All articles| All Pictures| All Softwares| All Video| Go home page| Write articles| Upload pictures

Reading number is top 10 articles
Wu Shi Tencent Cohen laboratories: one scientific fighter, has talked with Microsoft,
微信发布用户春节迁徙数据:深圳成空城 - 微信,春运,春节
7月6日接吻日:吻一下嘛,反正不会怀孕 - 接吻
Popular science: 2K, 1080P, and 720P effect of differences in the phone,
中国将对无人机和高性能计算机实施出口管制 - 无人机,超级计算机
United Kingdom woman camera lost 3 years back: still available for 1000 km,
诺基亚为何不做手机了? - 诺基亚
刘强东奶茶妹妹的美婚,京东的什么? - 刘强东,奶茶妹妹,章泽天,京东
2013 pieces worlds apart: Ma of the Zuma,
First webcast in Zhengzhou City law enforcement: users praise,
Reading number is top 10 pictures
八个盛产美女的国家2
穷哥们向美女求婚攻略
The terra-cotta warriors3
The household design, do not do bridal chamber a pity
I also want to live a June 1 children's day, dad
Ashlynn Brooke photograph of a group4
The sixties of the last century, China is such a kill pig
Fan bingbing black wings for platform and DanLuoWang believes beauty1
The real super beauty6
The real super beauty3
Download software ranking
Boxer's Top ten classic battle2
SQL2000 For 4IN1
Boxer Classic video2
The Bermuda triangle3
asp.netWeb服务器高级编程
c#程序设计案例教程
DreamWeaver8
徐若瑄成名作“魔鬼天使”
VeryCD电驴(EasyMule) V1.1.9 Build09081
Unix video tutorial19
qq published in(发表于) 2014/6/7 8:56:05 Edit(编辑)
These are blamed for leak your privacy,

These are blamed for leak your privacy,

These are blamed for leak your privacy-privacy, Internet security, Internet-IT news These are blamed for leak your privacy

Although the rapid development of science and technology brought us a convenient life, but cannot deny the security implications, in particular, threats to personal privacy. Various types of network vulnerabilities, hacker intrusions, obviously to our daily lives that have plagued. So, which commonly used digital equipment, Internet services will pose a threat to our privacy, and what is the solution then? Come to find out.

Internet services: 62% information disclosure risks

Yes, the biggest individual threat information in the field of science and technology, have come from various Internet services we use every day, for one thing, social applications and cloud services. Cloud service allows users to easily move data stored on Internet servers, but once the vulnerability, hackers can easily view your data, so we recommend that users carefully put some privacy too much data.

Social media there is also great risk. Last year, hackers have attacked United States dating Cupid, over 42 million passwords were leaked, poses great risks for the user's privacy, including privacy information, such as your on-line friends. So, we need regular replacement of social service, delete all your friends you don't know the password, to minimize the risk.

Computers, hardware devices, such as mobile phone: 27% information disclosure risks

As a hardware device that we use Internet services, computer, smart phone evidently became a major tool for privacy. First, the desktop operating system for viruses, Trojans, phishing sites have been very rampant in forms and kinds are constantly changing. Therefore, use antivirus software Avira on a regular basis, installing well-known application firewall is necessary; but also careful not to log suspicious Web site, alert messaging software and the suspicious URL in an e-mail message, enhancing awareness as a whole.

Development of the mobile Internet also contributed to the popularity of smart phones, also makes hackers target moved to a smart platform. For example, the 97% mobile phone malware is available for Android platform, it poses a threat to users ' privacy. Generally speaking, Android users should try to choose a reliable source, and the app store, should be used to prevent mobile security installation; used in mobile payment applications at the same time, you want to start multiple authentication mechanisms to minimize security risks.

Other daily

In addition to the above services and equipment outside the risk, in a number of scenes of daily life, we also have to have awareness. For example, in the credit card when shopping, avoiding detailed information such as business records, take the card security code on the back while in shopping malls, airports, coffee shops and other public areas when using WIFI service, do not connect the signal source of unofficial, there is no authentication mechanism, to protect against hackers.




添加到del.icio.us 添加到新浪ViVi 添加到百度搜藏 添加到POCO网摘 添加到天天网摘365Key 添加到和讯网摘 添加到天极网摘 添加到黑米书签 添加到QQ书签 添加到雅虎收藏 添加到奇客发现 diigo it 添加到饭否 添加到飞豆订阅 添加到抓虾收藏 添加到鲜果订阅 digg it 貼到funP 添加到有道阅读 Live Favorites 添加到Newsvine 打印本页 用Email发送本页 在Facebook上分享


Disclaimer Privacy Policy About us Site Map

If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)
Copyright ©2011-
uuhomepage.com, Inc. All rights reserved.