kelin1122's blog

Because of the interactive nature of the network, once the network privacy is infringed, the cost is huge, and the consequences are far greater than those against traditional privacy. Therefore, the right to privacy becomes more important, the protection of network privacy issues become one of the biggest problems caused by the Internet, to strengthen the network environment for personal privacy protection, has become a top priority. There are some tools you can use to protect your privacy,such as wifi signal blocker.The general Internet users how to protect their privacy is not leaked, I listed here the main points:


1.The Operating System Security: 
First of all, ensure the computer operating system security.The important and urgent patches need to be installed.Since the operating system has automatic update patch function now, the system should update frequently to ensure security. If the operating system security can not be guaranteed, hackers or Trojans can easily get through the system vulnerabilities to obtain the user's various privacy information. For Windows systems, the daily login system, preferably log in with Power User or User group instead of using the Administrators group.As a result, if the computer is attacked, the harm is controllable.


2.The Security of Mobile Phones: 
From the security, the common mobile phone inside the iPhone security is not the best escape, use the iPhone need to "fingerprint unlock" feature and "find my iPhone" feature open, while ensuring Apple ID password security, using a unique  security password. And if you are afraid of someone tracking your phone,a cell phone signal jammer can help you.If the phone is lost, you should log in the iCloud site in the first time, go into  "find my iPhone"  to enable "lost mode", so others can not use any of your mobile phone (not even brush machine) .Secondly,call the operator to report the loss of SIM card In case of emergency, you can  remotely wipe the information inside the phone in iCloud site.


3. The Security of the Software: 
Avoid the use of those suspected softwares which have the risk of losing privacy as far as possible.  As for some softwares developed by small companies,you should use with caution, do not enter personal privacy information inside. The choice of commonly used software is also very important.


4, Two-step Verification: 
If you are using a two-step verification function, in theory, all sensitive accounts should try to open the two-step verification, while the mobile phone APP application  produce a one-time random password. Currently, the main software that supports 2-Step Verification is Google (Gmail), Hotmail, Dropbox, Amazon, Lastpass, Apple, Facebook, Twitter, Evernote, Github, WordPress, Linode, etc., all of which should be turned on Authentication, so that even if the hacker through other means to obtain the user's password, because there is no random phone password, so still unable to log on to the user's account.


http://jammer-buy.over-blog.com/