Simple rules for working safely on the Internet! You need to know this! Basic rules for safety on the Internet Rules for personal safety on the Internet.

The number of Internet users in Russia is growing every year; according to Mediascope for the period from October 2016 to March 2017, it increased by 2% and reached 87 million people, which indicates 71% of the country’s total population. At the same time, the goals of Internet users are varied; communication on social media. networks, searching for the necessary information, purchasing goods and services, selling goods and doing business.

At the same time, the number of cyber threats is growing; the media constantly reports reports of the theft of passwords from mailboxes amounting to millions, the release of famous TV series before the premiere (we are talking about the HBO series “Game of Thrones”), or interference in elections different countries(who doesn’t know, Russian hackers helped Trump become US President by rigging voting data).

But the media only covers high-profile cyberattacks, which generate a great public outcry, ignoring everyday cybercrimes, which, according to experts, by 2018 could reach 2 trillion rubles in damage, which will affect the wallet of almost every tenth RuNet user, because our users neglect basic Internet safety rules.

To prevent users of our blog from becoming one of these “bad” statistics, I have prepared 10 rules that must be observed and adhered to.

1. Strong password

A password is the basis of security, which most RuNet users openly neglect, using simple passwords or the same for all resources, mail, social networks, forums and even personal accounts of payment systems.

And if large services care about the security of their users’ data, then small forums, online trackers, online stores neglect this and become a tasty morsel for hackers, because when the database is hacked, they also gain access to users’ emails, because they have a password for everything services are the same.

On the advice of experts, the password should consist of at least eight characters, including letters in different case, numbers and special characters in a chaotic order or in an order understandable only to the user.

Passwords must be different for key services, such as mailbox, personal account for banking services, main social network. If you have difficulty coming up with a password, use a password generator, for example, randstuff.ru, but do not forget to write them down on paper so as not to forget.

    1Password (supports Mac, iOS, Android, Windows)

    LastPass (Web, Mac, iOS, Android, Windows support)

    Dashlane (Web, Mac, iOS, Android, Windows)

    OneSafe (Mac, iOS, Android, Windows)

    iCloud Keychain (iOS, Mac)

    Splikity (iOS, Android, Chrome, Firefox, Safari)

Don’t forget to change your passwords every three to six months, thereby reducing the risk of hacking; some services already have a forced password change, in certain periodicals, mainly this social networks and electronic wallets.

2. A good antivirus program

You should not rely on built-in protection, even if you have the latest installed Windows version 10, experts advise installing third-party antiviruses because they are more effective, since now there is plenty to choose from, including free versions, the most popular of which are:

    Avast Free Antivirus

    AVG AntiVirus Free

    Bitdefender Antivirus Free Edition

    Kaspersky Antivirus Free

    ZoneAlarm Free Antivirus+

  • Avira Free Antivirus

    Adaware Antivirus Free

    Comodo Antivirus

    Panda Free Antivirus

    Qihoo 360 Total Security

At the same time, do not forget about updates to both the operating system itself and third party applications, which are installed after reboot. It is better if your Internet connection allows you to set the settings to autoload.

3. Connection security

One of the most important aspects of security when working on the Internet, as well as the safety of your login and password when working in various Internet services, is the use of an encrypted connection via the HTTPS protocol, which can be checked in the address bar; it is visually displayed in the form of a padlock.

The presence or absence of this icon can signal to you that the site is secure, and also whether it is phishing if, for example, you followed a link to an online savings bank and ended up on an unsecured site with a similar name, as in the example in the screenshot below.

Therefore, pay attention to where you go, especially via links from SMS and messages from subscribers not from your circle or spam.

4. Linking to a phone number

Most major Internet services have additional protection measures, one of which is linking your account to a mobile phone number, which at the moment is considered the most reliable available, for example, the same code word, which, in fact, is a second password.

This function is mainly used in online banking and electronic wallets, because even if your login and password are captured by attackers, it will be technically difficult to intercept an SMS in order to complete the transaction or action they need. Therefore, email services and social networks now also have the ability to link to a mobile number. I strongly recommend that you take advantage of it immediately in order to protect your information as much as possible.

5. Give up “pirate”

It just so happens that in our country it is not customary to pay for someone else’s intellectual work and the majority prefer not to buy software, but to download it for free from various torrent trackers or other similar resources. At the same time, without suspecting that more than 76% of such software has viruses, Trojans and other malicious code, with the help of which they not only steal confidential information about the user, but can also use the device without the owner’s knowledge, for example, in hacker attacks or connect it to cryptocurrency mining .

In one thing only licensed Windows XP experts found up to 63 different viruses, Trojans, spyware and other things malicious code. At the same time, when downloading and installing such “pirate” software, antivirus programs do not see most of the malicious code, so if you are still using unlicensed software, you are at risk.

6. Filter your information

With the advent social networks, publicity has become commonplace, many, without thinking about the consequences, openly share information that attackers can use for their own purposes, ranging from year and date of birth, full name, nicknames, ending with the name of their favorite dog, which, inappropriately, is also the password for Odnoklassniki.

Information about the user is collected in order to apply social engineering methods to him, when, based on the data, scammers can slip you a phishing site or send you an email from your boss (from a similar mailbox) with a link to a Trojan, which will subsequently result in some damage for you or simply they will select a password for your mailbox and from there to all the services where you are registered, and all because of the name of your beloved dog...

7. Free Wi-Fi danger

When using points Wi-Fi access Be careful in public places, although few people think about this and the word free Wi-Fi makes people excited, it still increases the risk of losing your personal data.

Therefore, before connecting, make sure that the Wi-Fi network name (SSID) is from a valid source. Don't connect to random unsecured Wi-Fi networks. If possible, use a Virtual Private Network (VPN). A VPN allows you to work on a separate, secure, private network even when connected to the public. Or you can use an app like Hotspot Shield, which sets up the VPN automatically.

Compliance with the above rules will significantly reduce the risk of losing your personal data or reduce it to zero. But the main thing is to be more careful, because according to surveys, most users become victims of scammers due to their carelessness.

For example, in an online survey conducted by Mail.Ru Group, in which 1,783 people aged 15 to 64 years old, who live in cities with a population of over 100 thousand people and access the Internet at least once a week, took part, users became victims of fraud for three reasons: they used simple passwords, downloaded viruses, and went to fraudulent sites.

| Personal safety on the Internet

Lesson 33
Personal safety on the Internet

Reminder for schoolchildren's safety on the Internet

From Tatyana Vladimirovna Orlova's blog

Every year there are more young people on the Internet, and schoolchildren are among the most active users of the Runet. Meanwhile, in addition to huge amount opportunities, the Internet also brings problems. This guide should help you stay safe online.

Computer viruses

Computer virus- this is a variety computer programs, distinctive feature which is the ability to reproduce. In addition to this, viruses can damage or completely destroy all files and data controlled by the user on whose behalf the infected program was launched, as well as damage or even destroy operating system with all files in general. In most cases, viruses are spread via the Internet.

Anti-malware methods:

Use modern operating systems that have a serious level of protection against malware;
Constantly install patches (digital patches that are automatically installed to improve the program) and other updates to your operating system. Download them only from the official website of the OS developer. If there is an automatic update mode, turn it on;
Restrict physical access to the computer for unauthorized persons;
Use external storage media, such as a flash drive, disk or file from the Internet, only from qualified sources;
Work on your computer as a user, not an administrator. This will prevent most malware from installing on your personal computer;
Use antivirus software products well-known manufacturers, with automatic update bases;
Don't open computer files received from unreliable sources. Even those files that your friend sent. It’s better to check with him whether he sent them to you.

WI-FI networks

WiFi- this is not a type of data transmission, not a technology, but just a brand, brand. Back in 1991, the Dutch company registered the “WECA” brand, which stood for the phrase “Wireless Fidelity,” which translates as “wireless precision.” Another abbreviation has reached our time, which is the same technology. This is an abbreviation for "Wi-Fi". This name was given with a hint of the highest standard of audio technology, Hi-Fi, which means “high precision”.

Yes, free Internet access in cafes, hotels and airports is an excellent opportunity to access the Internet. But many experts believe that public Wi-Fi networks are not secure.

Safety tips for working on public Wi-fi networks:

Do not share your personal information over public Wi-Fi networks. When working in them, it is advisable not to enter access passwords, logins or any numbers;
Use and update antivirus programs and firewall. This way you will protect yourself from downloading a virus to your device;
At using Wi-Fi Turn off File and Printer Sharing. This function is closed by default, but some users activate it for ease of use at work or study;
Do not use public WI-FI to transmit personal data, for example to access social networks or email;
Use only a secure connection via HTTPS, not HTTP, i.e. when typing a web address, enter “https://”;
On your mobile phone, disable the “Connect to Wi-Fi automatically” function. Don't let it happen automatic connection devices to Wi-Fi networks without your consent.

Social networks are actively entering our lives, many people work and live there permanently, and a billion people are already registered on Facebook, which is one seventh of all the inhabitants of the planet. Many users do not understand that the information they post on social networks can be found and used by anyone, including those who may not have good intentions.

Limit your friends list. Your friends should not include random or unfamiliar people;
Protect your privacy. Do not include passwords, phone numbers, addresses, your date of birth or other personal information. Attackers can even use information about how you and your parents plan to spend the holidays;
Protect your reputation - keep it clean and ask yourself: would you like other users to see what you upload? Think before you post, write, or upload anything;
If you are talking to people you don’t know, do not use your real name and other personal information: name, place of residence, place of study, etc.;
Avoid posting photographs online that show you in a location that could indicate your location;
When registering on a social network, you must use complex passwords consisting of letters and numbers and with at least 8 characters;
For social networks, mail and other sites, you must use different passwords. Then if you are hacked, the attackers will have access to only one place, and not all at once.

Electronic money

Electronic money- This is a very convenient method of payment, but there are scammers who want to get this money.

Electronic money appeared quite recently and it is precisely because of this that in many countries it is still not spelled out in laws. In Russia, they function and are already spelled out in the law, where they are divided into several types - anonymous and non-anonymous. The difference is that anonymous ones are those in which operations are allowed to be carried out without user identification, and in non-anonymous ones, user identification is mandatory.

You should also distinguish between electronic fiat money (equal to state currencies) and electronic non-fiat money (not equal to state currencies).

Basic tips for working safely with electronic money:

Link to account mobile phone. This is the most convenient and quick way restore access to the account. A linked phone will help if you forget your payment password or access the site from an unfamiliar device;
Use one-time passwords. After switching to enhanced authorization, you will no longer be in danger of theft or interception of your payment password;
Choose a complex password. Criminals will have a hard time guessing a complex password. Strong passwords are passwords that are at least 8 characters long and include lowercase and uppercase letters, numbers, and multiple symbols such as dollar sign, pound sign, exclamation mark etc. For example, $tR0ng!;;
Don't enter your personal information on sites you don't trust.

E-mail

Electronic mail is the technology and the services it provides for sending and receiving electronic messages that are distributed across computer network. Typically, an email mailbox looks like this: user_name@domain_name. Also, in addition to transmitting simple text, it is possible to transfer files.

Basic tips for using email securely:

You need to choose the right mail service. There is a huge selection of free email services on the Internet, but it is better to trust those you know and who are first in the ranking;
Do not indicate in personal mail personal information. For example, it is better to select “music_fan@” or “rock2013” ​​instead of “topic13”;
Use two-step authentication. This is when, in addition to the password, you need to enter a code sent via SMS;
Choose a complex password. Each mailbox must have its own strong, hack-resistant password;
If you have the opportunity to write your own personal question, use this opportunity;
Use multiple mailboxes. The first is for private correspondence with recipients you trust. This email address do not need to be used when registering on forums and websites;
Do not open files or other attachments in emails, even if they come from your friends. It’s better to check with them whether they sent you these files;
After finishing work on postal service Before closing the tab with the site, do not forget to click on “Exit”.

Cyberbullying or virtual bullying

Cyberbullying- harassment by messages containing insults, aggression, intimidation; hooliganism; social boycotting using various Internet services.

Basic tips to combat cyberbullying:

Don't rush into battle. The best way: seek advice on how to behave and, if there is no one to whom you can turn, then calm down first. If you start responding to insults with insults, you will only inflame the conflict even more;
Manage your cyber reputation;
Anonymity on the Internet is imaginary. There are ways to find out who is behind an anonymous account;
You should not lead a hooligan virtual life. The Internet records all your actions and stores them. It will be extremely difficult to remove them;
Maintain your virtual honor from a young age;
Ignore the single negative. One-off offensive messages are best ignored. Usually aggression stops at the initial stage;
Ban the aggressor. In instant messaging programs and social networks, it is possible to block sending messages from certain addresses;
If you are a witness to cyberbullying. Your actions: speak out against the stalker, show him that his actions are assessed negatively, support the victim who needs psychological help, inform adults about the fact of aggressive behavior online.

Mobile phone

Modern smartphones and tablets contain quite mature functionality, and now they can compete with desktop computers. However, there are still very few protection measures for such devices. Testing and searching for vulnerabilities in them is not as intensive as for PCs, the same applies to mobile applications. Modern mobile browsers have almost caught up with their desktop counterparts, however, expanding functionality entails greater complexity and less security. Not all manufacturers release updates that close critical vulnerabilities for their devices.

Basic tips for mobile phone security:

Nothing is truly free. Be careful, because when you are offered free content, there may be some hidden content. paid services;
Think before you send an SMS, photo or video. Do you know exactly where they will end up?
It is necessary to update the operating system of your smartphone;
Use antivirus programs for mobile phones;
Don't download apps from unknown source, because they may contain malicious software;
After you leave the site where you entered personal information, go to your browser settings and delete cookies;
Periodically check which paid services are activated on your number;
Only give your mobile number to people you know and trust;
Bluetooth should be turned off when you are not using it. Don't forget to check this sometimes.

Online games

Modern online games are colorful, exciting entertainment that unites hundreds of thousands of people around the world. Players explore the world given to them, communicate with each other, complete tasks, fight monsters and gain experience. They pay for pleasure: they buy a disc, pay for a subscription or purchase some options.

All these funds go towards maintaining and developing the game, as well as security itself: authorization systems are being improved, new patches (digital patches for programs) are released, and server vulnerabilities are closed. In such games, you should be afraid not so much of your opponents as of the theft of your password, on which the authorization system of most games is based.

Basic tips for the security of your gaming account:

If another player behaves badly or causes trouble for you, block him from the list of players;
Complain to the game administrators about the bad behavior of this player, it is advisable to attach some evidence in the form of screenshots;
Do not provide personal information in your game profile;
Respect other participants in the game;
Do not install unofficial patches and mods;
Use complex and different passwords;
Even while playing, you should not disable your antivirus. While you are playing, your computer can be infected.

Phishing or identity theft

The usual theft of money and documents today will not surprise anyone, but with the development of Internet technologies, attackers have moved to the Internet and continue to do their “favorite” business. This is how it appeared new threat: Internet fraud or phishing, the main goal of which is to obtain confidential user data - logins and passwords. On English phishing is read as phishing (from fishing - fishing, password - password).

Basic tips to combat phishing:

Keep an eye on your account. If you suspect that your profile has been hacked, then you need to block it and inform the resource administrators about it as soon as possible;
Use safe websites, including online stores and search engines;
Use complex and different passwords. Thus, if you are hacked, the attackers will have access to only one of your online profiles, and not all of them;
If you have been hacked, then you need to warn all your friends who are added as your friends that you have been hacked and, possibly, spam and links to phishing sites will be sent on your behalf;
Set a strong password (PIN) on your mobile phone;
Disable password saving in the browser;
Do not open files or other attachments in emails, even if they come from your friends. It’s better to check with them whether they sent you these files.

Digital Reputation

Digital Reputation- this is negative or positive information about you on the Internet. Compromising information posted on the Internet can seriously affect your real life. “Digital reputation” is your image, which is formed from information about you on the Internet. Your place of residence, study, your financial situation, character traits and stories about loved ones - all this accumulates on the Internet.

Many teenagers are frivolous about publishing personal information on the Internet, not understanding the possible consequences. You won’t even be able to guess that a photo posted 5 years ago was the reason they refused to hire you.

Hello, dear friends!

Every day we use the Internet. Everyone has already become accustomed to his existence, to the fact that he exists.

This technological progress, which gave us, helps us stay informed about all events in the world, helps us find necessary information, watch movies online and a lot of other benefits.

And the most important and important thing in my opinion is that with the help of special programs, we can be closer to each other, despite the distances.

This is all wonderful. But the Internet is not as harmless at first glance as it might seem.

After all, no matter how you look at it, the Internet is a huge world, and you don’t always meet only kind and honest people along the way.

There are enough evil trolls there, and just not good people.

So let's talk a little today about how to make sure that our life on the Internet does not suddenly turn from a fun, carefree journey into a terrible reality with elements of a horror film from modern reality and subsequently into a headache.

To do this, you need to develop habits and rules on the way to safe internet and understand:

There is even a holiday on the Internet - Safe Internet Day:

Safe Internet Day.

It has been celebrated since 2004. And it was created in order to draw the attention of users to this problem.

The Internet also has its own laws, but in general there is chaos here and there, in which it is very easy to get lost.

Of course, it is not possible to achieve complete security on the Internet.

Write in the comments how you protect yourself on the Internet and whether you think this problem is relevant and I hope that you will find mine useful:

Golden rules for internet safety.

WATCH A CARTOON ABOUT MASYANYA FROM THE INTERNET:

Sincerely, Larisa Mazurova.

  • Be careful with links contained in emails. They may lead in a completely different direction than the text information indicates.
  • Do not submit sensitive personal or financial information unless it is encrypted (if you are on a secure website). Regular emails are not encrypted.
  • Be careful! Fake, look-alike sites large companies websites designed to deceive customers and collect their personal information. Make sure that the websites you interact with contain privacy and security statements and review them carefully. Make sure the URL you want appears in the "address" or "host" field of your browser. Some websites may appear similar to what you need, but may in fact be fraudulent. Take a few extra seconds and type the URL yourself.
  • When transmitting sensitive information, look for the padlock symbol in the lower right corner of the web page. This symbol indicates that the site is running in secure mode. You must see it BEFORE you enter sensitive information.
  • Use strong passwords or PINs for your online accounts. Choose words that will be difficult for others to guess, and use a different password for each account you have. Use letters and numbers, and a combination of capitals and lowercase letters, if passwords or PINs distinguish between lowercase and uppercase letters.
  • When exiting the program, do so in accordance with established procedures. Don't just close your browser! Follow instructions when leaving the safe area to ensure your safety.
  • Avoid conducting any banking transactions in places where Internet services are publicly available, such as Internet cafes. It is very difficult to determine whether such computers are free of hacker programs that capture your personal information and account information. If you need to carry out an operation from a computer public use, change your PIN from your computer after you have used the computer public access. It has great value, since there is a risk of recording keystrokes (including bank card and credit card numbers, as well as PIN) using special programs built into a shared computer, without your knowledge.

Login and Password

Login is your unique identifier, a “name” that makes it possible to protect your computer connected to the Network from unauthorized entry into the network by another person. When registering on our network, you indicate your login and enter a password known only to you.

Basic rules for handling Login and Password

  • Please do not share your password with others!
  • Do not respond to emails asking for your personal information!
  • Be suspicious of any company or person asking for your password, passport number or other sensitive information. NetByNet employees never request this type of information via email.
  • Periodically scan your computer with an antivirus program for spyware that steals passwords and personal data.
  • Remember that all actions performed under your login/password are legally considered to have been performed by you.

Viruses

A computer virus is a program that violates the integrity of information on your computer, in some cases also leading to the failure of the equipment included in your computer. IN modern conditions computer viruses are an integral part of the information contained in local and global (Internet) networks, however, the influence of viruses on the operation of your computer can be neutralized by adhering to the following rules.

Basic rules of antivirus security.

  • Install reputable antivirus programs
  • Despite the large selection of anti-virus systems, you should use only packages that have proven themselves on our market. You can contact us for antivirus software recommendations. You should also give preference to well-supported products from our region, since, despite the global nature of the network, most viruses are specific to the Runet (Russian-language Internet).
  • Update your information periodically antivirus program
  • Antivirus scanners can only protect against those computer viruses, the data of which is contained in the anti-virus database. This is not enough to guarantee absolute protection - if only because new species are emerging virus programs. Therefore, it is necessary to update anti-virus databases regularly. The more often this simple operation is performed, the more protected the workplace will be.
  • Be careful with files in emails email. Never open suspicious files that come from people you don't know.
  • Never run programs sent by an unknown person! This rule is well known and does not need explanation. However, files received from “reliable” correspondents (acquaintances, colleagues, friends) can also be infected. Your friends may not know that unauthorized letters are being sent from their computer: the virus is capable of sending messages on someone else’s behalf, unnoticed by the computer owner! Before opening any file, you must scan it with anti-virus tools. Naturally, good antivirus packages scan automatically.
  • Limit the circle of people using your computer
  • The ideal situation is when no one except you has access to your computer. However, if this is not possible, it is necessary to clearly delineate access rights and determine the range of permitted actions for other persons. First of all, this concerns working with floppy disks and CDs, the Internet and e-mail.
  • Do it regularly backup
  • By following this rule, you will be able to save data not only if your computer is infected with a virus, but also in the event of a serious breakdown in the computer hardware.
  • Don't panic!

We in no way want to create the impression among users that viruses are an irreparable disaster. Viruses are the same programs as, say, a Windows calculator or notebook. Their distinguishing feature is that viruses are able to reproduce (i.e. create copies of themselves), integrate into other files, or boot sectors, as well as perform other unauthorized actions. Rash actions aimed at neutralizing the virus can cause much more harm. When working on a corporate network, you should immediately contact system administrator. If you are just a home user, then contact the company from which you purchased the antivirus program. Give the opportunity to professionals to take care of the security of your computer, otherwise you may forever lose the information stored on your computer.

In conclusion, it should be added that malware may not be viruses as such, but they certainly create difficulties when working on a computer. These could be, for example, intrusive advertising programs that enter the address of their page into the system as the starting page when browsing the Internet, and do not provide the opportunity to change it in the future. Therefore, in addition to antivirus software, it is a good idea to install AdAware programs that protect against such malware.

Work via WiFi radio modems

Wireless networks have a lot in common with wired networks, but there are also differences. In order to penetrate wired network, the hacker needs to physically connect to it. In the Wi-Fi version, it is enough for him to install an antenna in the nearest gateway within the network coverage area.

What could an attacker theoretically get? wireless network, the configuration of which was not given due attention?

Here is the standard list:

  • access to resources and disks of Wi-Fi network users, and through it - to LAN resources;
  • eavesdropping on traffic and extracting confidential information from it;
  • distortion of information passing through the network;
  • Internet traffic theft;
  • attack on user PCs and network servers (for example, Denial of Service or even radio jamming);
  • introduction of a fake access point;
  • sending spam, illegal activities on your behalf.
The NetByNet network allows customers to install household wi-fi equipment for the purpose of personal use and organization of internal wi-fi networks for connecting several computers within the apartment. But we urge you to pay due attention to the security of your wi-fi equipment.

The basic rules for organizing and setting up a private Wi-Fi network (if there is no goal of making it publicly available) are as follows:

  • Before purchasing network devices Please read the documentation carefully. Find out what protocols or encryption technologies they support. Check if your OS supports these encryption technologies. If not, then download updates from the developer’s website. If a number of technologies are not supported by the OS, then this must be supported at the driver level;
  • Pay attention to devices that use WPA2 and 802.11i, as this standard uses new Advanced Encryption Standard (AES);
  • If your access point allows you to deny access to your settings using wireless connection, then use this opportunity. Configure AP by wire only. Do not use the SNMP protocol, web interface or telnet over the radio;
  • If the access point allows you to control client access by MAC addresses (Media Access Control, in the settings may be called Access List), use this feature. Although the MAC address can be spoofed, it is nevertheless an additional barrier on the path of an attacker;
  • If the equipment allows you to prohibit broadcasting of the SSID, use this option (the option may be called “closed network”), but even in this case, the SSID can be intercepted when a legitimate client connects;
  • Deny access to clients with the default SSID "ANY" if the hardware allows it. Do not use simple SSIDs in your networks - come up with something unique that is not tied to the name of your organization and is not in dictionaries. However, the SSID is not encrypted and can be easily intercepted (or spied on the client’s PC);
  • Place the antennas as far as possible from windows and external walls of the building, and also limit the radio power to reduce the likelihood of connection from the street. Use directional antennas, do not use the default radio channel;
  • If, when installing network device drivers, you are offered a choice between encryption technologies WEP, WEP/WPA (middle option), WPA, select WPA (in small networks you can use Pre-Shared Key (PSK) mode). If devices do not support WPA, be sure to at least enable WEP. When choosing a device, never buy something that doesn't even support 128bit WEP.
  • Always use the longest possible keys. 128-bit is the minimum (but if there are 40/64-bit cards on the network, then you will not be able to connect to them). Never enter simple, “default” or obvious keys and passwords in the settings (birthday, 12345), change them periodically (in the settings there is usually a convenient choice of four predefined keys - tell clients what day of the week which key is used ).
  • Do not give anyone information about how and with what passwords you connect (if passwords are used). Distorting or stealing data, as well as eavesdropping on traffic by inserting it into the transmitted stream, is a very labor-intensive task when long, dynamically changing keys are used. Therefore, it is easier for hackers to use the human factor;
  • If you use static keys and passwords, be sure to change them frequently. It is better to do this by one person - the administrator;
    If the device settings offer a choice between the WEP authentication methods "Shared Key" and "Open System", select "Shared Key". If the AP does not support filtering by MAC addresses, then to enter the "Open System" it is enough to know the SSID, but in the case of "Shared Key" the client must know the WEP key (www.proxim.com/ support/ all/ harmony/ technotes/ tn2001-08-10c.html). However, in the case of "Shared Key" it is possible to intercept the key, and the access key is the same for all clients. Due to this, many sources recommend "Open System";
  • Be sure to use a complex password to access the access point settings. If the access point does not allow you to restrict access with a password, its place in the landfill;
  • If you are prompted to enter a key to generate key phrase, then use a set of letters and numbers without spaces. When manually entering a WEP key, enter values ​​for all fields of the key (in hexadecimal notation, you can enter numbers 0-9 and letters a-f).
  • If possible, do not use TCP/IP protocol on wireless networks to organize shared folders, files, and printers. Organizing shared resources using NetBEUI is safer in this case. Do not allow guest access to shared resources, use long, complex passwords;
  • If possible, do not use DHCP on your wireless network - manually distributing static IP addresses between legitimate clients is safer;
  • Install firewalls on all PCs within the wireless network, try not to install an access point outside the firewall, use a minimum of protocols within the WLAN (for example, only HTTP and SMTP). The point is that in corporate networks there is usually only one firewall - at the Internet access, but an intruder who gains access via Wi-Fi can get into the LAN, bypassing the corporate firewall;
  • Regularly examine the vulnerabilities of your network using specialized security scanners (including hacker ones like NetStumbler), update firmware and device drivers, and install patches for Windows.

Please remember that if your wi-fi network is compromised and an attacker commits illegal actions on the Internet on your behalf, it is very difficult to prove your innocence.

If you want to increase the security of your online travel, then read the recommendations below, the implementation of which will help you avoid many problems associated with business or simply surfing the Internet.

The main recommendations here are aimed at developing the ability to use passwords. If you are a more or less advanced user of a computer and the Internet (so, at an intermediate level), then you probably have approximately the following list of passwords.

List of typical passwords for any user

To your mailboxes(usually to two or three mailboxes);
-- To social network accounts(usually two, three...);
-- To Internet messenger accounts(aka Internet pagers), such as ICQ (popularly ICQ), QIP, Miranda, M-Agent, Skype, Yahoo and others (usually everyone has at least a “login/number” account in two or three of them ;
-- To the forums where you communicate(usually a person registers in 2-10 forums), and this is also a login and password for each forum;
-- To mailing services(usually two or three, where you are subscribed to mailing lists and where you can change settings - refuse or subscribe to mailing lists)
-- To affiliate program accounts(from one to dozens or even more) in which you participate as a partner (username/password is also used).
-- To your account in the electronic payment system(as well as passwords to the key file, to the wallet program itself, or to the operation of confirming the withdrawal of funds from the account, as well as the “secret key” itself to the settings of your wallets - if you decide to configure them yourself, for example, for premium payments on your website). Typically, a user registers in two or more payment systems. And rightly so, because it gives more opportunities!
It turns out, on average, about 10-20 logins, and passwords, as a rule, are a third more! But I haven’t listed everything. It is passwords that turn out to be the most vulnerable point in any security system - no one wants to remember 15 complex passwords, so they use their last name, change the keyboard layout (they write in Russian, but on the English layout or vice versa), use the names of children and loved ones as passwords, your mobile phone numbers, pet names, etc. - these are all completely naive and unreliable passwords, especially if they are repeated!

So, here they are very simple and very important recommendations, the importance of which for you will increase in proportion to your income:

attention!
take it as seriously as possible
to the recommendations below!

1. The password exists only for you!

Never, under no circumstances Neither I nor any serious service (or service) will ask you to give any password, for example, a password to access your page affiliate program(to your personal account), to your mailbox, your bank card etc.! Consider any requests or demands of this kind as the actions of intruders or, at best, “jokers.” Keep in mind that even if the demand came in a letter from supposedly my address or the address of your bank, do not believe it! The fact is that now it is quite easy to change the name and address of the sender of a letter.

The same applies to any email service (mail.ru, new mail, yandex.ru, etc.) - never, none of them, under any circumstances, will ask you to hand over your password (including for supposedly solving problems with your mailbox).

Absolutely the same applies to electronic payment systems and any banks(no matter where they are located): no bank, no payment system will ever send you a letter asking you to send a password, confirm your plastic card number or its PIN code online!!! There is a whole system of phishing (forgery) and other methods of Internet fraud, the purpose of which is to gain access to your passwords from your accounts, credit cards, payment system accounts, etc. For example, you may receive a letter from a “supposedly bank” and following the link in this letter you will find yourself on the website of “supposedly this bank” (which will look exactly the same as the real one), where you will be asked to enter your passwords... That’s all. .. The only thing that can save you is the knowledge that no bank will ever ask you for this. If you doubt anything, call your bank’s support service (at the number you have written down in advance) and ask - they will tell you everything and give you advice. Don't be shy, they work for the people! Now, with the development of Internet banking, this is especially important. In addition, pay attention to the address in the address bar of the browser through which you open sites.

Moreover, more and more often, any references to anything are excluded from real letters from payment systems or banks.(which is usually specially emphasized in such letters - for security purposes). If you receive a letter from a “supposedly bank” or “supposedly a payment system” and they ask you to follow a link, do not do this (this way you can open the way to a special spyware program or virus). Perhaps the only exception is the moment of registration/activation in the payment system, when you really need to follow the link in the letter received in your mailbox to activate the registration. But in this case (!) - you know in advance that such a letter will come to you and you know why it came to you (as a rule, it arrives instantly at the time of registration). Treat any unexpected mail very carefully! You cannot click on links in SPAM email!!! No way!!! If you are interested in something and you decide to follow the link, then it is better to type this link in the address bar of your browser manually (or copy it first to Notepad, and from there to the clipboard and address bar browser, but do not click on it with the mouse (this will protect you from hidden link substitution). Be careful!

2. Store your passwords in a paper notepad or in a special, secure program!

Never (!) do not store passwords in your electronic mailbox(including in the form of a picture) . All passwords, secret keys, answers to security questions, etc. It is safest to store it in a specially designated for this purpose simple paper notepad (exclude access to this notepad for everyone except you). Designate a separate spread of your notebook for each account - indicate your login and password there, and everything you need to regain control of your account, even from scratch. When you change your password to a new one, simply cross out one and enter another.

Do this:

Go to your email inbox and delete all emails containing passwords!First, of course, write down all the necessary passwords in your paper notebook.
-- Search your local computer(at home, at work, ...) and delete all records of passwords and logins for anything.

Special tip:Buy yourself a separate notebook that you will use only for these purposes. And this notebook should easily unfold and remain open! If it is inconvenient, you simply will not use it. Good option- a paper notepad on a wire spiral. Why? Because you will often have to look into it and holding it in your hand will be inconvenient (especially if you use the ten-finger typing method) - your hands should be free. A notebook with stitched pages looks beautiful, but does not stay open. On the contrary, a notebook with a spring folds out easily and you will feel comfortable working with it.

If you use a special program to store passwords, then duplicate the password database to a special flash drive or external storage (which are stored separately from your computer), so that if it breaks down hard drive or the loss of your computer, you have not lost all your passwords, recovering which later will be a very labor-intensive task. At the same time, remember that “there is always strength”, this means that there is always a certain risk if you store passwords on a computer and not in a paper notepad. You can store passwords for forums and social networks in the browser, but I do not recommend storing the password for your email and online banking in the browser.

3. Make all passwords complex!

All passwords, code words, secret keys, etc. always make COMPLEX to your email mailboxes, payment system programs and any other account, i.e. consisting of at least 11 characters, necessarily including numbers and letters of different registers (the ideal option is a random set of letters, numbers and symbols, for example: e & 2m @ k1E #39DJ8we).

4. Change your passwords regularly!

Don't worry about forgetting your password - you will definitely forget it(unless you decide to specifically train your memory in this way), because the password will not only be unmemorable, the main thing is that you will change your passwords every time there will be a suspicion that the passwords could be spied on or stolen, for example, by spyware detected by your computer's antivirus. If there were no such suspicions (for example, the antivirus did not respond to a single threat during all this time), change the main passwords anyway at least every year.
Change passwords only after updating the antivirus installed on your computer and after it has scanned the entire computer
(this will reduce the risk of your password being leaked due to active malware).
In addition, the number of passwords you use will increase along with the number of forums and other services in which you register to participate. Therefore, forget about making the password “beautiful”, “convenient”, “memorable”, etc. - beautiful and convenient Your password can only be used by an attacker.

Special tip: If you use manual password entry, you can make your life easier by using a small fragment of the password, say 5-7 characters, in all main (i.e. frequently used, not all) passwords, the same for all passwords. Such a code fragment is a certain sequence of symbols that means something only to you and no one else. This sequence of symbols must be remembered and never (!) written down anywhere! Further, when writing down any password in a paper notepad, designate this universal sequence of characters with any one icon (for example, an asterisk - " * "). For you it will be clear what the “asterisk” means, but for others it will not. Thus, even if someone gains access to your notepad, he will not be able to use the main passwords). Naturally, if you yourself forget what it means " asterisk", then you will lose access to your accounts (mailbox, your " personal account" in the affiliate program, etc.), so as a secret sequence of characters, choose something that only you know, but that you will never forget. In addition, where possible, be sure to set up a password recovery function for your mobile number phone.

Special tip:This sequence of characters (your secret code word), which you denote by the asterisk symbol, should not be simple and easy to select. The ideal option is something very cleverly coded, but clearly understandable and memorable for you. Example: "pr01EsK".

5. Use mnemonics to remember your most frequently used passwords!

How to remember a complex password that you use often? (For example, for your mailbox and your messenger)

Special tip: Most often, you probably use a password for your mailbox and a password for chat communication using a messenger (ICQ, M-Agent, etc.). It is precisely because of the frequent access to your mailbox that you want to make the password for it simpler or store the password in your browser or email client.
Under no circumstances should you simplify the password for your mailbox!
The fact is that in most services (including affiliate programs, Webmoney electronic payment systems, RBK Money, Z-PAYMENT, etc.), if you have forgotten your password, the support service will send it to your email. Consequently, an attacker can get hold of almost all of your passwords by knowing just one - from your email inbox. Naturally, if you do not want to lose control over your messenger, then make the password complex for it too. The passwords for your ICQ and your mailbox should not match!!! Passwords should never be the same.

However, regarding passwords that you use frequently: You you can use mnemonics and thus, you will easily remember the most complex password for your mailbox or messenger (but still write down your password in notebook to completely prevent its loss). How to remember?

For example, your password might look like this:
*moy1GODvRAYU
* is your secret code word or a sequence of symbols known only to you and not written down anywhere (you can’t forget it), and then you can read it like this: “my first year in paradise” (naturally, you must also remember where which register is for letters you use). From experience I can say that the register is easy to remember, you don’t even have to doubt it.

Another example:
ost125KGdoKMS*
We read: there are 125 kilograms left until the candidate for master of sports and then a secret sequence of symbols instead of an “asterisk”. This example is good for athletes. Let's say in the sum of three competitive movements (bench press, deadlift and squat) you need to perform 505 kg for a weight category of 75 kg, and as soon as the athlete has moved further, he changes the password to his box. Agree, in this situation it is not only easy to remember a complex password, but also pleasant to change it! ;-)

But such a password is not only easy to remember, but also impossible to guess! Consequently, the use of mnemonics allows you to make a password not only complex and, at the same time, memorable, but also unpredictable, which is very important for controlling your mailbox. For all others (programs, forums, etc.) - feel free to type random characters. If you decide for each program, forum, etc. come up with passwords using mnemonics, you will soon begin to avoid the procedure of changing the password itself, because you will spend too much time on it. Therefore, do not deceive yourself - use mnemonics to remember only the most frequently used passwords, and simply write the rest randomly in a notepad - “as you wrote it yourself,” or using a program with a “password generator” function, of which there are many.

6. Enter the password from your address book!

When changing the password, first write it down in your notebook and only then (i.e. from the notebook!) enter it into the input field.This rule eliminates possible errors when entering a password into a notebook. The easiest way is to come up with a strong password by randomly hitting the keys in any text editor, then supplement what you get with letters of different cases and numbers. You can immediately write a random set of characters into a notepad- it's getting very in a convenient way, but only after you are able to give up the desire to make all passwords meaningful. However, first of all, write down the password you come up with in your paper notebook, and only then(while looking in a notepad, and in no case copying from the screen) type it in the required input field. This way you will avoid possible errors with entering a password, and even more so, you will insure yourself against immediately forgetting the entered password (which, oddly enough, happens to people very often).

7. When working from someone else's or public computer, delete the history!

What if you were forced to log into your account from someone else’s computer?, then before entering your username and password, disable the function of saving personal information in the browser you are using (otherwise, anyone from this computer will be able to log into your account - for example, into your email inbox). After working on someone else's computer, delete the history for the period of time you used it. However, you should remember that “someone else’s computer” (especially in an Internet cafe) is always a high risk. You may not be aware of programs installed on other people's computers - spyware, keyboard monitors (which are often installed for network administration purposes), etc. If you still had to use “someone else’s computer” to enter one of your main passwords (from email, from online banking, etc.), then at the first opportunity (!) change the passwords that you used on someone else's computer!

If you are entering a password from someone else's computer, then put a checkmark in the "Someone else's computer" field, and if there is none, then before entering your password, go to your browser settings and disable the "save passwords" function.. This can be done in a few seconds if you know where it is. And if you don’t know, then find out in advance, find and remember. Remember: knowledge is power!

8. Use an updated antivirus + firewall!

Use a comprehensive, constantly updated software protection from malware(viruses, Trojans and spyware etc.). If you DO NOT use protection, then all the above recommendations are almost meaningless. Go to the settings of your security programs and set the parameters to ensure high security(usually everything is clearly written there, and if you don’t understand something, look for visual videos on YouTube or write to the user support service and they will explain everything to you). It is comprehensive protection, at least “antivirus + firewall” or antivirus with a firewall function, that can keep data relatively safe.

9. SPAM is dangerous!

DO NOT open attachments to letters from recipients unknown to you, and DO NOT click on links or pictures in received spam.Although, there are viruses that act on behalf of recipients recorded as known to you, so in any case, configure your antivirus to scan all files downloaded from the Internet. Opening files received by email (Word - .doc, Excel - .xls, etc.) don't allow macros(after all, your friends may not even realize that they are sending you a virus along with a letter). Ask those who write to you to indicate clear email subjects- this measure protects against accidental deletion of a normal letter along with spam. In addition, avoid “hot places” - for example, all kinds of “erotic-crack sites” - this is a favorite habitat for viruses of all stripes.

10. Set your browser to safe mode!

First, use the "update browser version" function(developers are constantly improving the functionality and security of their product, do not neglect this).
And secondly, set your browser to the most secure mode for surfing the Internet. Read articles on the Internet about how to increase the security of using your favorite browser. It won't take much time, but on the contrary, it can help save a lot of time and nerves.

With strict security settings, problems may sometimes arise when downloading files from sites you visit or when displaying all sorts of “bells and whistles” in them. In such cases, either add the site you need to the list of trusted ones (for the browser Internet Explorer this is adding the site to the "trusted sites" zone - menu Settings/Internet Options/Security), or use manually switching settings for this page, or (but only as a last resort!) temporarily Lower the overall security level in your browser's Internet Options. I remind you that you must have configured different security parameters for both the “trusted nodes” zone and the “Internet” zone in general. If you are engaged in e-commerce, then I recommend setting the most stringent security settings for the general “Internet” zone (disable all sorts of them in “Internet Options” / “Security Settings” Java Script, ActiveX, etc.).

In general, I recommend using a browser Mozilla Firefox . It's free, easy to download and install, and working with it is infinitely more pleasant than with a regular one. Internet Explorer`om. If necessary, install the necessary extensions (plugins), for example, a plugin for removing ads or a site reputation plugin, to do this, take advantage of the offer to follow the extensions (plugins) via the link that the browser will offer you when updating.

If you cannot open the page you need on a reliable site you know, then it may be that your firewall or antivirus is doing something weird (but the browser has nothing to do with it) - then for these security programs, indicate that this site can be trusted. Look through the settings of these programs and you will see everything.

Always follow the security recommendations offered by the resource you use.(for example, a website, mail system, payment service or mailing server) or program(For example, Keeper Classic, necessary for working with Webmoney). Take a little time and do everything as recommended. If you can use additional security settings that a web resource offers, then use them! For example, go to your mailbox settings and enable restricting access by IP address. Next, create a complex response to Security Question, which is used to recover your mailbox password (and be sure to write down this unique answer in your paper notepad). For example, you can select the question “what is the name of your dog” (although you may not have any dog) and write down “JimmK007*” as the name (this answer can be read as follows: Jim Carrey is agent 007, and “asterisk” is this is your code word). And so on, use all possible security settings.

Mnemonic technology helps not only to remember, but also subsequently to easily enter the password from a notepad into the required input field. At the same time, be sure to keep in your paper notepad an indication of the type of question used (for example, “what is your dog’s name”) and the answer to the security question itself! Otherwise, it may happen that you wrote down the answer, but forgot which question... Remember that your mailbox is the key to many of your passwords! Following the security recommendations of a particular web resource will not be difficult for even the most inexperienced user (nowadays everything is done for people), and if difficulties arise, the support service of the corresponding resource will always answer and help you.
Remember the truth: knowledge is power!

Dial in search bar a request to search for security holes in the email services you use, payment systems and other accounts that are important to you!For example, a request may sound like “security holes in mail.ru” or “how to protect a mailbox on mail.ru”, etc.
You will find a lot the most useful tips- use them, however ignore any methods that require you to enter your personal data(otherwise you’ll send your passwords straight to the hacker, who, under the guise of helping, does exactly the opposite). Spend your time on this, otherwise you will lose much more in the future. In a good situation, for example, if you noticed a leak of funds in time and contacted the support service and blocked your accounts, then you might save the money, but what if not? Then who will return the time spent on earning them?
No one will return the time of your life to you! Therefore, find out in advance how to quickly block (by phone or via the Internet) the accounts you use.

Special tip:Try to create your email accounts only on those email services that support secure ( SSL) connection.

Special tip:Do not store large amounts of money in your electronic accounts. As soon as the amount has become significant for you, withdraw funds from your electronic account by transfer to a bank account or into your own hands. By and large, this is the only measure that reliably allows you to protect your money.

13. Back up the files you need onto removable media!

This applies to everyone. I have twice experienced what “hard drive death” means and I wouldn’t wish it on my enemy. The first time this happened was when I was writing my Ph.D. thesis... This is generally a separate topic: on the computers of many dissertants, hard drives break down (after my bitter experience, I began to remember such stories about others), and in general, it was noticed that what The more technologically advanced and advanced the technology, the more sensitive it is to the human condition - after all, everything that exists ultimately consists of energy... I am sure that with the massive transition of humanity to computers developed and operating using nanotechnology and ultra-low energies, a real problem of interaction will arise computer with the mental state of the user. This will create considerable difficulties and endless new opportunities...

But let's return to the realities of the present day. If you do not copy important files (for example, a copy of your website, customized scripts, etc.) to a removable hard drive or large flash drive, then you are risking a lot. As soon as you have made a lot of changes to files that are important to you, copy them to a removable hard drive, flash drive, floppy disks, etc.

Special tip:get yourself a separate portable hard drive for the Archive (for important files, for example, key files, licenses, important documents). Keep it only at home and nowhere else. Never take it anywhere. Never plug it into someone else's computer! It doesn’t matter how much you trust the owner of this computer - he may not even know what’s going on on his machine! Are there many of your friends who know everything about their computer? That's it... Copy everything to this removable disk significant files. And on this disk, store the key file from your electronic wallet management program (for example, Keeper programs Classic). Separately, I emphasize once again: store the key file only on removable media(this file will only be useful to you when reinstalling Keeper or the operating system). If you still don’t have one, then archive the key file (after changing its name and extension (Keeper allows this) into a password-protected archive. Make the password as complex as the system allows, and simply delete the original (unarchived) key file (and from the basket too). Write down the password itself in your paper notepad; part of the password should be a secret sequence of characters that you remember, and write down only with the asterisk symbol.

14. Free programs - can be dangerous!

Be careful and do not download or install again. free programs from sites that have no reason to trust.Along with such a program (or under its guise), you can install a virus or spyware. If you are an avid experimenter, then it is better to get yourself a separate computer (or a separate virtual operating system, or at least a separate account) for experiments and install whatever you want there. Naturally, then it should not store confidential data, installed programs for working with electronic payment systems, and the like.

15. Turn off the "keyboard monitor"!

I also recommend NOT using programs to record all keys pressed.(“keyboard scanners” or “keyboard monitors” - your passwords will also be stored in their memory, since these programs record all actions with the keyboard - every key pressed). All your passwords should be stored only in your address book (and, possibly, additionally in special program for storing passwords), and preferably with a “code fragment” (remember about the “asterisk”? - see paragraph 3 above - Special advice).

16. Don't be a fool!

Don’t get involved in the games “magic wallets”, “reading letters - highly paid remote work on the Internet”, “send us 100 bucks and you will receive 1000”, etc. Don't be fooled by this!
If some supposed "employer"
asks you to pre-deposit a certain amount of money (it doesn’t matter under what pretext and why - to open an account for you, make a pre-payment, register you in something, etc.), i.e. in fact asks you for money BEFORE you receive your earnings, then these are scammers , this is guaranteed to be a scam pure form or in the form of a financial pyramid (in the second case, you yourself can become an unwitting deceiver). Never buy into this. Well, if you buy it, it’s your own fault, as they say. Then learn from your mistakes. A good rule of thumb is: if you lose money on something, think of it as a paid lesson. Draw all the necessary conclusions so that the lesson will benefit you.

Remember these two simplest and truest principles that help you see deception and fraud:

1. Know firmly: If you haven’t earned anything yet, and some “employer” is already asking you for money, then this is definitely a scam!

2. Know firmly: If you are offered to “earn” decent money, but there is no real product or service (that people really need and would sell), then this is a scam.

The difference between normal civilized network marketing (or MLM) and financial pyramidsThis is exactly what it is - in network marketing (in MLM companies, for example, in the Oriflame company) there is a product or service that is sold that people need, but in the financial pyramid there is no product, or there is only its appearance, but in reality money is simply transferred from the pockets of some people to the pockets of others. So don't "throw the baby out with the bathwater" ;-) ! Those. Do not confuse real network marketing with financial pyramids and other scams.

I wish you an interesting and useful surfing on the Internet!

Best regards, Vadim Levkin

Share