Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Expert advice: Do not use the computer security IE browser     - Java String type time compare the size (Programming)

- Shell Programming Regular Expressions (Programming)

- Android design patterns - state mode (Programming)

- C ++ in the elimination Wunused (Programming)

- How to customize your Linux desktop: Gnome 3 (Linux)

- Method under Linux GCC Compiler shared library function export control (Programming)

- Oracle Bug caused by the collection of AWR Snapshot fault (Database)

- MySQL use benchmarking tool sysbench (Database)

- How to install and configure in Ubuntu 14.10 'Weather Information Indicator' (Linux)

- CentOS installation of the ftp (Linux)

- Open log in Hibernate (Programming)

- Oracle 11g How dataguard master repository to Oracle single instance data recovery (Database)

- PostgreSQL Select source code analysis (Database)

- RedHat6.4 installation tutorial --- Minimal Edition (Linux)

- Hadoop 2.5 Pseudo distribution installation (Server)

- Graphical development environment to build Android under Ubuntu 11.04 (Linux)

- Linux file compression and archiving (Linux)

- Linux find command usage summary (Linux)

- After installation of Debian 6.0 do a few things first (Linux)

- VMware virtual machine to install CentOS 6.2 (Linux)

 
         
  Expert advice: Do not use the computer security IE browser
     
  Add Date : 2017-04-13      
         
         
         
  Recently, the reporter found in known computer security experts BruceSchneier blog, "How to protect computer security," a text, BruceSchneier is the world's leading computer security experts, the current chief security technology officer at BT, he wrote too many of the computer-security theme works and tens of thousands of readers of his favorite books. In the "How to protect computer security," a text, BruceSchneier from five main areas described precautions needed to protect computer security:
First, turn off the computer when not in use, particularly the use of real-time user-Fi.

Second, if the use of laptop computers, as much as possible to bring him, as if to treat wallet.

Third, the backup is also very important, try to use CD backup computer. The best way to dispose of used CD is a microwave oven at the highest power microwave for five seconds.

Fourth, remember passwords can be now not much security, so long and irregular use of passwords is the best way, the password will be copied on paper, put it in a safe place, it seems to treat treat Like cash.

Fifth, the browser is concerned, do not use IE! Reduce the use of Cookies and set to automatically delete Cookies in your browser. "I've been using the Opera browser, he was perfect in the safety program design, I never worried about my browser is attacked." BruceSchneier said.
     
         
         
         
  More:      
 
- To install and deploy Java applications under CentOS 6.5 (Linux)
- Installation Experience open source car Automotive Grade Linux system (Linux)
- To obtain installation package (RPM) under RHEL6 (Linux)
- Java Foundation - Variables and data types (Programming)
- Based shell: using read, the command-line script to achieve mass participation and input two integer calculation (Programming)
- How to use awk command in Linux (Linux)
- How to enhance the security of Linux systems (Linux)
- Use Ansible installation NGINX and NGINX Plus (Server)
- C language sorting instance (select, bubble, insert, binary, fast) (Programming)
- To use iostat display I / O status under Linux (Linux)
- Python function arguments * args and ** kwargs usage (Programming)
- Linux System Getting Started Learning: The Linux logrotate (Linux)
- Linux, rename the file or folder (mv command and rename command) (Linux)
- The practical application of Oracle synonyms + dblink (Database)
- The difference between equals and == in Java (Programming)
- MySQL 5.6 master-slave replication configuration (Database)
- Detailed iptables (Linux)
- SQL Server memory Misunderstanding (Database)
- Java threads and thread pools (Programming)
- Java rewrite the hashcode method (Programming)
     
           
     
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.