PC Security Guide moonlight blog
As the popularity of notebook computers, speed up users detect the magnitude of information security, personal computer, while your computer is stolen, pillaged, creature black, alternatively because of compel majeure is another, and how to ensure their computers to lessen the loss of information, and their secret information got by others, it's value always the attention to laptop users, User sounded the alarm: Who has not momentous information? Who has not some only of their own From fret and even have some
a local information assortment and grading
array to administer personal information, premier to their classified information, personal information including: e-mail, documents (DOC,
Nike Shox OZ, XLS, PPT, PDF, TXT), file (additional types), photo files, video files and so on.
then this information in agreement with security levels, divided into three, the most privileged information as
Second,
Nike Shox TL1, the system does not account security
combine the domain, just set up a local computer custodian, and set a password, need password to log into the system, commonly accustom network service account password is also required on the local computer and network Service account password security, please refer to another blog treatise in the moonlight
present network services security using Google's services, most users absence to have two Google accounts, 1 is their most mutual Google account, for the ordinary, a secret message or file operations, and outreach using this account. The other is top secret Google account, all defined as Google privacy mode to access the secret accounts.
Third, the everyday operation
document processing tools are: e-mail - Gmail; Documents - Google Docs; IM - Gtalk (Gmail built-in); other documents - Dropbox, TC, WinRAR etc.
in the daily operation of the paper should pay care to, to make use of network services from diplomatic companies, and has a data export function, because the service is shut down to prevent data loss problem, recommend the Google service.
messages and documents on the server for much as feasible, minimize the use of e-mail consumer, multi-use Gmail and Google Docs services.
great files using Dropbox smoke arsenal services such as saving, top-secret information file can likewise use another Dropbox account synchronization, the synchronization is complete, near the Dropbox, and local files to cancel. If you need to behind up secret or top secret files locally, you need to use file encryption technology, the easiest path is to use tools such as WinRAR compression and password, the password set the password width 8-bit or more.
Fourth,
Nike Shox Menn, emergency treatment programs
When your computer is lost, or force majeure which was to get, then you should one emergency operation to prevent personal information to others as it.
First and foremost, is to instantly modify the common Google account password, the explorer can be modified here, mobile call browser by Google also can log on to password changes. As the top-secret Google account password is not cached locally, and has been visited by the Privacy mode, so relatively safe.
Second, the improved Dropbox password,
Nike Shox R4, and record off after Dropbox lost computer privileges, apt prevent others to adjust your web file.
Then, modify the password of other network petitions,
Nike Shox Nettbutikk, such as SNS, micro-blog, blog and other systems,
Billige Nike Shox, commonly to retention the password to the local, alteration the password, the user must re-login to access.
all computer information security program I use under the graph, press to discern the big picture.
processed through these actions, even now our computers were lost, others tin only obtain the regional mediocre microcomputer files, and tin not be saved ashore the waiter key mysterious documents, so that we shirk their mysterious data message access along others, thus ensuring the user's private computer message security.
comments Software
onset means to solve SSL
Microsoft's free anti-virus software Microsoft Security Essentials
About Us: Address - www.williamlong.info my Google Reader-My Twitter-Facebook-moon my blog Twitter
moonlight blog Submission-mail: williamlong.info (by) gmail.com
Subscribe to the perusing chamber