Virtual fraud is increasingly spreading. What’s the best way to lock files and to save our passwords to hackers for security on the Internet?
How to Password / Protect Password
Department of the warning letter; hackers have been able to reach everywhere from the database used by the gigantic companies to the personal computers, and it has been requested that individuals and organizations make special efforts in this regard. “These little hackers can be an important building block to reach the target in the hands of the hacker,” he said in a statement that these virtual hackers have been patiently working and carefully stepping through each step. So much so that the hacker can make a road map that can reach the network information of huge companies at the end of small analysis. It then tries to reach as much detail as possible about the target system with this information. The hacker knows what kind of network, FTP or mail server the target uses,
The last move is the password … The hacker’s ultimate goal is to reach the ciphertext. “Many services respond to these randomly arriving chats in general, and these answers are extremely useful in finding hackers looking for. The hacker puts this information into the sensitivity database. Having enough information about the target, the hacker is now able to reach the username of anyone working on that system. It comes to this: Hacker has a single need. It is also the passwords of the users. “As you can see from the warning letter, the hacker is not one to be taken care of. In that case, the measures to be taken, hackers can be protected from attack.
Pro Tip: For windows user, lots of applications are available to password protect or lock files on windows 7/8/10. They are real handy and helpful in cutting down the hassle.
In the article “One of the most important issues in internet banking, credit card and bank card transactions is the password selection” after the following warnings are made: “The most basic problem of password selection, such as internet use, internet banking, credit card and debit cards, in the process of being asked for a password, whereas the users should see the password as an access disability for themselves. This results in users choosing a password that they can remember easily. The password, which is easy for the user, makes it easier for malicious people to guess and reveals a security vulnerability.
How the password is chosen also gives clues about the password holder. While people often use their nickname and nicknames as their passwords, a significant part of them use their favorite star, the name of the team they hold, or one of the guys around the nickname or password. Such mistakes made because of human characteristics are useful for hackers and they can easily break passwords. ”
Things to watch out for shopping on the Internet Internet banking transactions should not be done from common areas that are not sure of security or computers belonging to foreign people. In public internet access, banking should be done after confirming that spyware is not installed in previous usage.
One way to tell if a shopping website is reliable in terms of data communication is that the page where the credit card information is to be entered is turned into ” https: //” at the beginning of the ” http: //” When these signs are seen, it is likely that the process is safe.
When a website for shopping or online banking is opened, a lock sign appears on the bottom right of the internet browser (such as internet explorer, netscape). Pages that are locked with a lock icon and at the same time that the key icon is not broken are pages that can make a safer purchase compared to the sites where these icons are not found.
Recommendations for safe and secure password selection
- The ‘save password’ or ‘remember me’ options should not be used when entering passwords over the Internet.
- Passwords should not be typed in any place (such as calendar, post-it note on the monitor, note books, table calendar pages, post cards on the back of the cards, etc.).
- Internet banking passwords should not be shared with relatives, including friends.
- Care must be taken that the vast majority of the ciphers used are not general and predictable easy ciphers.
- Sample passwords in books should not be used.
- Use recommended new softwares for password protection
- The passwords given by the bank must be changed as soon as they are received.
- Must not be selected as spouse, child, colleagues’ names, phone number or license number, date of birth, address and place of birth.