Every day thousands of data is stolen by hackers. Well, what do they want to do with it? Many people probably think this and do not extend the horizon of their view. Hackers do not usually keep the data, but sell it to corporations. Ever heard of spam mails? Many of you have probably already received an e-mail like this and were thinking about, Where the hell do they have my e-mail addresses from? Well, now you know.
In order to be secure on the internet, you do not have to be a technology freak. There are already a few small things that you have to consider and then it is a little safer.
Now to the First Topic: The Password
First, the most important. Do not betray your password. You never know what others might do with your profile. To make it not that easy for strangers, follow these rules when choosing your password:
- Mix uppercase and lowercase letters.
- Use at least one digit in your password.
- If special characters or empty keys are supported by the service, use this option as well.
- Do not use any names or birthday combinations as a password.
- Your pet is also a name. Don’t use your pets name.
- Avoid having your username or e-mail address in the password.
The Second Topic: Cookies
Cookies are basically used to gather information about the users. Cookies are usually text files that store data such as visited websites or other information about the user. They analyze and document the web behavior of the user. Have you, for example, been informed about a new monitor in an online shop and then you have seen an advertisement for monitors on a completely different side? This is due to the cookies.
It is therefore recommended to delete cookies regularly in the web browser.
The Third Topic: The Firewall
Each PC has a firewall. However, this only fulfills its purpose when it is also active. The firewall checks the data transfer between the PC and the Internet and complains immediately if something is wrong.
My tip: Surf only with an activated firewall.
The Fourth Topic: Email Attachments
If you get an email from an unknown contact and it contains a link or attachment, do not click on it because you do not know what is behind this link or attachment.
You should delete this mail immediately.
The Fifth Topic: Personal Data
Do not post too much of your private life on the Internet. While it is tempting as many people define themselves about likes and comments, but always remember: The Internet is accessible to everyone and what is once on the Internet, remains forever on the Internet.