How to prevent hackers How to prevent cyber hacking

Updated on technology 2024-08-05
12 answers
  1. Anonymous users2024-02-15

    Because this problem has to be manual, it is really impossible to prevent it!

    In fact, some antiviruses can't be prevented.

    Our unit uses two types of software.

    One is ewido and the other is nod

    They are much better than the domestic Jinshan drug bully Ruixing.

    Better than Kaspersky in terms of virus detection and anti-virus.

    In addition, for anti-blacking, it is necessary to do a good job of upgrading the software. It's best to upgrade to the latest.

    The domestic Skynet firewall is also a good anti-virus software.

    That's what I suggest, because there are thousands of ports on a computer, and you don't know which port it's used to attack. Of course, you can find out.

    Also, don't forget to update the operating system (XP is full of holes, 2003 is a little better in this regard).

  2. Anonymous users2024-02-14

    World-class firewall: ZoneAlarm Security Suite cracked version.

    Registration code: 4wxie-qt6fr-g5fxp-sp1u55-jruku0

  3. Anonymous users2024-02-13

    Trojan Killer. Sky Software Station.

    The Tim Killer (IPARMOR) Build 2111 is safe to install, but it needs to be upgraded in time.

  4. Anonymous users2024-02-12

    Hehe,The patch has to be played.,But if it's an individual user installing a firewall.,I think it's not much use.,The main thing is to pay attention to yourself.,Don't mess up the **,Don't mess with things.。 Many viruses are the result of a deliberate attack by hackers, so learn more about the network and understand a little virus. is the main thing.

  5. Anonymous users2024-02-11

    Fill all the loopholes in the Windows system.

    Free for 3 months.

  6. Anonymous users2024-02-10

    Fill all the loopholes in the Windows system.

    Install anti-virus + firewall.

    And keep it up to date.

  7. Anonymous users2024-02-09

    Hackers can be prevented by hiding the IP address.

    Hide IP Method:

    Using a server relative to a direct connection to the Internet can protect the IP address, thus ensuring the security of the upper network. The server is actually a "relay station" set up between the computer and the server to be connected, after sending a request to the network server, the server will first intercept the request, and then transfer the request to the remote server, so as to achieve a connection to the network. Obviously, after using the server, only the IP address of the server can be detected instead of the IP address of the user's location, which achieves the purpose of hiding the IP address and effectively protects the security of the Internet.

    Hacking Methods:

    Hacking methods can be divided into two categories: non-destructive attacks and destructive attacks. Non-destructive attacks are generally designed to disrupt the operation of the system and do not steal system data, usually using denial-of-service attacks or information bombs; A destructive attack is aimed at hacking into another person's computer system, stealing confidential information from the system, and destroying the data of the target system.

  8. Anonymous users2024-02-08

    1. FTP is broken.

    BAI solution or password disclosure.

    2. **There are loopholes in the ** itself

    The upload Trojan has been tampered with by DAO and added a Trojan, which is generally encrypted**3, and the background password setting is simply cracked.

    4. The space or VPS or server password is cracked.

    Solution: It is easy to find a trojan or attack ** in the program, delete it directly, or overwrite the source program that you did not send to the server once but are repeatedly hung up, and you have to solve this problem in depth. But this is not the best solution.

    The best way is to find a professional to do security to help you solve it.

  9. Anonymous users2024-02-07

    If you want to prevent hackers, in fact, as long as you have a good firewall, you can stop many hacker attacks.

  10. Anonymous users2024-02-06

    1.Timely upgrade your virus database and fireproof walls.

    2.When surfing the Internet, open the firewall, DAO and anti-virus software for real-time monitoring and internal control.

    3.Don't browse through the pages.

  11. Anonymous users2024-02-05

    Use a good firewall.

    Turn off the service.

    Installing a powerful antivirus.

  12. Anonymous users2024-02-04

    How does a firewall on your computer stop hackers? Behind the seemingly calm network is actually turbulent waves.

Related questions
9 answers2024-08-05

What level of hacker do you belong to?

1 I don't know much about computers.,Authentic rookie.,The next program is called a bomb.,Just go to attack.,I don't know what a platform is.,Sometimes you can successfully make the other party crash.。 >>>More

7 answers2024-08-05

This is a respiratory disease, and you have to go to the hospital.

12 answers2024-08-05

Water and oxygen are what make casters susceptible to rust. Only when the oxygen in the air is dissolved in the water, the chemical reaction between the oxygen and the caster in the watery environment will produce something called oxidized caster, which is caster rust. Industrial caster rust is a brownish-red substance, it is not as hard as casters and can come off easily. >>>More

5 answers2024-08-05

Regular foot odor can do this.

7 answers2024-08-05

1. Blanch with boiling water, wash off the outer layer of wax, after washing off, be sure to soak it in concentrated salt water for a day, and the concentrated salt water is to boil the water, add salt while it is hot, and add it until it no longer dissolves. The purpose of soaking in concentrated salt water for a day is to make the surface of the wood salty, which absorbs moisture and prevents the wood from drying and cracking. >>>More