Tuesday, September 27, 2011

How to Login Email Account Safe from Hackers




Each of us is going to open an email we should be vigilant and careful not to carelessly login at any place without mempehitungkan security aspects. Negligence may result in your password can be known by others either experienced or inexperienced. Usually, the hacker / cracker email address that has managed to get the password and get into the victim's e-mail will read personal email, delete email, change the settings, sending nasty emails, and even change the password and may also delete your email address for ever. For that we must be careful in maintaining the confidentiality of the password e-mail us. 

There are several things to consider to keep our passwords are not known by others:

1. Change your email passwords that are difficult to guess
Avoid using passwords that are short and common words found in dictionaries, good dictionaries Indonesian and English. Usually the email hacker will try one by one the words in the dictionary to open our emails. We recommend using a password that consists of 6 characters or more. Longer is better, but lest we forget our own passwords. Then insert or insert characters instead of letters or numbers into our password. Can also combine uppercase and lowercase letters in passwords. 

2. Be careful when opening email address from public places
If we open the e-mail from the office, cafe, friends house, home Sodara, neighbors, and so on that are not our own personal computers we should not type in passwords directly through the keyboard. Sometimes people we know or not know to install and install spy programs that can see what you type on the keyboard and send it to email that has been set. The fix is ​​a can with a keyboard maouse program in Windows XP or can one make or bring their own from the floppy or CD from the mouse or keyboard online on the internet. How to use it is to click the buttons available on perogram is intended to form the password field. Another way is to copy and paste from an existing or tilisan we have prepared. Do not forget to randomize the password rather not be legible and understandable to others who read it. Create a simple website or blog-edged codes that only you can understand it. Then copy and paste any of the codes which will form the password e-mail address. 

3. Be careful opening email on your personal computer
Run anti-virus programs or anti-spyware that is updated no more than 2-3 months. Plus the program always run a firewall when surfing the internet to block connections that are not desirable either from within or from outside our computers which are usually aimed bad to us. The program sets that I recommend adalan AVG anti-virus, anti-spyware Ad-Aware and McAfee firewall. Frequently run the application by definition updates and patches to eliminate any possibility of viruses and spyware that we do not want. 

4. Change your passwords periodically email address
By replacing a regular basis it will be difficult for people who want to take over your email. But once again do not be reckless, so forget your passwords. 

5. Distinguish email account passwords with one another
Contains so then when one of our email accounts fall into the hands of hackers then we have a long email backup we use. 

6. Log on the website right 
Look at our browser whether the address to log into our email is correct. Do not let us enter passwords at websites that deliberately similar to trap us. Understand the true path system naming the url address that we usually pass. If you suspect you should not log on and check with others who are more familiar. 

7. Diligent Search for Information 
Diligently seek out developments in e-mail hacking websites, or in the mailing list. From time to time, the hackers will discover and refine techniques to make you miserable evil of losing access to the e-mail us. 

If you have lost access to enter the email address you will use a recovery technique by inserting the data in question and click on the links that were ordered e-mail service provider. If you forget the data or the data has been changed by hackers, then immediately say bye-bye and good-bye to your old email address and immediately create a new email address.

0 comments:

Post a Comment

Popular Posts