You are viewing the article How to Fight Hacking at Lassho.edu.vn you can quickly access the necessary information in the table of contents of the article below.
This article is co-authored by a team of editors and trained researchers who confirm the accuracy and completeness of the article.
The wikiHow Content Management team carefully monitors the work of editors to ensure that every article is up to a high standard of quality.
There are 7 references cited in this article that you can view at the bottom of the page.
This article has been viewed 8,511 times.
This wikiHow teaches you how to strengthen the security of your accounts, mobile devices, firewalls, computers, and network information.
Steps
Secure your account
- Do not use the same password for more than one website or account. This helps minimize damage to you if a hacker gets hold of one of your passwords. [1] X Research Source
- Some of the highly rated third-party password managers include “Dashlane 4”, “LastPass 4.0 Premium”, “Sticky Password Premium”, and “LogMeOnce Ultimate”.
- Most browsers have a built-in password manager to store and encrypt your passwords.
- This logic also applies to people in the information technology industry, representatives of Microsoft or Apple.
- Likewise, don’t reveal your tablet or phone’s password or PIN to others. Even your friends may accidentally reveal that password.
- If you are forced to give your password to someone else for some reason, you should change it as soon as they’ve done what they need to do with your account.
- Make sure not to use the same password twice (for example, your Facebook password should be different from your bank account…).
- When changing your password, you should change it completely. Don’t just replace a letter with another number.
- Most major websites including popular social networks have two-factor authentication built in. Check your account settings for how to enable this feature.
- You are allowed to set up two-factor authentication for your Google account.
- Some popular applications that have the ability to receive text messages are Google Authenticator and Microsoft Authenticator.
- Many people have the habit of clicking agree to the privacy policy without even reading it. If you find it a bit tedious to read carefully, you should at least skim it to get a glimpse of how your data will be used.
- If you don’t agree with something in the privacy policy or don’t feel comfortable, you may need to reconsider sharing information with that company.
- Example: You should only fill in your Twitter login information on the official Twitter page. Don’t do this on another page that requires login information to share an article or something like that.
- The only exception is when a university uses an available service (like Gmail) through their homepage.
Secure your phone
- Make sure that you change to a completely new password each time — Don’t just change some of the password.
- On most phones, you can set a “complex” or “advanced” password that includes both letters and characters in addition to the usual numeric characters.
- As always, it’s always a good idea to reduce password typing time on any platform.
- Many updates are patches that fix weaknesses and address security issues. If the software is not updated in time, the device’s weaknesses can be exploited and become the target of attacks.
- Take advantage of automatic download of all updates if available. You will avoid a lot of trouble.
- For this reason, it’s a good idea to take the power connector and USB cable with you if you’re traveling.
- Android phones have built-in security tools that prevent downloading apps from unknown sources. If you choose to disable this feature (from the Security tab in Settings), you need to carefully check the website containing the application to be downloaded before proceeding with the download.
Secure your computer
- For Mac – FileVault is an encryption feature for Mac. You can enable this feature by clicking the apple icon in the upper-left corner of your Mac screen, clicking System Preferences , clicking the Security & Privacy icon , clicking the FileVault tab , then clicking Turn On FileVault . You may have to click the lock icon first, then type in the password for the administrator account on the Mac. [5] X Research Sources
- For Windows – BitLocker is Windows’ default encryption feature. To enable this feature, simply type “bitlocker” into the Start search bar, click the “Bitlocker Drive Encryption” option, and then click Turn on BitLocker . Remember that Windows 10 Home users do not have access to BitLocker without updating to Windows 10 Pro.
- There are many cloud services that you can use to back up your data. Double-check the security of these services before using them. Although you may be tempted by the most affordable service, you still want to make sure that your data is kept safe.
- You can also use an encrypted external hard drive for data backup. Set up your computer to automatically back up every day, when you don’t normally use it.
- Remember that simply replying to an email is enough to let the sender know that your email address is valid and in use. Although you may think of replying in a sarcastic fashion, you should know that this gives the bad guys the information they need to hack your account.
- Go to your computer’s security settings and navigate to the “firewall” setting. Here, make sure that the firewall is turned on and is blocking connections from outside.
- If you’re using a wireless network, your router should also have a firewall.
- On Mac – Restart your Mac, then hold down the ⌘ Command and R keys as it boots up. Click Utilities , click Firmware Password Utility , click Turn On Firmware Password , then create your password.
- On Windows – Restart your computer and then hold down the BIOS key (usually Esc , F1 , F2 , F8 , F10 , or Del ) as the computer boots. Use the arrow keys to select the password option, then type the desired password.
- Allowing remote access means leaving the door open, making it easier for hackers to break into your computer and steal your data.
- You should also make sure that your computer’s firewall and Bluetooth feature allow only trusted connections to access your computer.
Secure your network
- If the wireless network is not secure, the computer will notify you before connecting. Some operating systems even display an exclamation mark next to the name of the network.
- If you need to use the Internet but do not have access to a secure network, you need to change your password the next time you log in to a secure network.
- If you have a wireless network at home, make sure it is always secure and encrypted. Remember that by default, wireless routers are usually not secure – you have to set them up yourself.
- For example, a fake Facebook page might have a URL of faceboook.com .
- Sites that have hyphens in their names (between “www” and “.com”) are often unreliable.
- Many files are cleverly designed so that the virus or malware hidden within is not detected by virus scanning software. The virus will not harm the system unless you try to open the file.
Advice
- There are many free and paid firewalls and antivirus software on the Internet for you to choose from.
- Make sure your password is not the same as your username or email.
Warning
- Unfortunately, the only way to be completely secure and never get hacked is to stay away from technology altogether.
This article is co-authored by a team of editors and trained researchers who confirm the accuracy and completeness of the article.
The wikiHow Content Management team carefully monitors the work of editors to ensure that every article is up to a high standard of quality.
There are 7 references cited in this article that you can see at the bottom of the page.
This article has been viewed 8,511 times.
This wikiHow teaches you how to strengthen the security of your accounts, mobile devices, firewalls, computers, and network information.
Thank you for reading this post How to Fight Hacking at Lassho.edu.vn You can comment, see more related articles below and hope to help you with interesting information.
Related Search: