How to prevent intimate photos leaked on the internet?

access malicious links and open doors for raids.
Published: 13.05.2012 | Author: Net Writing Workshop | Category: Security
The Internet connects millions of people, this is nothing new. And these millions, there are many who are just looking for computers vulnerable to attack. What’s worse is that many of these attacks are not made ​​in a direct way by hackers, but are made ​​because users access malicious links and open doors for raids. Not only that, there are also many other habits are very common, that make computers are open to attacks. Check out some of the most common mistakes that most users make and also know how to avoid the risks that hinder their stay on the internet. While cases like the actress Carolina Dieckmann, who had intimate photos exposed on the Internet without your permission, to be the to gain notoriety in the media, the problem has been increasingly common with people outside the world of celebrities. Here are some tips to keep your photos and files leaked on the Internet:

“Keep me logged in” – Uncheck this option to ensure your safety

Email services and social networks have the option “Keep me signed in” so users do not need to enter their usernames and passwords each time you wish to access their accounts. This can be very useful for anyone who does not break the computer, but when this is done on public computers, the danger is great. Computers in Internet cafes and universities are used by many people for short periods. Any time a user that can arise with the realization that a service is already logged in, change data and inserts slanderous information about the victim, they will only realize the damage until much later.

Do not upgrade applications: No upgrade is dangerous!

Programs vital to the functioning of the computer can not be overlooked when making updates. Operating system and applications with communication servers online (Adobe Flash, Adobe Reader and Java, for example) can be true ports of entry for malware. Updates, however small, are very important to correct any structural flaws that leave applications vulnerable and not modify them accordingly, can damage computers.

Download movies and illegal software

Many see in piracy, an outlet for spending on computer software, games and movies. The problem is that (in addition to breaching copyright laws) many of these sources offer the same risks as the previous case. Malicious websites are designed to attract users seeking licenses and software pirates and “make the party” with doors that open. The “click to download”, users are also “clicking to infect,” “clicking to allow access by hackers,” ie, leaving the computer vulnerable.

Have a technician you trust:

Say you have photos or sensitive files … If you give a breakdown on your computer, mobile phone, notebook, etc., do not deliver this unit to anyone. Take always someone you trust. Several people have had their photos published on the web after take their equipment to maintain or even lose on the streets.

Use a program that erases definitavamente

There are some applications that promise to “permanently delete” deleted files to prevent them from being recovered. One such program is Eraser which is free.

Use an encryption program

This is one of the most important tips and very few people use. If you need to store photos or sensitive data, use an encryption application. It protects your files with a password that can not be broken easily. The EncryptOnClick or SafeHouse Explorer USB Disk Encryption can do this for you. Best of all, both programs are free. This application is essential, because if you lose your equipment or even lead to the maintenance will be very difficult that someone can crack the password. Just to give you an idea of ​​the difficulty of breaking a password that has been protected by an encryption application, I will relate a fact: When the banker Daniel Dantas was arrested in Rio de Janeiro, some hard drives seized in his apartment, but the same were encrypted.

The main item: If there is no need to store

It is important that you take care to avoid storing any file intimate or confidential. Even better is to not have these files. Well, even on your own computer, it gets in your room or in your office, password protected and only you have access … A computer can cause problems, being robbed and etc … and can end up falling into the wrong hands. The same can happen with flash drives, memory cards, cell phone, mp4, etc..

 

My name is Samual Whitemore. I’m a MSP Alumni,Computer Engineer from Punjab University. A tech and health enthusiast, I blogs everything about asthma at http://asthma-attacks.com.