Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Expert advice: Do not use the computer security IE browser     - MacBook Air install Ubuntu dual system (Linux)

- Linux rpm command Detailed (Linux)

- Six Ways to view slides can be implemented Android (Programming)

- OpenDJ installed on RHEL6 (Linux)

- JSON Introduction and Usage Summary (Programming)

- Linux Proc File System Experiment (Linux)

- Configure the Linux kernel and use iptables to do port mapping (Linux)

- VirtualBox 4.3 Can not open a new task for a virtual computer solution (Linux)

- Node.js simple interface server (Server)

- Install the free open source financial software GnuCash 2.6.6 under Ubuntu (Linux)

- Shell Script: create a function and specify a directory for download (Programming)

- Ubuntu 15.04 installation MATE 1.10 (Linux)

- Nginx reverse proxy and self-signed https (Server)

- Erase do with HTML5 Canvas and diffusion effect (Programming)

- Linux daemon (Linux)

- Linux set the maximum number of open files nofile and nr_open, file-max Description (Linux)

- Depth understanding of C language (Programming)

- RedHat Linux source code package installation process (Linux)

- Bash common several configuration files (Linux)

- Phoenix agents use P2P WebRTC development (Programming)

  Expert advice: Do not use the computer security IE browser
  Add Date : 2017-04-13      
  Recently, the reporter found in known computer security experts BruceSchneier blog, "How to protect computer security," a text, BruceSchneier is the world's leading computer security experts, the current chief security technology officer at BT, he wrote too many of the computer-security theme works and tens of thousands of readers of his favorite books. In the "How to protect computer security," a text, BruceSchneier from five main areas described precautions needed to protect computer security:
First, turn off the computer when not in use, particularly the use of real-time user-Fi.

Second, if the use of laptop computers, as much as possible to bring him, as if to treat wallet.

Third, the backup is also very important, try to use CD backup computer. The best way to dispose of used CD is a microwave oven at the highest power microwave for five seconds.

Fourth, remember passwords can be now not much security, so long and irregular use of passwords is the best way, the password will be copied on paper, put it in a safe place, it seems to treat treat Like cash.

Fifth, the browser is concerned, do not use IE! Reduce the use of Cookies and set to automatically delete Cookies in your browser. "I've been using the Opera browser, he was perfect in the safety program design, I never worried about my browser is attacked." BruceSchneier said.
- Getting the Linux shell flow control statements (Programming)
- Shell commonly commands (Linux)
- Win7 used Eclipse to connect the virtual machine in Ubuntu Hadoop2.4 (Server)
- Github Remote Assistance (Linux)
- Windows using SSH management Ubuntu (Linux)
- DupeGuru- find and remove duplicate files (Linux)
- Redhat 7 modify the default run level method --RHEL7 use systemd to create a symbolic link to the default runlevel (Linux)
- Compile and install Redis and register as a system service under RedHat5.8 environment (Database)
- Linux basic introductory tutorial ---- simple text processing (Linux)
- How to clear the v $ archived_log view expiration information (Database)
- Use matplotlib scientific drawing in Linux (Linux)
- ActiveMQ5.10.2 version configuration JMX (Linux)
- Docker data container protection the pros and cons (Server)
- CentOS 6.2 install git error Perl5 (Linux)
- Lua4.0 interpreter documents (Programming)
- Getting Started with Linux: Learn how to install and access CentOS 7 Remote Desktop on a VPS (Server)
- Linux System Getting Started Learning: Using yum to download the RPM package without installing (Linux)
- Linux Basics Tutorial: Combining awk delete data before the specified date hdfs (Linux)
- MySQL EXPLAIN SQL output description (Database)
- Python dictionary applications get built-in method (Programming)
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.