Simple rules for working safely on the Internet! You need to know this! Basic Internet safety rules Basic Internet safety rules.

The number of Internet users in Russia is growing every year; according to Mediascope for the period from October 2016 to March 2017, it increased by 2% and reached 87 million people, which indicates 71% of the country’s total population. At the same time, the goals of Internet users are varied; communication on social media. networks, searching for the necessary information, purchasing goods and services, selling goods and doing business.

At the same time, the number of cyber threats is growing; the media constantly reports reports of the theft of passwords from mailboxes amounting to millions, the release of famous TV series before the premiere (we are talking about the HBO series “Game of Thrones”), or interference in elections different countries(who doesn’t know, Russian hackers helped Trump become US President by rigging voting data).

But the media only covers high-profile cyberattacks, which generate a great public response, ignoring everyday cybercrimes, which, according to experts, by 2018 could reach 2 trillion rubles in damage, which will affect the wallet of almost every tenth RuNet user, because our users neglect basic Internet safety rules.

To prevent users of our blog from becoming one of these “bad” statistics, I have prepared 10 rules that must be observed and adhered to.

1. Strong password

Password is the basis of security, which most RuNet users openly neglect, using simple passwords or the same for all resources, mail, social networks, forums and even personal accounts of payment systems.

And if large services care about the security of their users’ data, then small forums, online trackers, online stores neglect this and become a tasty morsel for hackers, because when the database is hacked, they also get access to users’ emails, because they have a password for everything services are the same.

On the advice of experts, the password should consist of at least eight characters, including letters in different case, numbers and special characters in a chaotic order or in an order understandable only to the user.

Passwords must be different for key services, such as mailbox, personal account for banking services, main social network. If you have difficulty coming up with a password, use a password generator, for example, randstuff.ru, but do not forget to write them down on paper so as not to forget.

    1Password (supports Mac, iOS, Android, Windows)

    LastPass (Web, Mac, iOS, Android, Windows support)

    Dashlane (Web, Mac, iOS, Android, Windows)

    OneSafe (Mac, iOS, Android, Windows)

    iCloud Keychain (iOS, Mac)

    Splikity (iOS, Android, Chrome, Firefox, Safari)

Don’t forget to change your passwords every three to six months, thereby reducing the risk of hacking; some services already have a forced password change, in certain periodicals, mainly this social networks and electronic wallets.

2. A good antivirus program

You should not rely on built-in protection, even if you have latest version Windows 10, experts advise installing third-party antiviruses because they are more effective, fortunately now there is plenty to choose from, including free versions, the most popular of which are:

    Avast Free Antivirus

    AVG AntiVirus Free

    Bitdefender Antivirus Free Edition

    Antivirus Kaspersky Free

    ZoneAlarm Free Antivirus+

  • Avira Free Antivirus

    Adaware Antivirus Free

    Comodo Antivirus

    Panda Free Antivirus

    Qihoo 360 Total Security

At the same time, do not forget about updates to both the operating system itself and third party applications, which are installed after reboot. It is better if your Internet connection allows you to set the settings to autoload.

3. Connection security

One of the most important aspects of security when working on the Internet, as well as the safety of your login and password when working in various Internet services, is the use of an encrypted connection via the HTTPS protocol, which can be checked in the address bar; it is visually displayed in the form of a padlock.

The presence or absence of this icon can signal to you that the site is secure, as well as whether it is phishing if, for example, you followed a link to an online savings bank and ended up on an unsecured site with a similar name, as in the example in the screenshot below.

Therefore, pay attention to where you go, especially via links from SMS and messages from subscribers not from your circle or spam.

4. Linking to a phone number

Most major Internet services have additional protection measures, one of which is linking your account to the number mobile phone, which is on at the moment is considered the most reliable available, for example, the same code word, which, in fact, is a second password.

This function is mainly used in online banking and electronic wallets, because even if your login and password are captured by attackers, it will be technically difficult to intercept an SMS in order to complete the transaction or action they need. Therefore in postal services and social networks now also have the ability to link to a mobile number. I strongly recommend that you take advantage of it immediately in order to protect your information as much as possible.

5. Give up “pirate”

It just so happens that in our country it is not customary to pay for someone else’s intellectual work and the majority prefer not to buy software, but to download it for free from various torrent trackers or other similar resources. At the same time, without suspecting that more than 76% of such software has viruses, Trojans and other malicious code, with the help of which they not only steal confidential information about the user, but can also use the device without the owner’s knowledge, for example, in hacker attacks or connect it to cryptocurrency mining.

In one thing only licensed Windows XP experts found up to 63 different viruses, Trojans, spyware and other malicious code. At the same time, when downloading and installing such a “pirate”, anti-virus programs do not see most of the malicious code, so if you are still using unlicensed software, you are at risk.

6. Filter your information

With the advent social networks, publicity has become commonplace, many, without thinking about the consequences, openly share information that attackers can use for their own purposes, ranging from year and date of birth, full name, nicknames, ending with the name of their favorite dog, which, inappropriately, is also the password for Odnoklassniki.

Information about the user is collected in order to apply social engineering methods to him, when, based on the data, scammers can slip you a phishing site or send you an email from your boss (from a similar mailbox) with a link to a Trojan, which will subsequently result in some damage for you or simply they will select a password for your mailbox and from there to all the services where you are registered, and all because of the name of your beloved dog...

7. Free Wi-Fi danger

When using points Wi-Fi access Be careful in public places, although few people think about this and the word free Wi-Fi makes people excited, it still increases the risk of losing your personal data.

Therefore, before connecting, make sure that the Wi-Fi network name (SSID) is from a valid source. Don't connect to random unsecured ones Wi-Fi networks. If possible, use a Virtual Private Network (VPN). VPN allows you to work on a separate, secure, private network even when connected to the public. Or you can use an app like Hotspot Shield, which sets up the VPN automatically.

Compliance with the above rules will significantly reduce the risk of losing your personal data or reduce it to zero. But the main thing is to be more careful, because according to surveys, most users become victims of scammers due to their carelessness.

For example, in an online survey conducted by Mail.Ru Group, in which 1,783 people aged 15 to 64 years old, who live in cities with a population of over 100 thousand people and access the Internet at least once a week, took part, users became victims of fraud for three reasons: they used simple passwords, downloaded viruses, and went to fraudulent sites.

Internet security is a very important issue of our time. And it concerns everyone, from children to pensioners. It is becoming more and more relevant due to the massive arrival on the Internet of users who are almost, if not completely, unprepared for the threats that await them. Therefore, this article will be devoted to such an issue as Internet security. After all, it is not just one user who suffers, but many others, united into one global structure.

Dangers that await us online

In short, there are two main ways your computer could become a victim. The first is you yourself, wandering through various sites or installing software from unverified sources, and sometimes from verified ones, you infect your computer. Secondly, it is also possible that attackers deliberately, using, for example, Trojan programs or viruses, make your device a source of danger.

As a result of all this, the computer, sometimes even secretly from its owner, begins sending spam, participates in DDoS attacks on various sites, and steals passwords. It also happens that the provider is forced to forcibly disconnect such a device from it. It turns out that if the user is not aware of what the basics of security on the Internet are, he will have a hard time.

Why do attackers need access to the user's computer?

It is in vain that the average user thinks that no one needs his computer. Previously, hackers often wrote viruses just for fun, but now this is almost always done for commercial gain. About 20 years ago, an attacker enjoyed the fact that he could simply format hard drive. Or make it so that when you turn on the computer, instead of the standard desktop, some funny pictures. Now they are doing everything possible so that the PC owner does not know for as long as possible that his device is infected and is performing additional functions secretly from him.

Why is all this being done? In addition, as mentioned above, hackers are trying to gain access to your emails, wallets, social network accounts, and forums. It happens, for example, that you go to bed with 20,000 rubles in your e-wallet, and in the morning you receive an SMS message saying that there is no more money in it. And from the mail, all your contacts, and not only that, receive spam emails, and even Trojans. Hackers can unite many infected computers into a single powerful network and carry out a DDoS attack even on powerful government servers. From the simplest, but also bringing in money: they will block the operation of the operating system and demand money to fix the problem. And, by the way, they will take the money, but leave the computer locked. So Internet security should be the basis of your work on it.

How do attackers get into a computer? Detailed information

In order to hack a PC’s protection, even if it exists, hackers use a number of methods, and users are in vain thinking that by simply installing an antivirus, they will get rid of the danger, for example, of getting infected malware. Therefore, before looking for information on how to properly maintain security on the Internet, you need to understand where viruses and Trojans come from. Now we will list the main ways of their penetration and methods of stealing various information.

  1. The first method is called Thanks to various psychological techniques, tricks and the gullibility of users, hackers send you a completely harmless file or letter, and you launch a Trojan in it. Or, at the request of the supposed administration of the service, you give away all your passwords and logins.
  2. The second method is that various free software is offered, pirated discs, where many viruses, Trojans and similar nasty things are hidden.
  3. Security holes constantly appear in software, including from the most reliable trusted sources. This also applies to operating systems. Attackers carefully monitor such moments, try not to miss them, but use them for their own purposes. You go to some page of a site that has been tested a hundred times and - once - your device is infected.
  4. The fourth method has become particularly widespread recently. This is phishing when fake websites are created. And instead of your bank’s page, you end up on a fake copy of it. We won’t talk about what might happen next, you can guess for yourself.

Initial protection of the user's computer

Ideally, having purchased a PC, the user should perform a number of operations before rushing to surf the endless expanses of the Internet. We will now present some of the very first lessons in internet safety.

Further safety lessons

Now some information on how to ensure safe work on the Internet. Once you've completed the steps in the previous section, continue to be mindful of your daily protection.


Some more internet safety lessons

Now let's briefly talk about some more precautions. If you receive a password verification letter from your bank, do not even think about sending it to them. Banks never make such requests. All have a spam filter. Trust him. When you receive a letter about winning a million rubles or an inheritance of five million dollars, delete them immediately. We recommend installing comprehensive protection. It is more reliable than an antivirus from one manufacturer, a firewall from another, and an antispyware program from a third.


Give preference paid versions. Since Opera and Internet Explorer- the most common browsers, there are more viruses for them. Use alternatives: Apple Safari, Google Chrome And Mozilla Firefox. Do not use unlicensed software, as it may already contain spyware. If you make purchases in online stores, then use only proven options. The same applies to any other online service. Follow all these requirements, and then security on the Internet will be more or less guaranteed.

Children and the Internet

Due to the development modern technologies All more children get the opportunity to access the Internet. And if before they mostly played games without even going online, now everything is completely different, and you yourself know everything. Therefore, a new task has emerged - to ensure the safety of children on the Internet. This is quite difficult, since initially it develops completely uncontrollably.

There is a lot of information in it that children should not have access to. In addition, they need to be taught how not to “catch” viruses and Trojans. Who will help them with this if not adults. In addition, it is very important information security on the Internet, since children are completely inexperienced users. They can easily fall for the bait of an experienced fraudster or attacker.

How to teach children to use the Internet correctly

The very first piece of advice is that the child should spend his first online sessions with an adult. It is advisable to use programs such as to monitor all the actions of children on the Internet.

It is necessary to limit your independent use of mail and chats, because it can even be dangerous. Because there, for example, pedophiles can look for victims. We will give some recommendations on how you can try to ensure the maximum safety of children on the Internet.


When your child is 14-16 years old, it is unlikely that you will be able to understand more than him about computers, the Internet and all such things. Although, of course, we cannot forget about control and influence on it. Moreover, we must remember about such a problem as ensuring security on the Internet. After all, if the computer is shared, or all devices are connected to a single home network, then the threats will be common. In addition, you can always view reports on your child’s activities. It is recommended not to conflict with the child about this, but to try to communicate and find common language. Despite objections, try to force them to accept the rules for using the Internet, tell them which sites they cannot visit.

A PC with network access must be installed in a common room. This will hold your child back a bit. Install software that blocks unwanted sites; do not allow the installation of any programs without your consent. And do not forget to ensure that children do not become addicted to the Internet. We hope that our tips will help protect your computers from threats.

Hello, dear friends!

Every day we use the Internet. Everyone has already become accustomed to his existence, to the fact that he exists.

This technological progress, which gave us, helps us stay informed about all events in the world, helps us find necessary information, watch movies online and a lot of other benefits.

And the most important and important thing in my opinion is that with the help of special programs, we can be closer to each other, despite the distances.

This is all wonderful. But the Internet is not as harmless at first glance as it might seem.

After all, no matter how you look at it, the Internet is a huge world, and you don’t always meet only kind and honest people along the way.

There are enough evil trolls there, and just not good people.

So let’s talk a little today about how to make sure that our life on the Internet does not suddenly turn from a fun, carefree journey into a terrible reality with elements of a horror film from modern reality and subsequently into a headache.

To do this, you need to develop habits and rules on the way to safe internet and understand:

There is even a holiday on the Internet - Safe Internet Day:

Safe Internet Day.

It has been celebrated since 2004. And it was created in order to draw the attention of users to this problem.

The Internet also has its own laws, but in general there is chaos here and there, in which it is very easy to get lost.

Of course, it is not possible to achieve complete security on the Internet.

Write in the comments how you protect yourself on the Internet and whether you think this problem is relevant and I hope that you will find mine useful:

Golden rules for internet safety.

WATCH A CARTOON ABOUT MASYANYA FROM THE INTERNET:

Sincerely, Larisa Mazurova.

Compliance with certain safety rules when working on a computer significantly reduces the risk of infection of the system with malware. Therefore, the user can safely use operating system Windows.

There are a lot of dangerous threats: programs installed on a computer can be dangerous; just by being on the Internet, you can go to an infected site, click on a suspicious link, download files from the network, copy files to your computer from a flash drive or optical drive.

Even simple text file may contain malicious code; viruses are embedded in ordinary images. All this can pose a danger to your computer.

To successfully counter this, use recommendations based on my personal experience and I hope that they will be useful to someone. By generally following these security rules, you will increase the security and safety of your data and the overall security of your computer.

Basic safety rules that will reduce the chances of infecting your computer:

  • divide the disk into several partitions to save data;
  • original Windows version more secure;
  • install Windows security updates;
  • use backup and archiving;
  • solve problems that arise on your computer using system recovery;
  • use antivirus;
  • scan your computer with anti-virus scanners;
  • disable autorun from disks;
  • safer to use account with limited rights;
  • do not disable User Account Control (UAC);
  • run unknown programs in an isolated environment;
  • use virtual machines to run unknown software;
  • follow basic internet safety rules;
  • use specialized programs to store passwords;
  • regularly update programs and maintain the system.

Partitioning a disk into several partitions

This recommendation is not directly related to security, but using it can help you save information that might suddenly be lost. For example, if you have to urgently reinstall the operating system after a virus infection, if you cannot restore Windows to functionality in other ways.

If the computer only has a “C:” drive, then it is advisable to have two partitions. It is better to do this when installing the operating system on your computer.

The “C:” drive will contain the operating system and programs, and the other drive will contain the rest of the data. In the event that you need to reinstall the operating system, all data on the “C:” drive will be lost, while other data located on another drive will be saved.

Using the original version of the operating system

As for the assemblies, you don’t know what exactly the author Windows builds done with the operating system image. It is unknown what has been added to the OS, what has been removed, what has been changed in the operating system settings. At best, you can find out from the description, but you have no way to check whether it is true or not.

Over time, problems may arise when working in such an operating system, since the authors of assemblies often use different tweaks that are not always justified. Many authors integrate into similar assemblies huge amount programs, most of which are not needed by the average computer user.

Installing updates for the operating system

After connecting to the Internet, with default settings, the operating system automatically downloads updates from Microsoft servers. Regular updates for the operating system are released approximately once a month.

Some users disable automatic update, fearing that the activation of the Windows operating system may fail. The updates themselves mostly concern security issues, and also apply some fixes to the operating system, eliminating identified problems in Windows.

The update closes detected vulnerabilities in the operating system. Therefore, after installing updates, the system will work more stable and secure.

The case of the virus is indicative. Basically, this virus infected computers on which operating system updates were disabled, because they managed to release a patch before the outbreak began.

Data backup and archiving

It is necessary to set up backup and archiving of data so as not to lose important data in the event of an OS failure or computer problems. For example, the hard drive suddenly failed, and if you have backup copies of your files, you will not lose them.

Launched by the Windows 7 operating system tool, as well as special programs, for example, Acronis True Image, or other similar applications.

Before making a backup, you should create a system recovery disk so that you can boot from this media if the system cannot boot.

Create backup copy system disk. Copy data from your computer to external hard disk for greater safety of backup copies.

If a computer malfunction occurs, you can restore the contents of the system disk from a backup copy.

Some laptop manufacturers create a special hidden partition on the hard drive with an image of the operating system to restore it in the event of a computer failure.

You should also regularly copy other important files to a flash drive or another PC drive.

Restoring the operating system to an earlier state

If the operating system malfunctions, use the function to restore the computer to its previous state.

Make sure that System Restore is not disabled on your computer (it is enabled by default). The Windows operating system periodically and automatically creates restore points.

You can create a restore point yourself, so that the user has the opportunity to restore the previous state of the operating system on certain moment time.

Using a computer restore to a previous state will allow you to roll back the system to a stable, operational state, without Windows reinstallation. Unfortunately, system recovery is not always successful.

In Windows 10, it will help to return your computer to its original state.

Using antivirus programs

Viruses (in this article this word refers to all malicious software) can penetrate a computer from the Internet, from removable media, from optical discs, etc. To combat this, you should install an antivirus program on your computer.

An antivirus installed on a computer constantly protects the computer. Other antivirus software, such as antivirus scanners, perform a one-time scan and disinfection of the computer, but do not provide real-time protection.

There is a wide variety of antivirus solutions, both paid and free. You will have to decide for yourself which solution to use.

To make your choice easier, read the article dedicated to the best free antiviruses. Windows 10 has a built-in antivirus - Windows Defender.

Paid antiviruses have some advantages over free ones, since they have built-in additional security modules and other components.

There is no 100% protection against viral infection, because first the virus is developed, and only then means appear to neutralize it. In any case, it is better to be mostly protected than to remain unprotected.

Getting malware onto your computer is very simple: you just need to follow a link to an infected website, open an attachment received by email, etc.

It should be remembered that any antivirus slows down your computer, but to ensure greater security, you should put up with it. Antivirus manufacturers are improving their products and now antiviruses do not load the system as much as before.

After installing the antivirus on your computer, run full check systems. In addition to the fact that the antivirus protects the computer in real time, it is necessary, at least once a month, to conduct a full scan of the computer and all disks (if you have, for example, external hard disks).

This is necessary for additional protection of your data. During such a scan, the antivirus may detect new virus threats. Some viruses are well camouflaged and begin to show their activity after a significant period of time.

Update your anti-virus databases regularly; usually the anti-virus does this automatically.

You cannot install two antiviruses on your computer at the same time. different manufacturers, they will conflict with each other. Antivirus and firewall may be from different manufacturers because they perform different tasks.

Make sure that the firewall (firewall) is enabled in the system settings. A firewall protects your computer from network attacks and controls the access of programs to the Internet.

In the operating room Windows system There is a standard firewall. True, it is inferior to specialized firewalls, but such protection is better than no protection at all.

The best solution for home use would be to install it on your computer. antivirus solution Internet Security class. This solution includes an antivirus, firewall and other additional security modules from a single manufacturer. Mostly, similar programs paid.

For an additional one-time check or treatment of the system, use special free anti-virus scanners, for example, or other similar programs. Scanners check and treat the system, but for everyday use won't fit.

If it is impossible to deal with viruses, use a special boot disk With antivirus program. Rescue disks are created by many antivirus manufacturers and such an image can be downloaded from the manufacturer’s website completely free of charge, for example, or other solutions.

In addition to the official ones, there are homemade images. These images include a large number of programs. An image, for example, Windows PE with programs, burn to disk (create bootable USB flash drive). At the right time, boot from the disk to scan and disinfect your computer.

It is possible to check files on your computer or links to sites on the Internet through online services. For example, the service conducts online check using more than 60 antivirus scanners.

It should be remembered that there are many fake antiviruses on the Internet. There are pop-up ads on the Internet that say that your computer is infected.

Fake antiviruses find many viruses on your computer and offer to download a program to treat your computer. After downloading, such a program itself will become a source of viruses.

To treat blocking viruses, antivirus companies have created special online services where you can get a code to unlock your computer for free. To solve this problem, specialized applications have been created.

Disabling autorun from disks

For security reasons, you should disable autorun from hard drive, from network drives, from removable media (flash drives, removable hard drives etc.) from a CD/DVD drive. You can read how to do this on my website in the “Security” section.

Using restricted accounts

Using restricted user accounts increases security when using your computer.

If a virus has entered the computer, then it cannot harm the system partition or the operating system registry, because it does not have access to these sections due to the fact that this account has limited administrative rights.

This reduces the damage that viruses cause when they penetrate the operating system.

Using UAC

UAC (User Account Control) is used to provide control over the launch of programs unfamiliar to the operating system. User Account Control - UAC, displays a warning asking whether to launch the program. The user independently decides to launch the application.

Before starting the program, there is time to think whether it is worth doing or not. Sometimes, this helps prevent malware from running.

How to stay safe on the Internet

When using the Internet, you must use common sense. Please remember that internet security is always at risk.

Don't go to suspicious sites. A site hung with bright advertising, obsessively imposing some offer on you, should arouse your suspicions. Don't rush to click on the links, look around.

Avoid sites that persistently offer something for free, but ask you to send an SMS message. At best, you will lose a certain amount of money debited from your mobile phone account.

There are a huge number of different scams and scams on the Internet, so you should be careful.

If you want to increase the security of your online travel, then read the recommendations below, the implementation of which will help you avoid many problems associated with business or simply surfing the Internet.

The main recommendations here are aimed at developing the ability to use passwords. If you are a more or less advanced user of a computer and the Internet (so, at an intermediate level), then you probably have approximately the following list of passwords.

List of typical passwords for any user

To your mailboxes(usually to two or three mailboxes);
-- To social network accounts(usually two, three...);
-- To Internet messenger accounts(aka Internet pagers), such as ICQ (popularly ICQ), QIP, Miranda, M-Agent, Skype, Yahoo and others (usually everyone has at least a “login/number” account in two or three of them ;
-- To the forums where you communicate(usually a person registers in 2-10 forums), and this is also a login and password for each forum;
-- To mailing services(usually two or three, where you are subscribed to mailing lists and where you can change settings - refuse or subscribe to mailing lists)
-- To affiliate program accounts(from one to dozens or even more) in which you participate as a partner (username/password is also used).
-- To your account in the electronic payment system(as well as passwords to the key file, to the wallet program itself, or to the operation of confirming the withdrawal of funds from the account, as well as the “secret key” itself to the settings of your wallets - if you decide to configure them yourself, for example, for premium payments on your website). Typically, a user registers in two or more payment systems. And rightly so, because it gives more opportunities!
It turns out, on average, about 10-20 logins, and passwords, as a rule, are a third more! But I haven’t listed everything. It is passwords that turn out to be the most vulnerable point in any security system - no one wants to remember 15 complex passwords, so they use their last name, change the keyboard layout (they write in Russian, but on the English layout or vice versa), use the names of children and loved ones as passwords, your mobile phone numbers, pet names, etc. - all of these are completely naive and unreliable passwords, especially if they are repeated!

So, here they are very simple and very important recommendations, the importance of which for you will increase in proportion to your income:

attention!
take it as seriously as possible
to the recommendations below!

1. The password exists only for you!

Never, under no circumstances Neither I nor any serious service (or service) will ask you to give any password, for example, a password to access your page affiliate program(to your personal account), to your mailbox, your bank card etc.! Consider any requests or demands of this kind as the actions of intruders or, at best, “jokers.” Keep in mind that even if the demand came in a letter from supposedly my address or the address of your bank, do not believe it! The fact is that now it is quite easy to change the name and address of the sender of a letter.

The same applies to any email service (mail.ru, new mail, yandex.ru, etc.) - never, none of them, under any circumstances, will ask you to hand over your password (including for supposedly solving problems with your mailbox).

Absolutely the same applies to electronic payment systems and any banks(no matter where they are located): no bank, no payment system will ever send you a letter asking you to send a password, confirm your plastic card number or its PIN code online!!! There is a whole system of phishing (forgery) and other methods of Internet fraud, the purpose of which is to gain access to your passwords from your accounts, credit cards, payment system accounts, etc. For example, you may receive a letter from a “supposedly bank” and following the link in this letter you will find yourself on the website of “supposedly this bank” (which will look exactly the same as the real one), where you will be asked to enter your passwords... That’s all. .. The only thing that can save you is the knowledge that no bank will ever ask you for this. If you have any doubts about something, call your bank’s support service (at the number you have written down in advance) and ask - they will tell you everything and give you advice. Don't be shy, they work for the people! Now, with the development of Internet banking, this is especially important. In addition, pay attention to the address in the address bar of the browser through which you open sites.

Moreover, more and more often, any references to anything are excluded from real letters from payment systems or banks.(which is usually specially emphasized in such letters - for security purposes). If you receive a letter from a “supposedly bank” or “supposedly a payment system” and they ask you to follow a link, do not do this (this way you can open the way to a special spyware program or virus). Perhaps the only exception is the moment of registration/activation in the payment system, when you really need to follow the link in the letter received in your mailbox to activate the registration. But in this case (!) - you know in advance that such a letter will come to you and you know why it came to you (as a rule, it arrives instantly at the time of registration). Treat any unexpected mail very carefully! You cannot click on links in SPAM email!!! No way!!! If you are interested in something and you decide to follow the link, then it is better to type this link in the address bar of your browser manually (or copy it first to Notepad, and from there to the clipboard and address bar browser, but do not click on it with the mouse (this will protect you from hidden link substitution). Be careful!

2. Store your passwords in a paper notepad or in a special, secure program!

Never (!) do not store passwords in your electronic mailbox(including in the form of a picture) . All passwords, secret keys, answers to security questions, etc. It is safest to store it in a specially designated for this purpose simple paper notepad (exclude access to this notepad for everyone except you). Designate a separate spread of your notebook for each account - indicate your login and password there, and everything you need to regain control of your account, even from scratch. When you change your password to a new one, simply cross out one and enter another.

Do this:

Go to your email inbox and delete all emails containing passwords!First, of course, write down all the necessary passwords in your paper notebook.
-- Search your local computer(at home, at work, ...) and delete all records of passwords and logins for anything.

Special tip:Buy yourself a separate notebook that you will use only for these purposes. And this notebook should easily unfold and remain open! If it is inconvenient, you simply will not use it. Good option- a paper notepad on a wire spiral. Why? Because you will often have to look into it and holding it in your hand will be inconvenient (especially if you use the ten-finger typing method) - your hands should be free. A notebook with stitched pages looks beautiful, but does not stay open. On the contrary, a notebook with a spring folds out easily and you will feel comfortable working with it.

If you use a special program to store passwords, then duplicate the password database to a special flash drive or external storage (which are stored separately from your computer) so that if your hard drive breaks or your computer is lost, you do not lose all your passwords, which will then be a very labor-intensive task to recover. At the same time, remember that “there is always strength”, this means that there is always a certain risk if you store passwords on a computer and not in a paper notepad. You can store passwords for forums and social networks in your browser, but I do not recommend storing your password in your browser. email and online banks.

3. Make all passwords complex!

All passwords, code words, secret keys, etc. always make COMPLEX to your email mailboxes, payment system programs and any other account, i.e. consisting of at least 11 characters, necessarily including numbers and letters of different registers (the ideal option is a random set of letters, numbers and symbols, for example: e & 2m @ k1E #39DJ8we).

4. Change your passwords regularly!

Don't worry about forgetting your password - you will definitely forget it(unless you decide to specifically train your memory in this way), because the password will not only be unmemorable, the main thing is that you will change your passwords every time there will be a suspicion that the passwords could be spied on or stolen, for example, by spyware detected by the antivirus of your computer. If there were no such suspicions (for example, the antivirus did not respond to a single threat during all this time), change the main passwords anyway at least every year.
Change passwords only after updating the antivirus installed on your computer and after it has scanned the entire computer
(this will reduce the risk of your password being leaked due to active malware).
In addition, the number of passwords you use will increase along with the number of forums and other services in which you register to participate. Therefore, forget about making the password “beautiful”, “convenient”, “memorable”, etc. - beautiful and convenient Your password can only be used by an attacker.

Special tip: If you use manual password entry, you can make your life easier by using a small password fragment, say 5-7 characters, the same for all passwords, in all main (i.e. frequently used, not all in a row) passwords. Such a code fragment is a certain sequence of symbols that means something only to you and no one else. This sequence of symbols must be remembered and never (!) written down anywhere! Further, when writing down any password in a paper notepad, designate this universal sequence of characters with any one icon (for example, an asterisk - " * "). For you it will be clear what the “asterisk” means, but for others it will not. Thus, even if someone gains access to your notepad, he will not be able to use the main passwords). Naturally, if you yourself forget what it means " asterisk", then you will lose access to your accounts (mailbox, your " personal account" in the affiliate program, etc.), so as a secret sequence of characters, choose something that only you know, but that you will never forget. In addition, where possible, be sure to set up a password recovery function for your mobile number phone.

Special tip:This sequence of characters (your secret code word), which you denote by the asterisk symbol, should not be simple and easy to select. The ideal option is something very cleverly coded, but clearly understandable and memorable for you. Example: "pr01EsK".

5. Use mnemonics to remember your most frequently used passwords!

How to remember a complex password that you use often? (For example, for your mailbox and your messenger)

Special tip: Most often, you probably use a password for your mailbox and a password for chat communication using a messenger (ICQ, M-Agent, etc.). It is precisely because of the frequent access to your mailbox that you want to make the password for it simpler or store the password in your browser or email client.
Under no circumstances should you simplify the password for your mailbox!
The fact is that in most services (including affiliate programs, Webmoney electronic payment systems, RBK Money, Z-PAYMENT, etc.), if you have forgotten your password, the support service will send it to your email. Consequently, an attacker can get hold of almost all of your passwords by knowing just one - from your email inbox. Naturally, if you do not want to lose control over your messenger, then make the password complex for it too. The passwords for your ICQ and your mailbox should not match!!! Passwords should never be the same.

However, regarding passwords that you use frequently: You you can use mnemonics and thus, you will easily remember the most complex password for your mailbox or messenger (but still write down your password in notebook to completely prevent its loss). How to remember?

For example, your password might look like this:
*moy1GODvRAYU
* is your secret code word or a sequence of symbols known only to you and not written down anywhere (you can’t forget it), and then you can read it like this: “my first year in paradise” (naturally, you must also remember where which register is for letters you use). From experience I can say that the register is easy to remember, you don’t even have to doubt it.

Another example:
ost125KGdoKMS*
We read: there are 125 kilograms left until the candidate for master of sports and then a secret sequence of symbols instead of an “asterisk”. This example is good for athletes. Let's say in the sum of three competitive movements (bench press, deadlift and squat) you need to perform 505 kg for a weight category of 75 kg, and as soon as the athlete has moved further, he changes the password to his box. Agree, in this situation it is not only easy to remember a complex password, but also pleasant to change it! ;-)

But such a password is not only easy to remember, but also impossible to guess! Consequently, the use of mnemonics allows you to make a password not only complex and, at the same time, memorable, but also unpredictable, which is very important for controlling your mailbox. For all others (programs, forums, etc.) - feel free to type random characters. If you decide for each program, forum, etc. come up with passwords using mnemonics, you will soon begin to avoid the procedure of changing the password itself, because you will spend too much time on it. Therefore, do not deceive yourself - use mnemonics to remember only the most frequently used passwords, and simply write down the rest randomly in a notepad - “as you wrote it yourself,” or using a program with a “password generator” function, of which there are many.

6. Enter the password from your address book!

When changing the password, first write it down in your notebook and only then (i.e. from the notebook!) enter it into the input field.This rule eliminates possible errors when entering a password into a notebook. The easiest way is to come up with a strong password by randomly hitting the keys in any text editor, then supplement what you get with letters of different cases and numbers. You can immediately write a random set of characters into a notepad- it's getting very in a convenient way, but only after you are able to give up the desire to make all passwords meaningful. However, first of all, write down the password you come up with in your paper notepad, and only then(while looking in a notepad, and in no case copying from the screen) type it in the required input field. This way you will avoid possible errors with entering a password, and even more so, you will insure yourself against immediately forgetting the entered password (which, oddly enough, happens to people very often).

7. When working from someone else's or public computer, delete the history!

What if you were forced to log into your account from someone else’s computer?, then before entering your username and password, disable the function of saving personal information in the browser you are using (otherwise, anyone from this computer will be able to log into your account - for example, to your email inbox). After working on someone else's computer, delete the history for the period of time you used it. However, you should remember that “someone else’s computer” (especially in an Internet cafe) is always a high risk. You may not be aware of programs installed on other people's computers - spyware, keyboard monitors (which are often installed for network administration purposes), etc. If you still had to use “someone else’s computer” to enter one of your main passwords (from email, from online banking, etc.), then at the first opportunity (!) change the passwords that you used on someone else's computer!

If you are entering a password from someone else's computer, then put a checkmark in the "Someone else's computer" field, and if there is none, then before entering your password, go to your browser settings and disable the "saving passwords" function.. This can be done in a few seconds if you know where it is. And if you don’t know, then find out in advance, find and remember. Remember: knowledge is power!

8. Use an updated antivirus + firewall!

Use a comprehensive, constantly updated software protection from malware(viruses, Trojans and spyware etc.). If you DO NOT use protection, then all the above recommendations are almost meaningless. Go to the settings of your security programs and set the parameters to ensure high security(usually everything is clearly written there, and if you don’t understand something, look for visual videos on YouTube or write to the user support service and they will explain everything to you). It is comprehensive protection, at least “antivirus + firewall” or antivirus with a firewall function, that can keep data relatively safe.

9. SPAM is dangerous!

DO NOT open attachments to letters from recipients unknown to you, and DO NOT click on links or pictures in received spam.Although, there are viruses that act on behalf of recipients recorded as known to you, so in any case, configure your antivirus to scan all files downloaded from the Internet. Opening files received by email (Word - .doc, Excel - .xls, etc.) do not allow macros(after all, your friends may not even realize that they are sending you a virus along with a letter). Ask those who write to you to indicate clear email subjects- this measure protects against accidental deletion of a normal letter along with spam. In addition, avoid “hot places” - for example, all kinds of “erotic-crack sites” - this is a favorite habitat for viruses of all stripes.

10. Set your browser to safe mode!

First, use the "update browser version" function(developers are constantly improving the functionality and security of their product, do not neglect this).
And secondly, set your browser to the most secure mode for surfing the Internet. Read articles on the Internet about how to increase the security of using your favorite browser. It won't take much time, but on the contrary, it can help save a lot of time and nerves.

With strict security settings, problems may sometimes arise when downloading files from sites you visit or when displaying all sorts of “bells and whistles” in them. In such cases, either add the site you need to the list of trusted ones (for the browser Internet Explorer this is adding the site to the "trusted sites" zone - menu Settings/Internet Options/Security), or use manually switching settings for this page, or (but only as a last resort!) temporarily Lower the overall security level in your browser's Internet Options. I remind you that you must have configured different security parameters for both the “trusted nodes” zone and the “Internet” zone in general. If you are engaged in e-commerce, then I recommend setting the most stringent security settings for the general “Internet” zone (disable all sorts of them in “Internet Options” / “Security Settings” Java Script, ActiveX, etc.).

In general, I recommend using a browser Mozilla Firefox . It's free, easy to download and install, and working with it is infinitely more pleasant than with a regular one. Internet Explorer`om. If necessary, install the necessary extensions (plugins), for example, a plugin for removing ads or a site reputation plugin, to do this, take advantage of the offer to go for extensions (plugins) using the link that the browser will offer you when updating.

If you cannot open the page you need on a reliable site you know, then it may be that your firewall or antivirus is doing something weird (but the browser has nothing to do with it) - then for these security programs, indicate that this site can be trusted. Look through the settings of these programs and you will see everything.

Always follow the security recommendations offered by the resource you use.(for example, a website, mail system, payment service or mailing server) or program(For example, Keeper Classic, necessary for working with Webmoney). Take your time and do everything as recommended. If you can use additional security settings that a web resource offers, then use them! For example, go to your mailbox settings and enable restricting access by IP address. Next, create a complex response to Security Question, which is used to recover your mailbox password (and be sure to write down this unique answer in your paper notepad). For example, you can select the question “what is the name of your dog” (although you may not have any dog) and write down “JimmK007*” as the name (this answer can be read as follows: Jim Carrey is agent 007, and “asterisk” is this is your code word). And so on, use all possible security settings.

Mnemonic technology helps not only to remember, but also subsequently to easily enter the password from a notepad into the required input field. At the same time, be sure to keep in your paper notepad an indication of the type of question used (for example, “what is your dog’s name”) and the answer to the security question itself! Otherwise, it may happen that you wrote down the answer, but forgot which question... Remember that your mailbox is the key to many of your passwords! Following the security recommendations of a particular web resource will not be difficult for even the most inexperienced user (nowadays everything is done for people), and if difficulties arise, the support service of the corresponding resource will always answer and help you.
Remember the truth: knowledge is power!

Dial in search bar a request to search for security holes in the email services you use, payment systems and other accounts that are important to you!For example, a request may sound like “security holes in mail.ru” or “how to protect a mailbox on mail.ru”, etc.
You will find a lot the most useful tips- use them, however ignore any methods that require you to enter your personal data(otherwise you’ll send your passwords straight to the hacker, who, under the guise of helping, does exactly the opposite). Spend your time on this, otherwise you will lose much more in the future. In a good situation, for example, if you noticed a leak of funds in time and contacted the support service and blocked your accounts, then you might save the money, but what if not? Then who will return the time spent on earning them?
No one will return the time of your life to you! Therefore, find out in advance how to quickly block (by phone or via the Internet) the accounts you use.

Special tip:Try to create your email accounts only on those email services that support secure ( SSL) connection.

Special tip:Do not store large amounts of money in your electronic accounts. As soon as the amount has become significant for you, withdraw funds from the electronic account by transfer to a bank account or into your own hands. By and large, this is the only measure that reliably allows you to protect your money.

13. Back up the files you need onto removable media!

This applies to everyone. I have twice experienced what “hard drive death” means and I wouldn’t wish it on my enemy. The first time this happened was when I was writing my Ph.D. thesis... This is generally a separate topic: on the computers of many dissertants, hard drives break down (after my bitter experience, I began to remember such stories about others), and in general, it was noticed that what The more technologically advanced and advanced the technology, the more sensitive it is to the human condition - after all, everything that exists ultimately consists of energy... I am sure that with the massive transition of humanity to computers developed and operating using nanotechnology and ultra-low energies, a real problem of interaction will arise computer with the mental state of the user. This will create considerable difficulties and endless new opportunities...

But let's return to the realities of the present day. If you do not copy important files (for example, a copy of your website, customized scripts, etc.) to a removable hard drive or large flash drive, then you are risking a lot. As soon as you have made a lot of changes to files that are important to you, copy them to a removable hard drive, flash drive, floppy disks, etc.

Special tip:get yourself a separate portable hard drive - for the Archive (for important files, for example, key files, licenses, important documents). Keep it only at home and nowhere else. Never take it anywhere. Never plug it into someone else's computer! It doesn’t matter how much you trust the owner of this computer - he may not even know what’s going on on his machine! Are there many of your friends who know everything about their computer? That's it... Copy everything to this removable disk significant files. And on this disk, store the key file from your electronic wallet management program (for example, the Keeper Classic program). Separately, I emphasize once again: store the key file only on removable media(this file will only be useful to you when reinstalling Keeper or the operating system). If you still don’t have one, then archive the key file (after changing its name and extension (Keeper allows this) into a password-protected archive. Make the password as complex as the system allows, and simply delete the original (unarchived) key file (and from the basket too). Write down the password itself in your paper notepad; part of the password should be a secret sequence of characters that you remember, and write down only with the asterisk symbol.

14. Free programs can be dangerous!

Be careful and do not download or install again. free programs from sites that have no reason to trust.Along with such a program (or under its guise), you can install a virus or spyware. If you are an avid experimenter, then it is better to get yourself a separate computer (or a separate virtual operating system, or at least a separate account) for experiments and install whatever your heart desires there. Naturally, then it should not store confidential data, installed programs for working with electronic payment systems, and the like.

15. Turn off the "keyboard monitor"!

I also recommend NOT using programs to record all keys pressed.(“keyboard scanners” or “keyboard monitors” - your passwords will also be stored in their memory, since these programs record all actions with the keyboard - every key pressed). All your passwords should be stored only in your address book (and, possibly, additionally in special program for storing passwords), and preferably with a “code fragment” (remember about the “asterisk”? - see paragraph 3 above - Special advice).

16. Don't be a fool!

Do not get involved in the games “magic wallets”, “reading letters - highly paid remote work on the Internet”, “send us 100 bucks and you will receive 1000”, etc. Don't be fooled by this!
If some supposed "employer"
asks you to pre-deposit a certain amount of money (it doesn’t matter under what pretext and why - to open an account for you, make a pre-payment, register you in something, etc.), i.e. in fact asks you for money BEFORE you receive your earnings, then these are scammers , this is guaranteed to be a scam pure form or in the form of a financial pyramid (in the second case, you yourself can become an unwitting deceiver). Never buy into this. Well, if you buy it, it’s your own fault, as they say. Then learn from your mistakes. A good rule of thumb is: if you lose money on something, think of it as a paid lesson. Draw all the necessary conclusions so that the lesson will benefit you.

Remember these two simplest and truest principles that help you see deception and fraud:

1. Know firmly: If you haven’t earned anything yet, and some “employer” is already asking you for money, then this is definitely a scam!

2. Know firmly: If you are offered to “earn” decent money, but there is no real product or service (that people really need and would sell), then this is a scam.

The difference between normal civilized network marketing (or MLM) and financial pyramidsThis is exactly what it is - in network marketing (in MLM companies, for example, in the Oriflame company) there is a product or service that is sold that people need, but in the financial pyramid there is no product, or there is only its appearance, but in reality money is simply transferred from the pockets of some people to the pockets of others. So don't "throw the baby out with the bathwater" ;-) ! Those. Do not confuse real network marketing with financial pyramids and other scams.

I wish you an interesting and useful surfing on the Internet!

Best regards, Vadim Levkin

Share