How to Protect Your Password

来源: 作者: 时间:2010-11-16 16:18

1.  Don't reveal passwords to others

  • Keep your passwords hidden from friends or family members (especially children) who could pass them on to other less trustworthy individuals.
  • Be careful with password recovery questions (i。e。 "What was your mother's maiden name?") Don't reveal these answers to others and don't choose questions with answers that are freely available on the Web.

 

2.  Protect any recorded passwords

  • Be careful where you store the passwords that you record or write down.
  • Don't store passwords on a file in your computer, because criminals will look there first.
  • Don't carry passwords around in your wallet or hide them under your keyboard.
  • Don't leave a record of your passwords anywhere that you would not leave information that the passwords protect.

 

3.  Never provide your password over e-mail or in response to an e-mail request

  • Any e-mail message that requests your password or requests that you to go to a Web site to verify your password is almost certainly a fraud.
  • This includes requests from trusted companies or individuals. E-mail can be intercepted in transit, and e-mail messages that request information might not be from the senders they claim.
  • Internet "phishing" scams use fraudulent e-mail messages to entice you to reveal your user names and passwords, steal your identity, and more. Learn more about phishing scams and how to deal with online fraud.

 

4.  Do not type passwords on computers that you do not control

  • Computers such as those in Internet cafes, computer labs, shared systems, kiosk systems, conferences, and airport lounges should be considered unsafe for any personal use other than anonymous Internet browsing.
  • Do not use these computers to visit chat rooms, check online e-mail, bank balances, business mail, or any other accounts that requires a user name and password.
  • Criminals can purchase keystroke logging devices for very little money and they take only a few moments to install. With these devices malicious users can gather information typed on a computer from across the Internet—your passwords and pass phrases are worth as much as the information that they protect.

 

5.  Use more than one password

  • Use different passwords for different Web sites and services.
  • If any one of the computers or online systems using a particular password is compromised, all of your other information protected by that same password should be considered compromised as well.

Source: Microsoft、com

资讯排行榜

  • 每日排行
  • 每周排行
  • 每月排行

华强资讯微信号

关注方法:
· 使用微信扫一扫二维码
· 搜索微信号:华强微电子