Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.
• To use the Internet safely, you must have a good antivirus program. At the same time, it is necessary that the installed antivirus can work in monitoring mode – this will allow you to identify a danger immediately when it occurs.
• Use extreme caution when visiting unknown resources on the Internet. Currently, viruses and malicious programs have spread, for infection with which it is enough just to visit a specific web page.
• If you are connected to the Internet through a telephone line, the modem speaker must be turned on. This will allow you to timely detect attempts by network attackers to connect this computer to a particular resource by dialing a given phone number (often it is practiced by distributors of pornographic sites and services of a similar nature). If during the process you hear that the modem began to randomly dial a number without user intervention, you must immediately disconnect from the Network by disconnecting the network cable. After that, you need to check the computer with a special program of the Antispyware category – most likely, a spy module for automatic dialing is implemented in the computer.
• After downloading files, archives, etc. from the Internet you must immediately check them with an antivirus program, and only after that run them for execution, unpack them, etc. Many viruses and malware can be an executable file or archive.
• Mail letters received from unknown and doubtful senders must be checked with a good anti-virus program (with updated anti-virus databases) before opening. If this is not done, then you can quickly turn your computer into a breeding ground for viruses.
• Never reply to letters containing a request to send confidential data (username, password, etc.) to the specified address. With the help of such a simple trick, attackers seize other people’s logins and passwords.
• It is also strongly discouraged to reply to emails that are spam – otherwise the spammer will know that your mailbox is functioning (and this is important information for any spammer). As a result, the amount of spam received will increase many times.
• If you need to leave some information about yourself when visiting various resources on the Internet (forums, portals, sites, etc.), then such information should be minimal (for example, it is completely optional to provide your passport data, home address, various passwords, etc. .P.). Despite the fact that many Internet resources guarantee complete confidentiality, you should not be naive – if someone needs to get this information, he will receive it. Moreover, the options for information leakage can be very different. Who can get confidential information?
♦ Hacker. It simply hacks into the system of protecting the site or portal (or does something similar).
♦ Blackmailer. If someone makes various frivolous acquaintances on the Internet, indicating at the same time as a means of communication a phone number or the address of the main mailbox, then according to these data it is easy to collect dirt on a person. This is achieved due to the wide capabilities of modern powerful search engines.
♦ A person (or group of persons) collecting individual information about people (for example, the same passport data). In this case, the portal employee who has access to this data will be interested (most often – bribed). As a result, after some time, a careless user learns (as a rule, from law enforcement agencies) that, for example, an offshore (or some other) company is opened on his passport data, through which a dozen or two million dollars are laundered every day. It is easy to guess that the responsibility for all this will rest precisely with the user who frivolously entrusted his personal data to the administration of the Internet resource.
♦ Representative of well-known power structures. He will simply contact the administration of the site (portal) and politely ask to provide him with all the information about users who have registered on the site (and, of course, will receive it as soon as possible).
• When you are finished browsing the Internet, always disconnect the network cable from the telephone line or from the local network.
In general, one of the main rules of work on the Internet is constant vigilance. Remember: what you see on the monitor screen is just the tip of the iceberg, and a huge number of ongoing processes are hidden from your eyes, many of which are openly destructive.