官方APP下载:英语全能特训(微信小程序版,支持苹果手机、安卓手机)
创办于2003年
UNSV记不住?那就记中文谐音“忧安思危”吧!
  Slow and Steady Wins the Race!
UNSV英语学习频道 - Slow and steady wins the race!
公众微信服务号
英语全能特训(微信公众服务号)
UNSV英语学习频道淘宝网店
客服短信:18913948480
客服邮箱:web@unsv.com
初级VIP会员
全站英语学习资料下载。
¥98元/12个月

Nine Ways to Protect Yourself from Hackers Online

阅读次数:


VIP会员专享下载:(非VIP会员无权下载!如果想下载,但还不是VIP会员,请点此订购
下载方式:使用鼠标右键(注意是鼠标右键!)点击下面的MP3音频/MP4视频链接,然后选择“另存为…”。
MP3节目录音 MP3节目录音  PDF节目文稿 PDF节目文稿  MP3同步字幕 MP3同步字幕 
文章正文
同步字幕
A computer hacker stealing information from a computer system.
A computer hacker stealing information from a computer system.

An increase in cyber-attacks and identity theft make the Internet seem like a scary place these days.

The hacking of Sony Pictures led the news for some time. The U.S. State Department public email system was shut down. Even the White House was a target of cyber-attack.

Last week, there were reports of a billion dollar theft from European banks and secret viruses on millions of computer systems across Russia, China, India, Iran and elsewhere. This raises a question:

How can individuals protect or make it more difficult for hackers to access their information?

Here are nine tips that can help you protect against cyber-attacks:

1. Make your password harder to hack

Hard passwords include upper and lower case letters, numbers and special characters. They should be at least eight characters in length. They should also not spell out words easy for hackers to find, like your pet's name or the name of a family member.

2. Change your password regularly

A very common mistake made by users is to create one hard password, but then never change it. Remembering a long list of complicated passwords can be difficult. But no password is unbreakable. Hackers are better able hack multiple accounts if those accounts all have the same password. A password management service, like Dashlane or PasswordBox, can help you keep track of hard passwords. These services permit users to easily store and secure their passwords.

3. Clear your browser history

This goes for all the devices you use in a day – your home computer, your work computer, or your friend's iPad. Internet browsers like Firefox or Chrome keep track of where you've been and what you've done online. They keep records of every site you visited. Information about what you sent from or saved on your computer can be kept for days or weeks. It is very easy for anyone who sees that information to steal a detailed record of your online activities.

4. Do not use free Wi-Fi

An increasing number of public places now offer free wireless access to the Internet. Often, a user does not need a password to connect to these wireless networks. These services might be useful, but they're also an easy way for hackers to access everything on your device. Unless you really need it, it is best not to use it.

5. Use HTTPS

HTTPS is officially known as "hyper-text transfer protocol secure." It is similar to HTTP, which is used to enter Internet addresses. HTTPS adds an extra layer of security and encryption while online. Communications between users and sites that support HTTPS are encrypted. The information is also authenticated. That means that HTTPS can determine whether or not a website is real.

6. Watch what you click

One of the most popular and successful ways hackers infect your computer is through a technique called phishing. Phishing occurs when someone opens an email attachment that looks real. But the attachment is actually a virus that immediately infects the user's computer. If someone sends you a file or a website you did not ask for, it is best to not click on it.

7. Try not to use public computers

For many people, not using a public computer can be difficult. Those without a computer or Internet access at home often use Internet cafes to get online. However, the more different people use a computer, the more likely a virus has infected it.

8. Use anti-virus protection

There are many anti-virus services available for users. They can offer many different types of computer protection. Some anti-virus services are even free. They are a great way to have a professional help keep users one step ahead of hackers.

9. Be careful while using thumb drive

Thumb drives, also known as flash drives, are small and easy storage devices to use across different computers. They are a popular device that people use to exchange files and documents. They can also spread viruses easily across computers and networks.

I'm Jonathan Evans.

Doug Bernard reported this story for Learning English. Jonathan Evans wrote it for Learning English. Hai Do was the editor.

----------------

Words in This Story

authenticate – v. to prove that something is real, true, or genuine; to prove that something is authentic

cyber-attack – n. an attack on computer information systems by hackers

encryption – n. information changed from one form to another to hide its meaning

hacker – n. a person who secretly gets access to a computer system in order to get information, cause damage, etc.; a person who hacks into a computer system

phishing – n. a method by which an e-mail user is tricked into revealing personal or secret information

What are other methods you have to protect your personal information online? Write to us in the comments section.

网友的学习评论(0条):
版权所有©2003-2019 南京通享科技有限公司,保留所有权利。未经书面许可,严禁转载本站内容,违者追究法律责任。 互联网经营ICP证:苏B2-20120186
网站备案:苏ICP备05000269号-1中国工业和信息化部网站备案查询
广播台