Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Wi-Fi hackers use to attack your seven methods     - Open MySQL slow query log (Database)

- Configure the Linux kernel and use iptables to do port mapping (Linux)

- Secondary exponential smoothing prediction method implemented in Python (Programming)

- MySQL / MariaDB database master-slave replication (Database)

- Python function arguments * args and ** kwargs usage (Programming)

- Spring AOP for logging (Programming)

- Ubuntu Tutorial: E: Failed to get lock / var / lib / apt / lists / lock - open (Linux)

- Linux SVN installation and configuration graphic tutorials (Server)

- The development environment to build Nodejs under Ubuntu 14.04 (Linux)

- Deb package installation method under ubuntu (Linux)

- Mount NFS network file system (Linux)

- Embedded Linux to solve the problem in the time zone (Linux)

- Ubuntu installation 2.10.x version of Scala (Linux)

- Oracle bdump file soaring (Database)

- LVM basic concepts, management (Linux)

- Linux system security (Linux)

- DRBD Principle and Features Overview (Server)

- How to view the Linux program or process used in the library (Linux)

- How to configure security services under Linux (Linux)

- Storm how to ensure that at least once semantics (Programming)

  Wi-Fi hackers use to attack your seven methods
  Add Date : 2018-11-21      

Wi-Fi hackers using your privacy violated seven methods

Wi-Fi - ah, you are so easy, yet so dangerous!

here to tell you about the connection via Wi-Fi "generous donation" seven ways your identity information and counter-measures.


use a free hotspot

They seem to be everywhere, and their number will triple over the next four years. But many of them are untrustworthy, from your login credentials, email accounts and even more sensitive, can be used by hackers to use " sniffer (sniffer) " interception software - this software can intercept any you submit information via this connection. The best way to prevent being targeted by hackers is to use a VPN (virtual private network (virtual private network)), which encrypts information you input, it is possible to protect your data privacy.


online banking

You probably do not think anyone needs to be reminded not to use free Wi-Fi to operate online banking, but the network security firm Kaspersky Lab represents the world's more than 100 banks because hackers lost $ 900 million, or seen there are a lot of people suffer. If you believe a coffee shop free Wi-Fi is formal, you want to connect to it, then you should make sure the network name to the waiter. Other people in the store with the router set up an open wireless connection, and set up its network name as its name is a very simple matter.


Always open Wi-Fi switch

If your phone's Wi-Fi switch has been open, you'll automatically be connected to an unsecured network to go, you do not even realize. You can use the Wi-Fi feature on your phone location, if there is such a function, then it will automatically turn off your Wi-Fi switch you leave your saved and scope of the network, after you back on again.


do not use a firewall

A firewall is your first line of defense against malicious intrusion, it can effectively make your computer network to keep them open and blocks hackers and malicious software. You should always open it unless your anti-virus software has its own firewall.


Browse non-encrypted website

Speaking sad, ranking the world's top 100 million sites in 55 per cent is not encrypted, an unencrypted site will be exposed in the eyes of all transmitted data hackers. If a page is secure, your browser will have indicated (for example, Firefox is a gray padlock, Chrome browser is a green lock icon). But even you can not make the site safe from the risk of being hijacked, they steal cookies from a public network through your visited sites, whether or not formal website.


Do not update your security software

If you want to make sure your network is protected, update the router firmware. You have to do is to enter your router administration page to be examined, usually you can download the latest firmware version on the manufacturer's official website.


does not protect your home Wi-Fi

Needless to say, set a complex password and change the default name of the wireless connection is very important. You can also filter your MAC address to make your router only confirmed the identification of those devices.

- Multi-core CPU, multi-threading and parallel computation (Linux)
- Binary tree and some basic operations with binary list (Programming)
- ActionContext and ServletActionContext Summary (Programming)
- Java reflection by calling the class method (Programming)
- Ubuntu 14.04 compile, install, configure, the latest development version GoldenDict (Linux)
- Acquaintance C ++: the most simple C ++ program (Programming)
- Ubuntu installation module Python rq (Linux)
- The YUM package management under Linux (Linux)
- How to add and delete bookmarks in Ubuntu (Linux)
- ld.so.conf.d profile (Linux)
- Lua non-blocking write log (Programming)
- CentOS7 minimized installation can not find the 'ifconfig' command - Repair Tips (Linux)
- Why is better than Git SVN (Linux)
- how to quickly find a file on Linux system (Linux)
- Linux tool curl and wget advanced use (Linux)
- Linux source code to install Apache and solutions to common errors (Server)
- Ubuntu Tutorial - Manually install Oracle Java JDK 8 (Linux)
- Linux system security Comments (Linux)
- Use pg_basebackup build PostgreSQL streaming replication environment (Database)
- Ubuntu will be written in a command file, executable file, source command (Linux)
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.