How to Protect Yourself When Hacking




Download 6,34 Mb.
Pdf ko'rish
bet79/203
Sana10.01.2024
Hajmi6,34 Mb.
#134102
1   ...   75   76   77   78   79   80   81   82   ...   203
Bog'liq
Linux This Book Includes 4 Manuscripts The Underground Bible

How to Protect Yourself When Hacking
From what we’ve learned so far, we see there many ways how data can be
stolen by hackers. If attackers find loopholes or any weakness, then they get
a leeway to steal sensitive information.
Here are different ways to protect yourself from being hacked:
1. Erase data saved data in your cookies. This will prevent you from cookies manipulation
because of saved passwords. This applies to your personal information in dustbins or
autofill.
2. Avoid public WIFI because they are not secured. Anyone can use internet connections
to access data on your site.
3. Have anti-virus too, premium level to help you identify any virus that happens to be on
your computer without your knowledge.
4. Keep away from free things. As seen above, free things always have a trap behind
them. Nothing is free.
5. Disable third-party permissions. This often forgotten by many people, it may seem
something small, but it’s a key thing. When some apps are downloaded on our phones,
you will find the permission icon that is always on. It may or may not notify the user of
what is happening behind but check the apps. Some apps get access to phone contacts,
chats and sensitive information upon installation.
6. Go ahead of the hacker by running test of your sites or computer to check any
weakness that is susceptible to attack. No website or device is 100% secure; the only
way to go is being smart before going to the bait.
7. Avoid going to links from untrusted people or sites. Unsecure sites are always the
places where the attacks take place. Mark them as spam once you see a redirection to


certain sites or downloads of apps.
8. While using Linux, make sure you change your hostname since they will definitely
know something is going on. This has to be done by using alternative internal network
matches.
9. Get the tor browser and proxy. Download these two and install them in your computer
and remember to change the proxy settings. The tor internet protects your data by
helping you use the internet anonymously. While using this browser, no one knows
who you are or what you are up-to on the internet.
What makes it more secure is that it encrypts your data when submitted on the internet in
multiple layers looking like onions. Once it sends the layer, they are piled in multiple relays
until the last packet leaves the relay to your desired destination. The process is called onion
routing, which is one of the best ways to secure to protect yourself.



Download 6,34 Mb.
1   ...   75   76   77   78   79   80   81   82   ...   203




Download 6,34 Mb.
Pdf ko'rish