您的弱密码是您的最弱环节吗?

2015/01/29

Set user ID and password is now becoming so widespread. Usually you need to set up the site, but now even the phone system and computer access also need to set the password. Record all passwords is a challenge, so you can understand that some people would take shortcuts.

This is understandable, but not wise.

Some shortcuts may be said to be very short-sighted. The most popular word is “password”. I think that hackers can come up with. Some even stick their ID and password in the office or cubicle. Even for remote computer hacker safe operator, but not safe deposit malicious colleagues.

Password seems to be a hassle to do, but almost all of our important information is stored on the Internet, and the password is the defense of our financial, professional and personal first line of defense information. Almost every day I hear people’s personal lives are upside down, because some people damaged by unauthorized loans to their bank, credit card accounts and credit.

We are beginning to seriously look at password!

The good news is that there are some simple rules can set a password to your great help.

First, do not password and ID can be found on the local people. Do not use sticky!

Second, your password should not be based on personal information may be guessed. This includes your name, the name of your close relatives, your date of birth date.

Third, you must set a complex password, make it harder for hackers to crack passwords recognized by violence. This means that the attempt to use a variety of possible combinations. To do this, you must understand what is called “strong” password. Many people use weak passwords, paid a terrible price.

A strong password must comply with the following rules:

“Contains eight or more characters

“Including letters, numbers, special characters (&,!, Etc.)

“Include uppercase and lowercase letters mixed

“Do not use a sequence of numbers (1234)

“Do not repeat your ID password

“Some people do not recommend using dictionary words, I personally think is ideal. However, this becomes difficult to remember a randomly generated characters and numbers. This is ideal, but not used.

Next, we must be vigilant.

Whenever you want to visit the website, you must ensure that it is using a Secure Sockets Layer (SSL). SSL to create a secure between web server and browser, encrypted connection.

You can display the “https” instead of “http” from the address bar, know whether the site to use SSL, there will be real padlock image.

Finally, make sure that your computer has installed firewall, and run the antivirus scanner. The reason you need the protection of a lot, but the most important thing is to avoid identity theft. Hackers usually capable of recording keystrokes of “keyloggers” to infect your computer. When you visit a secure Web site, keyloggers, will capture your user ID and password, so that hackers can use to attack you!

Remember, even if you use a firewall and antivirus, you are still vulnerable to attack. Most antivirus problem is that they address only those who have already been identified and have been spiked with a known virus “blacklist” of viruses and threats.

Every day nearly 40,000 new viruses and system utilization is released. They eventually will be updated in the blacklist, but you always catch up.

I prefer to use a “white list” concept and sandbox. With this technique, the program files will be compared with a list of valid file, only appear in the list of programs that can run on the system. If the scanner finds any suspicious programs, it will be run is called “sandbox” isolation system, the scanner can determine whether it is normal or should be removed.

If you follow the rules for strong passwords, be sure to use SSL site and run antivirus and firewall software, you will significantly reduce the risk of identity theft and nightmares.

Tags:

Write a comment

Name
Comment