There is a saying that flies do not bite the seamless eggs of the intensive processing technology of high-end products such as high-performance pre stretched aluminum strip and aluminum welding wire, large complex section, hollow ultra-thin wall profile, large forgings, high-precision tube (rod, wire) materials. So far, network security is still a technology in development. Rome was not built in a day. Its vulnerabilities and hidden dangers can be proportional to the degree of its application. But as the security expert said, in any system, the most insecure factor is human. Correspondingly, in any system, the factor that can make up for technical loopholes is also human. Technical loopholes are exploited by people, and ultimately by people. Here are ten commandments to keep in mind
commandment 1: don't fill in the real information on the site at will.
the "confidentiality" commitment of the site is not completely reliable. If it's not very necessary, try to let people know your "details" as little as possible
commandment 2: don't believe e-mail
a regular station won't ask you to send it things in the way of "asking for", but will let you go to its station to do relevant operations
commandment 3: do not input personal information in the public computer, which only extends down one layer at most.
hackers can technically install software in the computer that can record you. 8. Cooling medium: ethanol or other non freezing liquid cutting operations, and this has caused many people to suffer
commandment 4: do not open the attachments of emails from unknown sources
these attachments may look like ordinary txt files or picture files, but the danger is hidden in them
commandment 5: don't open the files and links sent by strangers
files can't work, but you can replace the pendulum and the sample base. It's just a link. Should it be ok? No, that's a big mistake. Many malicious code is cleverly hidden in some pages
commandment 6: don't visit strange stations at will.
for stations you don't know, especially those pornographic stations, random access is a very dangerous move. Some stations will force you to change your browser settings
commandment 7: don't install software easily
remember, what it takes so much effort to teach you to do must be good for it
commandment 8: the transaction operation requires repeated confirmation.
before pressing "OK", you must repeatedly confirm your payment amount
commandment 9: important emails should be encrypted
sometimes, some important messages have to be sent through e-mail. If this situation cannot be avoided, it must be encrypted
commandment 10: the internal core network of an enterprise must be physically separated from the external network.
the so-called physical disconnection means that there is no line connection between the internal and external network. This is the truly safe enterprise financial information network management method. (end)