Beware on the Internet, All Can be tracked

Share it:

Beware on the Internet, All Can be tracked


Who's here every day related to cyberspace? Suddenly all answered almost every day time spent by surfing in cyberspace.

Without realizing modern humans interact with each other more without face-to-face is enough through the internet. Thanks to the super fast internet network, Wi-fi facilities everywhere make it easier for all access.

Sometimes the internet will whip in the future what will be done in the past. The use of social media according to age also affects mental. If it used to be alay-alay is not clear, when it became famous or became public figure even made a disgrace by irresponsible people.

Indirectly social media does not remove it, it remains https://lampuhijau.com stored in the database of a social media or on the search engine page . This is an opportunity for people to be idle and irresponsible to you on the internet. Starting from for funny, spreading disgrace up as a squeeze material.

As the Millenial generation that is always offensive to the internet must be literate in a dangerous on the internet. What are some things you have to do to avoid unwanted things, check out:

Sharing privacy-related, so many users are hooked to share privacy on the internet one on the social media bio page. Indirectly everyone can access it even if your account is locked. Capitalized by privacy that leads to fraud, robbery, kidnapping to other undesirable things.

The privacy data is diverse, ranging from sharing home addresses, phone numbers and ATM cards. I start from discussing home addresses, it's the easiest thing to know the target location, by knowing the home address, the easier it is to track someone down.

Next is the phone number, because the nature of a phone number that is directly fixed to the person. The home address must go through the intermediary of the other occupants in the house while the direct telephone number is fixed on the target.

Should never share phone numbers on the internet or in social media, from idle folks who call (for example shed stool services) to extortion threats under the guise of phone numbers.

Another thing that is not less dangerous is the habit of check in location , one of the platforms of social media that has a check in application . This feature is often used especially let me look existing and contemporary.

But distress can be lurking anytime because kidnapping could happen. That plus the user is very fond of accepting unknown friends in the real world. Seeing the check-in cycle , the offender's actions can be anywhere and anytime to kidnap victims. Hayo !! Could be mutilated, your kidneys are sold on the black market.

Next is the habit nyelenh like to show off air tickets, this way as dangerous especially when often the hooked traveling show off plane tickets in social media accounts.

The impact is quite dangerous, let alone one of the cyber security companies revealed that there is a security hole contained in the flight booking system.

Each booked ticket will be recorded in Global Distributed Systems (GDS). Ticket bookings will be recorded in a 6-digit GDS and this system still uses the old system reference but is merged only in the modern Web.

The problem is the 6 digit code is very useful in accessing the personal information of the buyer. An irresponsible hacker just simply remembers and records the code.

Unwittingly he can use it from full name, credit card number, and address. And if the hacker is fraudulent, he could change the flight schedule or cancel it. Intention to vacation to Paris, eh even diverted to Africa. Ngehe no!

The other thing is to share photos on social media with V ( Victory ) or peaceful. Photos in this way are easily hacked by knowing the victim's fingerprint. Cyber criminals are now getting more sophisticated, they can just catch the victim's fingerprint let alone the resolution of the camera more qualified at this time.

Given that most of today's mobile phones use log in with fingerprints. If a cyber criminal then gets a fingerprint and makes a replica version, he can easily get into all those accesses. We recommend first consider before uploading in social media.

Removing the embarrassing thing, all must have been alay, there is a fast conscious and there are guns unconscious. Well ... very often when the alay period is used for adverse things especially in social media. Starting from writing with alay script , vent, courtship until angry is not clear.

Indirectly it remains in the timeline or history of social media. Unless the owner closes the social media account. This is sometimes a soft meal the stalker find out you know better, how he was in the past.

This method is also often done by companies in recruiting new employees. The HRD of every company today also often find out more from the recruited employees. Well .. the habit with uploading alay things , vent unclear to post something controversy get ready to fail to work. So multiply posting a positive thing.

Controlling emotions, emotions often hurt many parties if not able to control themselves. This often happens in cyberspace with a vague anger and assume by pouring out the emotions everyone will care about your problem.

In fact not, in fact all the friends feel the accused and the person who has not been about you will obviously menjudge your attitude excessive. Well .. better restraint or confide to the nearest person not in social media.

Very many internet users are using social media. The most common habit is to indulge affection to problems in social media. Other netizens watched it as if their own timeline were just spectators. In fact it is a shame that continues to stick if not erased. 

Do not use the facilities generally, who is not tempted by public facilities? Especially free, but often can bring harm. Starting from using free Wi-fi, almost everyone really liked something free Wi-fi. In fact, public Wi-fi does not have strong security, other people can easily access all the data without realizing it.

It's good to avoid using common Wi-fi especially in the process of logging in and transactions. Use tethering (propagation) from personal gadgets or have friends. But do not be used to download moreover can tethering (propagation) from friends, pity koutanya so tekor.

Next is to use public computer facilities, well this is often during the cyber warnet. Often times computers used by many hands often contain harmful viruses. He can log in while accessing a number of accounts belonging to you, so do not use when it is very, very forced.

Updating antivirus, technological developments develop rapidly and indirectly the number of viruses are increasingly experiencing an upgrade.
Share it:

Post A Comment:

0 comments: