Basic rules for safe work on the Internet. Basic rules for safety on the Internet. Phishing or theft of special data

How do you want to improve the safety of your roads as much as possible?Be aware of the recommendations below that will help you overcome many problems associated with business or simply surfing the Internet.

The main recommendations here are directly related to the careful use of passwords. If you are more or less used to using your computer and the Internet (so, in the middle of the world), then you have an almost complete list of passwords.

List of typical passwords for any kind of koristuvach

Until your postal screenshots(ring up to two or three screenshots);
-- Up to social media records(ring up to two, three...);
- Before cloud records of Internet messengers(these are Internet pagers), such as ICQ (among the people of Aska), QIP, Miranda, M-Agent, Skype, Yahoo and others (namely, at least two or three of them have a cloud record “login/number”;
- Before the forums you hang out on(require a person to register in 2-10 forums), and this is the same login and password for each forum;
- To service outlets(call up to two, three, if you subscribe to the outlets and you can change the settings - be sure or subscribe to the outlets)
-- Up to cloud records of affiliate programs(from one to tens and even more) from which you take part as a partner (your login/password is also required).
- Until your entry into the electronic payment system(And also the passwords to the key file, to the programs of work with gamans, and before the operation of confirming the removal of funds from the account, as well as the “secret key” itself, before setting up your gamants - as you set them up independently, for example, for premium payments on your own website). Make sure your customer registers with two or more payment systems. And it’s right to be timid, because it gives you more opportunities!
Look, on average there are about 10-20 logins, and passwords, as a rule, are a third more! And I’m far from overthinking everything. The passwords themselves are the most problematic point in any security system - no one wants to memorize 15 complex passwords, so you can use your nickname by changing the keyboard layout (write in Russian or English any layout or at random), vikorist like passwords, names of children and loved ones, numbers your mobile phones, calling your pets, etc. - all these are absolutely naive and unreliable passwords, the more they are repeated!

Well, the axis of the smell is very simple and very important recommendations, the value of which for you grows in proportion to your income:

Respect!
act as seriously as possible
before we give you lower recommendations!

1. The password is no longer valid for you!

Nikoli, for no reason Neither I nor any serious service (or service) will ask you to give any password, for example, a password to access your website with affiliate programs (to your special account account), to your mail screen, your bank card, etc.! Whether there is any mischief or something of this kind, look at it as the actions of evildoers or, in short, “fire-makers.” Please be respectful that you may have found a sheet of paper from my address or the address of your bank - don’t lie! On the right, you can easily change the name and address of the sheet directory at once.

You are also afraid of any e-mail service (mail.ru, Nova Poshta, yandex.ru, etc.) - none of them, under any circumstances, will ask you to hand over your password (including for any other problems with your mailbox).

Absolutely the same concerns about electronic payment systems and any banks(it doesn’t matter if they are issued): no bank, no payment system has found you a sheet asking you to send a password, confirm your plastic card number or PIN code online!!! The whole system is based on phishing (details) and other methods of Internet fraud, such as denying access to your passwords for your accounts, credit cards, payment system accounts, etc. For example, you can select a sheet like “No Bank” and, after sending this sheet, go to the “No Bank” website (which appears to be the same one), where you will be asked to enter your passwords... That’s all. .. The only thing that can save you is the knowledge that no bank can ask you for anything. If you have doubts about something, call the support service of your bank (using the number you have written down in advance) and ask - they will tell you everything and show you everything. Don’t be in a hurry, make a stink for people! Now, with the development of Internet banking, this is especially relevant. In addition, pay attention to the address in the address bar of your browser, through which you access sites.

Moreover, more and more often real accounts from payment systems and banks are turned off, whether they were sent for anything or not(such sheets need to be specially reinforced - for safety reasons). If you get the most reliable sheet like “no bank” or “no payment system” and there they ask you to follow the instructions - do not interfere with anyone (in this way you can open the way for special spyware programs or a virus). Perhaps the only problem is at the moment of registration/activation with the payment system, when you need to follow the instructions on the page you copied to your screenshot to activate the registration. Well, in this case (!) - You know from afar that such a sheet will arrive to you and you know why it has arrived to you (as a rule, it will arrive at the meeting at the time of registration). Before any unsubscribed post, be very respectful! You can’t go to postal SPAM for orders! Not at any time!!! If you are interested in something and would like to go and get the message, then it is better to type the message in the address bar of your browser manually (or copy it to Notepad, and then to the clipboard and into the address bar of the browser, rather than click on it ій with a bear (this will save you from the arrival of the message) Be nice!

2. Save passwords from a paper notepad or from a special reliable program!

Nikoli (!) in every form (!) do not save your passwords electronic postal screen(you can also see the pictures) . All passwords, secret keys, secret food types, etc. It is safest to save from a specially established paper notepad (Disable access to this notepad for everyone except you). For your personal account, enter the full page of your notebook - there you can enter your login and password, and everything else you need to regain control over your individual account from scratch. If you change your password to a new one, simply assign one and enter another.

Earn money:

Log in to your email account and delete all entries to reset your passwords!Now, it’s important to rewrite all required passwords in your paper notepad.
- Search your local computer(at home, at work, ...) and delete all records about passwords and logins, no matter what.

Special event:Buy yourself a notebook that you will use only for these purposes. This notebook is designed to be easy to unfold and keep in place! If you will be indestructible, you simply do not care about him. A good option is a paper notebook on a spiral spiral. Why? Because you often have the opportunity to look into someone and hold him in your hands, it will be handy (especially if you use the ten-finger method of hand) - the hands of the culprit will be strong. The notebook with stitched sides looks beautiful, but does not fray when opened. By the way, the notebook on a spring is easy to unfold and you will feel comfortable working with it.

If you use a special program to save passwords, then duplicate the database with passwords to a special flash drive or external storage device(which are saved separately from your computer), so that if your hard drive crashes or your computer crashes, you don’t lose all your passwords, which will then be a difficult task. At this point, remember that “The power will be found in the future”, which means that in the future there is a song when you save passwords on your computer, and not in a paper notepad. You can save passwords in your browser for forums and social networks, but I do not recommend saving your browser password for your email and online banking.

3. Keep all passwords foldable!

All passwords, code words, secret keys, etc. to your electronic mail screens, programs with payment systems and any other account, work FOLDABLE from now on, then. overdo it At least 11 characters, which must include numbers and letters from different registers (The ideal option is a random typing of letters, numbers and symbols, for example: e & 2m @ k1E #39DJ8we).

4. Change your passwords regularly!

Don't worry about the fact that you might forget your password - you'll forget it very easily(since you don’t want to specifically train your memory in such a way), since the password will not only be unforgettable, you will change your passwords as soon as you do There is a suspicion that passwords could be sniffed or stolen, for example, by malware programs detected by the antivirus of your computer. If there were no such suspicions (for example, the antivirus did not respond to the same problem within an hour), however, change the main passwords I'd like to see it through the eyes.
Change passwords only after updating the antivirus installed on your computer and after checking the entire computer.
(This will reduce the risk of your password through the activity of active free programs).
In addition, the number of passwords that you use increases with the number of forums and other services on which you are registered to participate. Therefore, forget about those who want the password to be “beautiful”, “manual”, “to be remembered”, etc. - make it beautiful and make sure your password is only for the thief.

Special event: If you choose to manually enter your password, you can make your life easier by choosing a small fragment of the password, say 5-7 characters, for all main (that is, often victorized, not all) passwords, but the same for all passwords. Such a code fragment is a chain of symbols that means only to you and no one else. This sequence of symbols must be stored and never (!) written down! Next, when writing down a password on a paper notepad, indicate this universal sequence of characters with one icon (for example, a star - " * "). For you, it will be clear what “zirochka” means, but for others - not. Thus, if you are denying access to your notepad, you won’t be able to quickly access the head passwords). Naturally, you yourself will forget what “zirochka” means ", then lose access to your account records (email screenshots, to your “special account” in an affiliate program, etc.), then in the context of the secret sequence of symbols, select something that is only visible to you , but you will never forget In addition, where possible, be sure to set up the password update function for your mobile phone number.

Special event:The sequence of symbols (your secret code word) is given, which is indicated by the “star” symbol, which does not require any downtime and is easy to select. The ideal option is that it is very cleverly encoded, but will definitely be understood and remembered for you. Stock: "pr01EsK".

5. Use a mnemonic technique for remembering passwords, which is the most frequently used tool!

How to remember the folding password that you often use? (For example, for your email screen and your messenger)

Special event: Most often, you find yourself asking for a password for your email screen and a password for chat using an additional messenger (ICQ, M-Agent, etc.). You will often need to access your email account and you will need to create a password for it, simply by saving the password in your browser or email client.
You can’t find out the password to your email screen every time!
On the right, in most services (including affiliate programs, electronic payment systems Webmoney, RBK Money, Z-PAYMENT, etc.), if you have forgotten your password, the support service will send it to your email. Well, an attacker can steal almost everything with your passwords, knowing just one - your email account. Of course, if you don’t want to lose control over your messenger, then create a password for someone else. Passwords to your ICQ and postal screen are not to be forgotten!!! The passwords have been burned for no reason whatsoever.

However, here are the passwords that you often use: you can use mnemonics And easily, in this way, you will remember the simplest password for your screenshot or messenger (alternatively, write down your password in your notebook to completely disable it). How can I remember?

For example, the password can look like this:
*moy1GODvRAYU
* - this is your secret, the code word is only known to you and the sequence of symbols is not written down anywhere (you can’t forget it), and then you can read it like this: “my first river in paradise” (naturally, you are responsible for remembering those who what register for letters vikoristovuet). To be fair, I’ll say that the register is easy to remember, so there’s no doubt about it.

More butt:
ost125KGdoKMS*
Read: lost 125 kilograms to the candidate for master of sports and gave a secret sequence of symbols instead of the “star”. This stock is good for athletes. Let’s say that in the amount of three lifts (bench press, deadlift and squat) you need to lift 505 kg for the 75 kg category, and as soon as the athlete goes further, he changes the password to his screen. Wait a minute, in this situation it’s not easy to remember the folding password, but you might as well change it! ;-)

Even though such a password is not only easy to remember, it is also difficult to guess! Also, the use of mnemonics allows you to use a password that is not only complex and, at the same time, unforgettable, but also non-transferable, which is even important for controlling your email screen. To solve problems (programs, forums, etc.) - kindly type random characters. How do you choose for the skin program, forum and etc. If you guess passwords using various mnemonics, you will soon begin to understand the procedure for changing the password itself, which will take you a lot of time. So, don’t deceive yourself - use the mnemonics for remembering only the passwords that are most often abused, and then - just write it down in a notebook - “as the hand itself wrote”, or use a vikory program with the function of a “password generator”, which is completely anonymous .

6. Enter the password from the notebook!

When changing your password, first write it down in your notebook and then enter it into the entry field later (from your notebook!).This rule eliminates possible problems when entering the password into the notebook. The easiest way is to come up with a reliable password using random keys in any text editor, then add those that are letters of different registers and numbers. You can immediately write down a specific character set to the notepad- This is not done in a manual way, but only after you are ready to make sure all passwords are corrected. However, first of all, write down the password you came up with in your paper notebook, and only later(Always keep an eye on the notepad, and at all times do not copy from the screen) type in the required entry field. You will be able to avoid any possible concessions to entering a password, and this way you will be more insured against accidentally forgetting the entered password (which, not surprisingly, is being harassed by people even more often).

7. When working on someone else’s huge computer, let’s see the story!

If you are worried about logging into your account from someone else’s computer, then before entering your login and password, turn on the function of saving special information in the browser that is being accessed (in another case, anyone from your computer can log into your account - for example, on your account no e-mail). After working on someone else's computer, view the history for the period during which you were victorious. Please remember that “someone else’s computer” (especially in an Internet cafe) is always a high risk. You may not know about programs installed on other people's computers - spy guns, keyboard monitors (which are often installed for administrative purposes), etc. If you happen to quickly use “someone else’s computer” to enter one of your main passwords (for email, for online banking, etc.), then at the first opportunity (!) change those passwords that you used on someone else's computer!

If you are entering a password from someone else’s computer, then put a “tick” in the “Someone else’s computer” field, but if there is no such option, then first enter the password, go to the browser settings and turn on the “password saving” function. It takes only a few seconds, since you know where to find it. And if you don’t know, find out from behind, find out and remember. Remember: knowledge is power!

8. Vikorist antivirus + firewall, what's new!

Vikorist comprehensive, continuously updated software protection against costly programs(viruses, Trojans and spyware programs etc.). If you are NOT vikorystvo zakhist, all the above recommendations may be without confusion. Go to the settings of your desktop programs and set the parameters to ensure high security(everything is clearly written there, but if you don’t understand what you don’t understand, look for videos on YouTube or write to the support service for freelancers and explain everything to you). The most comprehensive protection, at a minimum, “antivirus + firewall” or an antivirus with a firewall function can allow you to trim data from your personal security.

9. SPAM is not safe!

DO NOT open attachments to pages from recipients you do not know, and also DO NOT click on messages or pictures in spam messages.If you want to detect viruses that operate on the names of recipients of records that you know, then in any case, set up your antivirus to scan all files that are downloaded from the Internet. Retrieving files by email (Word - .doc, Excel - .xls, etc.) don't allow macros to be abused(Even your friends may or may not know about those who send you the virus from the leaf). Ask those who write to you to express virtuosity those sheets- This approach prevents the random removal of a normal sheet from spam. In addition, avoid “evil places” - for example, all kinds of “erotic-quack-sites” - this is a favorite place for viruses of all stripes to live.

10. Set up your browser for safe mode!

First of all, use the “update browser version” function(Designers are gradually improving the functionality and security of their product, don’t worry about it).
Otherwise, adjust your browser for the most secure mode for surfing the Internet. Read online articles about how to improve the security of your favorite browser. It won’t take a lot of time, but in fact, you can help save a lot of time and nerves.

With strict security settings, problems may arise when files are encrypted from the sites you visit or when they display heavy “bells and whistles” on them. In such cases, either add the site you need to the list of the most reliable ones (for the browser Internet Explorer This means adding the site to the “reliable sites” zone - menu Settings/Browser Power/Security), or manually change settings for this page, or (or in extreme cases!) hourly Reduce the level of illegal security in the “browser power”. Let me guess what you have in mind There are various security parameters for both the “Trusted Sites” zone and the “Internet” zone.. If you are engaged in electronic commerce, I recommend that you set the most stringent security settings for the “Internet” zone (turn on the “overview power” / “security settings” if there Java Script, ActiveX, etc.).

Well, I recommend using a vikory browser Mozilla Firefox . It’s easy to attract and install a wine without cats, and it’s less acceptable to trade with it, but less so Internet Explorer`om. If you need to install the necessary extensions (plugins), for example, a plugin for removing advertising or a site reputation plugin, for which you should quickly go through the extensions (plugins) for the instructions that prompt you to use your browser. renovation

If you can’t open the required side of a trusted site you know, then perhaps it’s because your firewall or antivirus (and your browser doesn’t care) that you need to tell many other programs that this site can be trusted. Try these programs and you will learn everything.

Always follow the security advice provided by any other resource you are using.(for example, website, postal system, payment service or delivery server) or the program(For example, Keeper Classic is required for working with Webmoney). Spend a few hours and do it as recommended. If you can check out additional security parameters that the web resource provides, check them out! For example, go to the settings of your email screen and click exchange of access by IP address. Next, create a unique response on the control panel, which will be used to update the password on your email screen (and be sure to write down this unique response in your paper notepad). For example, you can choose the name “what is the name of your dog” (even if you don’t have any dog) and write down the name “JimmK007*” (this can be read like this: Jim Carrey is agent 007, and “star” is This is your code word). Well, then continue with all possible security measures.

Mnemonics helps you not only memorize, but also easily enter your password from a notepad into the entry field. At the same time, be sure to keep a note on the type of food on your paper notepad (for example, “what is the name of your dog”) and the food test itself! Otherwise, it may be that you wrote down your testimony, but forgot about the meal... Remember that your email screen is the key to many of your passwords! It is not difficult to follow the safety recommendations for any other web resource to find a reliable resource (to save everything for people), and in case of any difficulties, the support service for a reliable resource will always be reliable I will help you.
Remember the truth: knowledge is power!

Dial in the search row and ask for a message from the security of your postal services, payment systems and other business records that are important to you!For example, the question may sound like this: “Dirki in the security of mail.ru” or “How to steal a screenshot on mail.ru”, etc.
If you see a lot of brown flowers - speed up with them, prote Ignore any methods that force you to enter special data(otherwise you will send your passwords directly to the attacker, who, under the guise of helping to harm everyone else). Spend your time on this, otherwise you will spend much more in the future. In a good situation, for example, if you suddenly noticed a round of losses and, having contacted the support service, blocked your accounts, then you can and will save money, but what not? Then who will pay you back the money you spent on your salary?
No one can turn back the hour of your life! So find out in advance how to quickly block (by phone or via the Internet) scammers who are going to be victorious.

Special event:Try to create your electronic screenshots only at postal services, which encourage theft ( SSL) connection.

Special event:Don't save a lot of money on your electronic accounts. As soon as the sum has become significant for you, withdraw the sum from the electronic bank account by transferring it to the bank account and into your hands. There is a single approach to the great market, which allows you to reliably secure your money.

13. Back up required files on a replacement device!

There is a lot of fuss about everyone. I have personally realized for two years that this is the “death of the hard drive” and I don’t care about this. First, it happened when I wrote my Ph.D. dissertation... The topic came up: on the computers of many graduates, hard drives break down (after my bitter revelation, I began to remember such stories and about others), and so it's marked that The more technologically advanced and sophisticated the technology, the more sensitive it is to the human condition - and everything that fundamentally lies in the end shell of energy... I believe that with the massive transition of humanity to computers, the fragmentation and processing of and the origins of nanotechnology and super-small energies, However, the problem of the interaction between the computer and the mental state of the koristuvach is not real. This creates great difficulties and endless new possibilities.

Let's go back to today's realities. If you do not copy important files (for example, a copy of your website, customized scripts, etc.) to a removable hard drive or large flash drive, then you are risking too much wealth. As you have made a number of changes to files that are important to you, copy them to a replacement hard drive, flash drive, floppy disk, etc.

Special event:get yourself a portable hard drive for the Archive (for important files, for example, key files, licenses, important documents). Keep it at home and more. Don’t drag him anywhere. Never plug it into someone else's computer! It doesn’t matter how much you trust the owner of your computer - you may not even know about what’s running on your machine! How many people do you know who know everything about their computer? That's it... Copy all important files to this replacement disk. And on this disk, save the key file from your electronic computer programs (for example, Keeper Classic programs). Okremo, once again, naked: Save the key file in a spare place(You will no longer have this file if you reinstall Keeper or the operating system). If you don’t already have this, then archive the key file (previously changing its name and extension (Kyper does not allow) for the passwords of the archives. The password will be created as foldable, as far as the system allows, and the output one (not archived) ) simply delete the key file (i from the cat) Write down the password itself in your paper notepad, part of the password is the secret sequence of characters that you remember, and write it down with the “star” symbol.

14. Cost-free programs – they may not be safe!

Be careful and do not hijack or install risk-free programs from sites that you cannot trust.At the same time, from such a program (or under its sight) you can install a virus or a spyware program. If you are a keen experimenter, it would be better to get yourself a separate computer (either a virtual operating system or a large cloud storage) for experiments and install there everything that interests your soul. Of course, there is no need to save confidential data when installing programs with electronic payment systems.

15. Turn on “keyboard monitor”!

I also recommend NOT using the program to record all pressed keys("keyboard scanners" or "keyboard monitors" - your passwords will be stored in this memory, and all actions with the keyboard - the skin key) will be recorded in this memory. All your passwords are saved only in your notebook (and, perhaps, in addition in a special program for saving passwords), and with a “code fragment” (remember about the “star”? - Section 3 - Special It's a real pleasure).

16. Don't be a fool!

Do not get involved in the games of “charming gamans”, “reading sheets - highly paid robot distance on the Internet”, “send us 100 dollars and take back 1000”, etc. Don't be fooled by anyone!
Like any "robot seller"
ask you to make a small sum of pennies in advance (it doesn’t matter under what kind of drive, but rather - open the rakhunok for you, make the first deposit, register you with me there, etc.), then. essentially ask you for pennies BEFORE you withdraw your earnings, that's all , this is guaranteed to be a deception for a pure person or for someone who looks like a financial pyramid (in another case, you may be instantly fooled by yourself). Never buy into it. Well, if you buy it, it’s your own fault, as it seems. Then you will have to learn lessons from your pardons. It’s a good principle: if you’ve spent a lot of money on a lot of money, think about it as a paid lesson. Learn all the necessary skills so that you can learn how to learn from them.

Remember these two simplest and truest principles that will help you prevent deception and cheating:

1. Know firmly: You haven’t earned anything yet, and any “robot seller” is already asking you for pennies, which is definitely a scam!

2. Know firmly: If you want to “earn” decent money, but there is no real goods or services (that would be effectively needed by people and would be sold), then this is cheating.

The importance of normal civilized margin marketing (or MLM) versus financial pyramidsin which itself - in boundary marketing (in MLM companies, for example, in the Oriflame company) there is a product and service that is sold that is needed by people, and in the financial pyramid there is no product, or there is no visibility, but in reality it is simple are overdoing it pennies from the guts of some people to the guts of others. So don’t “splash the baby with the water” ;-) ! Tobto. Do not confuse real edge marketing with financial pyramids and other scams.

I wish you all the best for surfing the Internet!

With respect, Vadim Lovkin

Internet security is a very important problem today. And everyone is worried, from children to pensioners. This is becoming increasingly relevant in connection with the massive arrival on the Internet of koristuvachs, perhaps, or even in general, who are not prepared for the threats that they should be on the lookout for. That’s why this article will be dedicated to such nutrition as safety on the Internet. It is not just one koristuvach who suffers, but many others, united in one global structure.

The dangers that await us at the edge

To put it briefly, there are two main possibilities for how your computer could become a victim. First, you yourself, by manipulating various sites or installing security programs from unverified devices, and sometimes from verified ones, infect your computer. On the other hand, the same situation is possible if malicious criminals use, for example, Trojan programs or viruses, to ruin your device with a lot of danger.

As a result of all this, the computer, at the same time leading to its owner, begins to send spam, take part in DDoS attacks on various sites, and steal passwords. It is likely that the service provider will automatically turn on such a device, so that it is important for them not to know about what constitutes the basics of security on the Internet.

Now the criminals need access to the koristuvach’s computer

Surely the most senior businessman thinks that no one needs his computer. Previously, hackers often wrote viruses simply for the sake of interest, and at the same time they could potentially gain commercial benefit. On the 20th, the evil-doer expressed satisfaction that he could simply format the hard drive. Or work in such a way that when the computer is turned on, instead of the standard desktop, some cool pictures appear. The infection of the stench can be eliminated more and more, so that the ruler of the PC is no longer aware of those that are the source of the infections and hide from the new one the additional functions.

Is it all right to be afraid? In addition, as mentioned above, hackers are trying to deny access to your emails, emails, accounts on social networks, and forums. It’s like this, for example, that you’re going to bed with 20,000 rubles on electronic money, and the French are sending SMS messages about those who don’t have any money left. And if you send all your contacts, you will not only get spam lists, but also Trojans. Hackers can unite uninfected computers under one roof and carry out a DDoS attack on other government servers. The simplest way, and also the way to make money: block the operating system and get money for fixing the problem. And, before speaking, take the pennies, otherwise the computer will be blocked. So, safety on the Internet is the basis of your work on it.

How do evil people get into your computer? Detailed information

In order to hack your PC, hackers use a number of methods, and business owners are foolish to think that by simply installing an antivirus, they would be in danger of, for example, installing a bad program. Therefore, first of all, you need to understand the information about how to properly maintain security while surfing the Internet, and keep an eye out for viruses and Trojans. The main routes of their penetration and methods of stealing various information are being disrupted.

  1. The first method is called: Using various psychological techniques, cunning and trustworthiness of hackers, hackers send you an entirely innocent file or sheet, and you yourself launch a Trojan from it. Or, when you log in, the service administration will see all your login and login passwords.
  2. Another method is to use various free software programs, pirated disks, free of viruses, Trojans, etc.
  3. The PZ, including those from the most recent revisions of the devices, is constantly having troubles with the homeless. There are a lot of operating systems. It is important for the evildoers to follow such moments, trying not to miss them, but to exploit them for the purposes of power. Go to any site that has been verified a hundred times and – once – your device for infections.
  4. The fourth method is to create a special expansion during the remaining hours. This is phishing if fragmented websites are created. And instead of the side of your bank, you rely on your detailed copy. We don’t speak about those that could be further away, you can guess for yourself.

Pochatkovy zakhist kom'yutera koristuvach

Ideally, having bought a PC, the buyer is guilty of losing a whole series of operations before rushing to explore the endless expanses of the world. Now we will present our first lessons on Internet safety.

More safety lessons

Now a little information about how to ensure the safety of your work on the Internet. Once you have ordered it from the previous section, please do not forget about the lost protection.


More internet safety lessons

Let's briefly talk about some foreign entries. If your bank has the best option for checking your password, don’t even think about sending it to them. Banks should not pay for any of these requests. Everyone has a spam filter. Trust you. Having taken off a sheet about a gain of millions of rubles or a decline of five million dollars, remove them immediately. It is recommended to install a complex protection system. There is the most reliable one, the antivirus is from one virus, the firewall is from another, and the anti-spyware program is from a third.


Give priority to paid versions. Opera and Internet Explorer are the most advanced browsers, and they have the most viruses. Check out alternative options: Apple Safari, Google Chrome and Mozilla Firefox. Do not use unlicensed software; you can install the original software in the new system. If you shop in online stores, then use only verified options. There is no problem with any other online service. Take advantage of everything you can, and then security on the Internet will be more or less guaranteed.

Children and the Internet

Due to the development of modern technologies, more and more children are losing the ability to access the Internet. And just as they used to play important games without going overboard, now everything is completely different, and you yourself know everything. So he had a new task - to ensure the safety of children near the Internet. This is difficult to complete, and the splinters of the kidney develop completely uncontrollably.

She already has a wealth of information that children should not have access to. Before that, you need to learn how not to “catch” viruses and Trojans. Who can help them because they are not mature enough? Information security on the Internet is so important, because children are completely unacquainted with the truth. The stench can easily be spent on the wudka of a well-established shahray or evil-doer.

How to teach children how to use the Internet correctly

The most important thing is that the first sessions in the middle of the child should be carried out without regard to the adults. It is important to use such programs to control all children’s activities on the Internet.

It is necessary to limit your personal communications and chats, otherwise it may be unsafe. Because there, for example, pedophiles can prank their victims. Here are some recommendations on how you can try to ensure maximum safety for your children when using the Internet.


If your child is 14-16 years old, it is unlikely that you will be able to understand more about computers, the Internet and all similar speeches. Although, of course, it is impossible to forget about control and forget about it. More importantly, you need to remember about this problem, how to ensure security on the Internet. Even if the computer is hidden or all devices are connected to a single home network, then the threats will be greater. Before that, you will soon be able to review the activities of the child. It is recommended not to conflict with the child from this drive, but to learn how to sleep and find a good language. Regardless of what is listed, please try to accept the rules for surfing the Internet and tell us which sites cannot be used.

The PC that goes out at the edge may be installed at the back room. It will be a little bit to stream your child. Install security programs that block unwanted sites, do not allow any programs to be installed on you without warning. And don’t forget to ensure that children don’t become addicted to the Internet. We hope that we will help you protect your computer from threats.

Today it is difficult to recognize a child who is not an active user of the Internet. Rock by rock, we are aware that Russian Internet users are becoming younger. Children of our time are developing in a world that is richly influenced by the world in which their mother and father grew up. One of the most important factors in the development of a modern child is the medium of information technologies, where the Internet occupies a large place. However, with all the advances in informatization in our world, the Internet carries with it some dangers for the younger generation. Both small children and toddlers cannot fully appreciate all the risks that linger between the hours of entering the online meeting. For the help of our pleasures, clarification and recommendations, you will ensure that your child is safe and beautiful around the world.

Internet resources

Guess what happens if your child is on the Internet. Do you know what he does, who he hangs out with?

“It’s not bad. The investigation, conducted in , showed that although many parents and mothers gave children information about the need to surf the Internet safely and learned about the rules of such surfing, still a minority Fathers are responsible for keeping their children busy on the Internet, with the majority of children saying, “So they don’t support the father’s permission to use the Internet, and also to spend an hour at a time without limit.”

Fathers often think that the Internet is not a serious problem for children. Dads embrace the computer as a new daily habit. They respect the stench because if the child is at home, there is no need to fuss about them. However, don’t forget it. Fathers need to keep up to date with their children’s affairs on the Internet – as well as their interest in other areas of their activity.

Problems on the Internet

  • Free programs
  • cybershare
  • social measures
  • blogs
  • content replacement
  • Internet storage

Free programs

Bad programs are a variety of security programs specially created for damaging electronic devices or stealing information resources and data. These are viruses, “Trojan horses”, “throbs”, “bots”, programs etc. etc. Loose programs that use , save low speed during data exchange, and use your computer as a basis for expanding your loose data. They can hijack your e-mail or social media profile as a distributor of spam (“smitch”). Such unsafe files can be leaked onto your computer in the following way:

  • for assistance in identifying suspicious websites and obtaining files from them
  • from email via spam rejection
  • for additional electronic media (CD, flash drive).

Help your child prevent dangerous programs from appearing on their computer:

  1. Install an antivirus program. Anti-virus programs will help protect your computer from suspicious files, and special email filters will prevent spam by email. Such programs prevent unfair attacks.
  2. Install reliable programs. Explain to the child that licensed software or programs from verified devices do not harm the computer when piracy programs are installed.
  3. Do not open attached files. Be sure not to open attachments sent from unknown email addresses: they often contain viruses.
  4. Update your antivirus. Better yet, install auto-update.
  5. Check your computer for viruses. Scan more often, at least once a week.
  6. Reserve. Get your children started making additional copies of required files.
  7. Restore respect to passwords. For children, create unique passwords for logging into your email account or social network, and also change them periodically. Tell them that you don't need to share your password with anyone. Once we become aware, we need to remember.
  8. Other people's devices. Tell the child that she has stolen someone else’s computer (tablet, smartphone) to view her page in a social network, then she must log out of the cloud record after finishing the work. You can't save passwords on other people's devices - but they can be abused by malicious people.

Cybershare

One of the dangerous types of crimes is cyber-stealing - the theft of particularly important information from an Internet account provider: passwords, codes, passport details and bank cards, etc. SMS sent to confirm your interest phone number. It is worth mentioning that you have only seen money to renew your child’s phone number, and you will immediately come with information that you have not lost any money on the money. In this case, the child needs to learn to be careful with cybersecurity.

  1. Please inform. Explain to the child that today there are many episodes of cheating, point the butts. Discuss at the same time whether you are willing to use these or other services, especially those that are paid.
  2. Analyze the situation. If an incident occurs, ask the child what site you went to, where you clicked, what you wanted, what information you read, etc.
  3. Follow your bank cards. You have free access to your father’s payment cards: this way you will not be able to independently make purchases on the Internet.
  4. Turn over the hope. If you and your child are planning to purchase a product/service, then go to a third-party resource (online store): check the availability of the details, read the rules and instructions.


Social measures

Children today are exposed to both social measures intended for children (Smishariki - “Shararam”) and those intended for adults (Vkontakte, Odnoklassniki, Facebook, YouTube, Twitter). By registering an account with social media, children can connect with classmates and close friends, as well as with people who live in different countries.

Information is available in bulk. What rank? For example, show up cyberbullying or else grooming.

Cyberbullying It is necessary to inform social circles about how to avenge threats, images, abuse or violence. And attacks, if any side can be maligned by posting negative content on it, which belittles and portrays people.

Relationship between friends and strangers and grooming- Another problem with the use of social measures. By making friends with completely unknown people and hanging out with them, the child sets herself up for insecurity. A naive little one can voice information about himself and his homeland, know pressure, teasing and blackmail. Occasionally, when, posing as a one-year-old in an online chat, the evil-doer presses on particular interests, which can result in violence or kidnapping for the child.

Fathers should enlighten the child from the safe vikoristan of social networking sites:

  1. Enjoy your child’s virtual friends. Find out that among your “friends” there are no dubious characteristics that make a child restless. Don't panic. Tell the child that it is necessary to talk about this, and that the fathers will help solve the problem.
  2. Create rules. As soon as your children become independent using the Internet, explain their complicated rules: how they can create social media accounts, who they can accept as friends in this situation, how long they can take share in such virtual fusion, etc. Failure to comply with the rules - remove the page from the borders independently or by going to the administrator.
  3. Build your respect forever. Most social restrictions do not allow the participation of children who have not reached the age of 13-14.
  4. Follow the content. The skin social boundary is subject to the rules of koristuvannya and obzhenya shoda smіsto publication. Relate your content to a constructive nature, etc. Become familiar with these rules and follow these rules so that your young internet user does not break them. Take a friend to look at your child’s side every hour.
  5. Fence on the zustricha. Protect the children especially from the kimos, whose stench they became aware of at the edge. Explain the real threat of such sustriches. Or better yet, make it a rule not to accept strangers from friends. Stop children from flocking to the virtual world with people they actually know.
  6. Better yet, behind a pseudonym. Tell the child that it’s better not to say the correct name and nickname, but to guess the nickname.
  7. Follow the groups. Wonder what kind of comfort and group your child will join, and what kind of information passes there.
  8. Follow the photo. Often, photographs that a child posts on the Internet can provide additional information about your homeland. Ask the child not to publish photos, which could allow such information to be rejected.
  9. Streaming emotions. Be careful that the child does not become overly emotional in social settings. Evildoers despise their respect on emotionally unstable children.
  10. Internet threats. If you maintain trust in your relationship with your child, get to know her so that you don’t go to social measures at her address, threats and information about your character. For the evidence of such, it is urgent to call in.

Blogs

Blogging, or “mesh shodenniks”, is even more popular. So many of them keep blogs, daddy. If your child is the author of a blog, then you need to make sure that the young author does not have to provide a lot of information of a special nature about himself and family. Solve problems using the following recommendations:

  1. Forward view. The fathers should be amazed at the place of what your son and daughter is going to publish in the world, and only then will praise him without publication.
  2. Is the information adequate? If so, then the right to live like this (photo selection) is granted.
  3. Let's revise the blog. Sometimes you know about this child’s blog, read the comments.
  4. Monitored. Try a selection of short blogs and show your child a good option for any problem.

Content

What are “content riziki”? This is the presence on the Internet of materials of an illegal, unethical or otherwise disgraceful nature. Such materials may be represented by texts, images, sound and video files, posted and banners on third-party sites, etc. Today the whole world's border is a ceremonial expanse. Young people may be exposed to pornographic content, solicitations for drug abuse and drug use, and solicitations for participation in extremist activities. Such content can change the information of children and followers, change their valuable orientation. Particularly dangerous are sites that present methods of inflicting harm on people, pain, weight loss methods, self-destruction, drug trafficking, sites of people-hating and extremist organizations, pornographic sites.

In order to avoid the influx of content risks, fathers should lose respect on the offensive:

  1. We limit access. Today, there are security programs that limit the access of minors to controversial content. Speed ​​up the basic functions of anti-virus programs or install a father control program. For sound systems, activate the oven-free sound function.
  2. We monitor activity around the edge. Reviewing the history of websites and search queries will allow you to lose the content you want.
  3. Let me explain. Teach your children that not everything on the Internet is truth, honesty, and truth. Therefore, they independently filter information collected on the Internet.

Internet staleness

A pressing problem since 1996 is Internet congestion, which prevents visitors from accessing the Internet at the hour of their absence. Such a camp, although it does not ruin it in a direct way. Internet addiction is similar to gambling addiction. It is also characterized by a waste of time, an inability to constantly hesitate, aversion to reality, aggravation and frustration due to the lack of ability to access the Internet.

“It’s good to know. Over 90% of Internet users use services related to spilkuvanny.”

How come you noticed such symptoms in your child?

  1. Make contact. Find out what the child is crying about and what is bothering her.
  2. Don't block the Internet. Ale establish vikoristannya norms.
  3. One computer. Let only one computer be connected to the Internet - it will be easier to keep up with your child’s activities at a time. In other devices, you need to connect to the Internet.
  4. For almost an hour, the baby is covered. This way you will be aware of the danger of thoughtlessly wasting time on the Internet.
  5. Alternative. Keep your child busy, and then no one will have time to spend time on a computer/tablet/smartphone.
  6. Talk it over. Talk to your child about why you can’t live without the Internet. Let me understand that nothing will happen if I leave the place for some time.
  7. Follow our wishes - this way you can make your children’s Internet surfing safe and complete their media literacy.

5.6.1. Zagalni rules

The smells may not lead to the places the text information indicates.

2. Do not compromise confidential or financial information as it is not encrypted during transmission!

It is clear that the original email lists are not encrypted.

3. Be respectful when working with websites!

Fake websites, similar to those of great companies, are designed to deceive customers and collect their special information. Please be aware that the websites you use make privacy and security statements and respect them.

4. Check to see if the URL appears in the “address” or “user” field of your browser.

These sites may look similar to the site you are looking for, but are actually falsified. Spend a few seconds, turn it over, and when needed, customize the URL of the website you need specifically.

5. When transferring confidential information, look for the lock symbol in the lower right corner of the web page.

This symbol indicates that the site operates in secure mode. You are responsible for ensuring that you first enter confidential information.

6. When leaving a moderate supplement, work strictly before establishing procedures.

Don't just close your browser! Follow the instructions before leaving the safe area to ensure your safety.

7. Be aware of any banking operations in places where Internet services are accessible behind the scenes,

for example, in an Internet cafe.

It is important to know that on such computers there are hacker programs that capture your personal information and information about your devices. If you need to carry out the operation from the computer of the legal system, obligatory

change your PIN code from your computer after you have logged in to your computer for illegal access.

This is of great importance, since there is a risk of fixing the pressing of keys (including bank card and credit card numbers, as well as PIN) for additional special programs installed on the computer without your permission.

5.6.2. Basic rules for using login and password

1. Login is your unique identifier, which, together with the password you know, allows you to avoid unauthorized access to the extent that other people are under your username.

Never share your password with other people!

2. Find reliable passwords or PIN codes for your accounts on the Internet.

Choose words that will be important for others to guess, and choose different passwords for your every day.

Vikorist letters and numbers, as well as the identification of great and small letters, as passwords and PIN codes separate them.

3. Be suspicious of any company that asks for your password, passport number or other confidential information.

Do not submit emails on the page with queries about your specific details! Remember that all actions taken place under your

login/password are legally respected by you.

5.6.3. Features of safe robots in dartless lines

The dart-less lines are very strong with wires, and even more so. In order to penetrate the wired fence, a hacker needs to physically connect to it, and in the drone-free version, it is enough to install an antenna in the area of ​​the gateway.

Therefore, in the drone-free segments, the threat of hacker attacks and, consequently, the risks of all the many security-related problems arise will significantly increase.

For example, attackers can not only use the advanced access point to interfere with traffic passing through radio channels and listen to it in order to obtain confidential information, but also attack computers, provoking people in the service room, banal jamming of radio communications.

5.6.4. Basic rules for fighting viruses

Computer virus- This is a program that destroys the integrity of information on your computer, in some cases it leads to the appearance of ownership that enters the storage of your computer.

Today's computer viruses contain an unknown piece of information that resides at both local and global levels.

However, the influx of viruses can be neutralized by following the rules below.

1. Install only anti-virus programs that have proven positive for yourself.

Regardless of the great choice of anti-virus systems, you should only choose packages that have positively proven themselves in our market.

Viruses have power over the Runet itself, then. Russian part of the Internet.

2. Update your antivirus program periodically.

Anti-virus scanners are designed to protect only computer viruses that are in the anti-virus database.

This is not enough to guarantee absolute protection - even though new types of virus programs are appearing and springing up all over the place. In connection with this, you need to regularly update antivirus basics. The more often this simple operation is completed, the more work space will be stolen.

3. Be careful with files on your email lists.

Never open suspicious files that came from unknown people.

4. Never run programs sent by an unknown person.

This rule is simple and does not require explanation. However, files removed from “trusted” correspondents (acquaintances, colleagues and friends) may also be infected. Your friends may not know that there is unauthorized access to files from their computer: a virus created by someone else can do it under someone else's name, which is unknown to the owner of the computer!

Before opening any file, you need to scan it with anti-virus software. Of course, good antivirus packages perform scans automatically.