Fi network users, and through it - to LAN resources;
  • eavesdropping on traffic and extracting confidential information from it;
  • distortion of information passing through the network;
  • Internet traffic theft;
  • attack on user PCs and network servers (for example, Denial of Service or even radio jamming);
  • introduction of a fake access point;
  • sending spam, illegal activities on your behalf.
The NetByNet network allows clients to install household Wi-Fi equipment for personal use and organize an internal Wi-Fi network to connect several computers within an apartment. But we urge you to pay due attention to the security of your wi-fi equipment.

The basic rules for organizing and setting up a private Wi-Fi network (if there is no goal of making it publicly available) are as follows:

  • Please read the documentation carefully before purchasing network devices. Find out what protocols or encryption technologies they support. Check if your OS supports these encryption technologies. If not, then download updates from the developer’s website. If a number of technologies are not supported by the OS, then this must be supported at the driver level;
  • Pay attention to devices using WPA2 and 802.11i, as this standard uses the new Advanced Encryption Standard (AES) for security;
  • If your access point allows you to deny access to your settings via a wireless connection, then use this feature. Configure AP by wire only. Do not use the SNMP protocol, web interface or telnet over the radio;
  • If the access point allows you to control client access by MAC addresses (Media Access Control, in the settings may be called Access List), use this feature. Although the MAC address can be spoofed, it is nevertheless an additional barrier on the path of an attacker;
  • If the equipment allows you to prohibit broadcasting of the SSID, use this option (the option may be called “closed network”), but even in this case, the SSID can be intercepted when a legitimate client connects;
  • Deny access to clients with the default SSID "ANY" if the hardware allows it. Do not use simple SSIDs in your networks - come up with something unique that is not tied to the name of your organization and is not in dictionaries. However, the SSID is not encrypted and can be easily intercepted (or spied on the client’s PC);
  • Place the antennas as far as possible from windows and external walls of the building, and also limit the radio power to reduce the likelihood of connection from the street. Use directional antennas, do not use the default radio channel;
  • If, when installing network device drivers, you are offered a choice between encryption technologies WEP, WEP/WPA (middle option), WPA, select WPA (in small networks you can use Pre-Shared Key (PSK) mode). If devices do not support WPA, be sure to at least enable WEP. When choosing a device, never buy something that doesn't even support 128bit WEP.
  • Always use the longest possible keys. 128-bit is the minimum (but if there are 40/64-bit cards on the network, then you will not be able to connect to them). Never enter simple, “default” or obvious keys and passwords in the settings (birthday, 12345), change them periodically (in the settings there is usually a convenient choice of four predefined keys - tell clients what day of the week which key is used ).
  • Do not give anyone information about how and with what passwords you connect (if passwords are used). Distorting or stealing data, as well as eavesdropping on traffic by inserting it into the transmitted stream, is a very labor-intensive task when long, dynamically changing keys are used. Therefore, it is easier for hackers to use the human factor;
  • If you use static keys and passwords, make sure to change them frequently. It is better to do this by one person - the administrator;
    If the device settings offer a choice between the WEP authentication methods "Shared Key" and "Open System", select "Shared Key". If the AP does not support filtering by MAC addresses, then to enter the "Open System" it is enough to know the SSID, but in the case of "Shared Key" the client must know the WEP key (www.proxim.com/ support/ all/ harmony/ technotes/ tn2001-08-10c.html). However, in the case of "Shared Key" it is possible to intercept the key, and the access key is the same for all clients. Due to this, many sources recommend "Open System";
  • Be sure to use a complex password to access the access point settings. If the access point does not allow you to restrict access with a password, its place in the landfill;
  • If you are asked to enter a key phrase to generate a key, then use a set of letters and numbers without spaces. When manually entering a WEP key, enter values ​​for all key fields (if you enter hexadecimal notation, you can enter numbers 0-9 and letters a-f).
  • If possible, do not use TCP/IP protocol on wireless networks to organize shared folders, files, and printers. Organizing shared resources using NetBEUI is safer in this case. Do not allow guest access to shared resources, use long, complex passwords;
  • If possible, do not use DHCP on your wireless network - manually distributing static IP addresses between legitimate clients is safer;
  • Install firewalls on all PCs within the wireless network, try not to install an access point outside the firewall, use a minimum of protocols within the WLAN (for example, only HTTP and SMTP). The fact is that in corporate networks there is usually only one firewall - at the Internet exit, but an intruder who has gained access via Wi-Fi can get into the LAN, bypassing the corporate firewall;
  • Regularly examine the vulnerabilities of your network using specialized security scanners (including hacker ones like NetStumbler), update firmware and device drivers, and install patches for Windows.

Please remember that if your wi-fi network is compromised and an attacker commits illegal actions on the Internet on your behalf, it is very difficult to prove your innocence.

Compliance with certain safety rules when working on a computer significantly reduces the risk of infection of the system with malware. Therefore, the user will be able to safely use the Windows operating system.

There are a lot of dangerous threats: programs installed on a computer can be dangerous; just by being on the Internet, you can go to an infected site, click on a suspicious link, download files from the network, copy files to your computer from a flash drive or optical drive.

Even a simple text file can contain malicious code; viruses are embedded in ordinary images. All this can pose a danger to your computer.

In order to successfully resist this, use recommendations based on my personal experience and, I hope, that they will be useful for someone. By generally following these security rules, you will increase the security and safety of your data and the overall security of your computer.

Basic safety rules that will reduce the chances of infecting your computer:

  • divide the disk into several partitions to save data;
  • the original version of Windows is more secure;
  • install Windows security updates;
  • use backup and archiving;
  • solve problems that arise on your computer using system recovery;
  • use antivirus;
  • scan your computer with anti-virus scanners;
  • disable autorun from disks;
  • it is safer to use an account with limited rights;
  • do not disable User Account Control (UAC);
  • run unknown programs in an isolated environment;
  • use virtual machines to run unknown software;
  • follow basic internet safety rules;
  • use specialized programs to store passwords;
  • regularly update programs and maintain the system.

Partitioning a disk into several partitions

This recommendation is not directly related to security, but using it can help you save information that might suddenly be lost. For example, if you have to urgently reinstall the operating system after a virus infection, if you cannot restore Windows to functionality in other ways.

If the computer only has a “C:” drive, then it is advisable to have two partitions. It is better to do this when installing the operating system on your computer.

The “C:” drive will contain the operating system and programs, and the other drive will contain the rest of the data. In the event that you need to reinstall the operating system, all data on the “C:” drive will be lost, while other data located on another drive will be saved.

Using the original version of the operating system

With builds, you don't know what exactly the author of the Windows build did to the operating system image. It is unknown what has been added to the OS, what has been removed, what has been changed in the operating system settings. At best, you can find out from the description, but you have no way to check whether it is true or not.

Over time, problems may arise when working in such an operating system, since the authors of assemblies often use different tweaks that are not always justified. Many authors integrate a huge number of programs into such assemblies, most of which are not needed by the average, ordinary computer user.

Installing updates for the operating system

After connecting to the Internet, with default settings, the operating system automatically downloads updates from Microsoft servers. Regular updates for the operating system are released approximately once a month.

Some users disable automatic updates, fearing that the activation of the Windows operating system may fail. The updates themselves mostly concern security issues, and also apply some fixes to the operating system, eliminating identified problems in Windows.

The update closes detected vulnerabilities in the operating system. Therefore, after installing updates, the system will work more stable and secure.

The case of the virus is indicative. Basically, this virus infected computers on which operating system updates were disabled, because they managed to release a patch before the outbreak began.

Data backup and archiving

It is necessary to set up backup and archiving of data so as not to lose important data in the event of an OS failure or computer problems. For example, the hard drive suddenly failed, and if you have backup copies of your files, you will not lose them.

It is launched by the Windows 7 operating system, as well as special programs, for example, Acronis True Image, or other similar applications.

Before making a backup, you should create a system recovery disk so that you can boot from this media if the system cannot boot.

Create a backup copy of your system drive. Copy data from your computer to an external hard drive for greater backup security.

If a computer malfunction occurs, you can restore the contents of the system disk from a backup copy.

Some laptop manufacturers create a special hidden partition on the hard drive with an image of the operating system to restore it in the event of a computer failure.

You should also regularly copy other important files to a flash drive or another PC drive.

Restoring the operating system to an earlier state

If the operating system malfunctions, use the function to restore the computer to its previous state.

Make sure that System Restore is not disabled on your computer (it is enabled by default). The Windows operating system periodically and automatically creates restore points.

You can create a restore point yourself so that the user can see the previous state of the operating system at a certain point in time.

Using computer restore will allow you to roll back the system to a stable, working state, without reinstalling Windows. Unfortunately, system recovery is not always successful.

In Windows 10, it will help to return your computer to its original state.

Using antivirus programs

Viruses (in this article this word refers to all malicious software) can penetrate your computer from the Internet, from removable media, from optical drives, etc. To counter this, you should install an antivirus program on your computer.

An antivirus installed on a computer constantly protects the computer. Other antivirus software, such as antivirus scanners, perform a one-time scan and disinfection of the computer, but do not provide real-time protection.

There is a wide variety of antivirus solutions, both paid and free. You will have to decide for yourself which solution to use.

To make your choice easier, read the article on the best free antiviruses. Windows 10 has a built-in antivirus - Windows Defender.

Paid antiviruses have some advantages over free ones, since they have built-in additional security modules and other components.

There is no 100% protection against viral infection, because first the virus is developed, and only then means appear to neutralize it. In any case, it is better to be mostly protected than to remain unprotected.

Getting malware onto your computer is very simple: you just need to follow a link to an infected website, open an attachment received by email, etc.

It should be remembered that any antivirus slows down your computer, but to ensure greater security you should put up with it. Antivirus manufacturers are improving their products and now antiviruses do not load the system as much as before.

After installing the antivirus on your computer, perform a full system scan. In addition to the fact that the antivirus protects the computer in real time, it is necessary, at least once a month, to conduct a full scan of the computer and all disks (if you have, for example, external hard drives).

This is necessary for additional protection of your data. During such a scan, the antivirus may detect new virus threats. Some viruses are well camouflaged and begin to show their activity after a significant period of time.

Update your anti-virus databases regularly; usually the anti-virus does this automatically.

You cannot install two antiviruses from different manufacturers on your computer at the same time; they will conflict with each other. Antivirus and firewall may be from different manufacturers because they perform different tasks.

Make sure that the firewall (firewall) is enabled in the system settings. A firewall protects your computer from network attacks and controls how programs access the Internet.

The Windows operating system has a standard firewall. True, it is inferior to specialized firewalls, but such protection is better than no protection at all.

The optimal solution for home use would be to install an Internet Security-class antivirus solution on your computer. This solution includes an antivirus, firewall and other additional security modules from a single manufacturer. Basically, such programs are paid.

For an additional one-time check or treatment of the system, use special free anti-virus scanners, for example, or other similar programs. Scanners check and disinfect the system, but are not suitable for everyday use.

If you cannot deal with viruses, use a special boot disk with an antivirus program. Rescue disks are created by many antivirus manufacturers and such an image can be downloaded from the manufacturer’s website completely free of charge, for example, or other solutions.

In addition to the official ones, there are homemade images. These images include a large number of programs. Write an image, for example, Windows PE with programs to disk (create a bootable USB flash drive). At the right time, boot from the disk to scan and disinfect your computer.

It is possible to check files on your computer or links to sites on the Internet through online services. For example, the service conducts online scanning using more than 60 anti-virus scanners.

It should be remembered that there are many fake antiviruses on the Internet. There are pop-up ads on the Internet that say that your computer is infected.

Fake antiviruses find many viruses on your computer and offer to download a program to treat your computer. After downloading, such a program itself will become a source of viruses.

To treat blocking viruses, antivirus companies have created special online services where you can get a code to unlock your computer for free. To solve this problem, specialized applications have been created.

Disabling autorun from disks

For security reasons, you should disable autorun from your hard drive, from network drives, from removable media (flash drives, removable hard drives, etc.), from a CD/DVD drive. You can read how to do this on my website in the “Security” section.

Using restricted accounts

Using restricted user accounts increases security when using your computer.

If a virus has entered the computer, then it cannot harm the system partition or the operating system registry, because it does not have access to these sections due to the fact that this account has limited administrative rights.

This reduces the damage that viruses cause when they penetrate the operating system.

Using UAC

UAC (User Account Control) is used to provide control over the launch of programs unfamiliar to the operating system. User Account Control - UAC, displays a warning asking whether to launch the program. The user independently decides to launch the application.

Before starting the program, there is time to think whether it is worth doing or not. Sometimes, this helps prevent malware from running.

How to stay safe on the Internet

When using the Internet, you must use common sense. Please remember that internet security is always at risk.

Don't go to suspicious sites. A site hung with bright advertising, obsessively imposing some offer on you, should arouse your suspicions. Don't rush to click on the links, look around.

Avoid sites that persistently offer something for free, but ask you to send an SMS message. At best, you will lose a certain amount of money debited from your mobile phone account.

There are a huge number of different scams and scams on the Internet, so you should be careful.

An important problem today is security on the global network, and this problem concerns absolutely everyone, from children to pensioners. Due to the massive arrival of users on the Internet, this problem is becoming increasingly relevant.


Not all users are ready to face the threats that await them in the Internet space. This review will focus on the issue of Internet security. After all, millions of users are facing this problem today.

Dangers on the Internet

In short, there are two potential possibilities for a virus to get onto your computer. The first option is due to the user's fault. Very often, users, installing unverified software and traveling through dubious Internet resources, bring an infection to their computer. The second option is the activity of Trojans and viruses. Using these tools, attackers can deliberately make your device a source of danger.

As a result, the computer may start sending spam, stealing passwords, and participating in DDoS attacks on websites without the owner’s knowledge. In some cases, the provider decides to forcefully disconnect the infected device from the global network. Thus, a user who has no idea about information security on the Internet will have a hard time.

Why do attackers seek to gain access to a user's computer?

Many users believe that no one needs access to their computer. But this is far from true. It used to be that hackers created viruses out of pure curiosity. Today the situation is completely different. Now viruses are written with commercial gain in mind. A couple of decades ago, hackers received satisfaction only from the fact that they could gain access to this or that information. Or, for example, remotely change the wallpaper and theme on the user’s desktop. Today, every possible effort is being made to keep the PC user in the dark. Meanwhile, the device will secretly perform some additional functions. Why is this needed?

As mentioned at the beginning of the article, hackers today are trying to gain access to user accounts and electronic payment systems. There are often situations when at one moment all funds are debited from your e-wallet, and all your contacts in the mail receive letters with spam and Trojans. Hackers today have a lot of options, for example, they can unite infected computers into a single network and launch an attack on government servers.

Another simple option to get money from the user is to block the operating system and demand a certain amount to unlock it. Moreover, even if you pay the required amount to the attackers, this does not mean that the computer will be immediately unlocked. Therefore, Internet security is one of the user’s priorities today.

How can attackers gain access to your computer?

Professional hackers use a number of methods to hack a personal computer. Users are in vain hoping for antivirus protection. Even if you have taken precautions in advance, there is still a chance of picking up a virus or malware. Therefore, before searching the Internet for information about maintaining security online, it is important to understand the very mechanism of viruses and Trojans appearing on a personal computer. The following will list the main ways they penetrate and gain access to the user’s personal information.

The first method hackers use is called social engineering. Thanks to the use of tricks and psychological techniques, you open a letter sent by hackers containing a Trojan. It is noteworthy that you launch the virus on your computer with your own hands. Another popular technique is to offer free software. These are usually tricks containing many viruses and Trojans.

By the way, even in software from trusted sources, security holes often appear. The same applies to operating systems. Attackers seize every opportunity. Simply follow an unverified link and your device is at risk of infection.

Recently, another method of spreading a computer infection has gained popularity. This is the so-called phishing. Fakes of popular sites are created on the Internet. So, instead of the official page of your bank, you may end up on a fake copy of it. Let's not talk about what might happen next.

How to protect your PC?

Ideally, a user who has just purchased a personal computer should complete a whole range of operations before starting to conquer the Internet. Below we will present several recommendations for safe browsing on the Internet. The Windows operating system has a built-in firewall.

But the standard security measure does not provide the required level of security. Therefore, it is recommended to install a more reliable firewall. Whether you will use the paid version or the free one depends only on your capabilities. The next step should be to install antivirus and antispyware software.

After installation, update them and set up automatic updates. It is better to make the antivirus update run automatically along with the operating system. Scan any installed program with an antivirus. When updates for the browsers you use appear online, try to download them immediately. To reduce the chances of hackers gaining access to various services, try to disable all unused components.

Information security lessons

Even if you have completed all the operations listed in the previous paragraph, do not forget about daily safety measures. First of all, do not open files downloaded from unverified sources. It is also better to immediately delete emails with suspicious content. Do not pay attention to offers of easy money, and especially do not send your logins and passwords to anyone. When registering, use complex passwords consisting of symbols, letters and numbers. Assign a new original password each time.

Be careful when using the Internet in public areas. The same goes for using a proxy server. With this connection, it is advisable not to make payments via the Internet. It is generally better to work with payment systems through special applications, rather than through the official website. It's safer this way. Sites for adults are also undesirable to visit. On such Internet resources there is a high probability of catching a Trojan. Even if you use an unlimited tariff, monitor your Internet traffic. A sudden increase in traffic for no reason is a serious cause for concern. Following these simple rules for working on the Internet will allow you to avoid many problems.

That's not all. There are a lot of dangers waiting for you on the Internet, so you shouldn’t forget about protection even for a second.

Precautionary measures

Next, we will give a few more recommendations to ensure safe browsing on the Internet. If you receive an email asking you to send your password for verification, do not respond to it. Banks do not carry out such checks. Today, all email programs have a feature that allows you to filter spam.

Activate it. You should also ignore messages about big wins or inheritances.
It is recommended to install programs that provide comprehensive PC protection. This is more reliable than using antivirus, antispyware and firewall from different manufacturers. And of course, it is worth considering that paid versions provide more reliable protection. Since the most common Internet browsers today are InternetExplorer and Opera, it is for them that there are the most viruses.

Try using alternative internet browsers such as GoogleChrome, MozillaFireFox and AppleSafari. Try not to use unlicensed software: it may initially contain viruses and spyware. If you often make purchases in online stores, try to use only proven options. The same rule applies to all online services. It is enough to follow these few simple requirements, and you can ensure your safety on the Internet.

Internet and children

In recent years there has been a big leap in the development of high technology. In this regard, more and more children are able to independently access the Internet. And if quite recently children on the Internet were mainly interested only in games, today the situation has changed somewhat. Surely you can guess what we are talking about.

Therefore, there is a need to ensure the safety of children on the Internet. It is extremely difficult to organize such protection, since the Internet is developing completely uncontrollably. It contains a lot of information that children should not have access to. You should also pay attention to the basic rules when working on the Internet. This way you can teach your child to avoid Trojans and viruses. Children are the most inexperienced users. They can easily fall for scammers. Therefore, it is very important to teach children to use this information resource correctly.

Teaching children how to use the Internet correctly

The main advice that can be given to all parents is to conduct at least the first sessions on the Internet with their child. It is advisable to use programs such as Parental Control. This will allow you to control the child’s actions. Limit your child's independent use of email programs. This can be extremely dangerous.

Recommendations

Try to organize your child’s work on the Internet in such a way that he shares his successes and failures with you. Encourage your child to tell you about anything that makes him worry. Also, take some time and tell your child what confidentiality is, help him choose a password for registering on information resources. Explain to your child that surfing the Internet safely will help him avoid trouble.

Let him understand that you don’t need to give personal information about yourself to anyone on the Internet. Also tell him that there is no difference between actions on the Internet and in real life. Warn your child in advance that communication on the Internet may deceive his expectations, that in real life a person may not be at all who he claims to be. Be sure to install special software that allows you to control your children’s activities on the Internet.

Children from 14 to 16 years old

If your child is already a teenager, then it is unlikely that you will be able to tell him anything new about computers. But still, don’t forget about control. Remember the need to ensure information security. If your child has access to a shared computer, be sure to scan the computer for threats.

If all home devices are connected via a network, then the threat can develop into a serious problem. You can always view your child's activity reports. Try not to create conflict situations, but calmly communicate with your child on this issue. Let your child understand that there are certain rules for using the Internet.

It is better to install a computer with network access in public areas. This will help hold the baby back a little. Also install software that will block your child’s access to unwanted Internet sites and make sure that no new programs appear on your computer. Do not allow children to spend long periods of time online, as this can cause addiction. That's all the recommendations. We hope that these tips will allow you to increase the security level of your home computer.