Many are wary that the machine only has the msn and the internet browser.Very few are able to identify the Windows symbol on security alerts about whether you have a virus on your system and if it is updated.
Others mistakenly believe that simply having a program that freezes the operating system state, as Deep Freeze, but if you look at forums to see that there are viruses that are able to bypass the Deep Freeze.
2.Restart the PC if already lit
If it is a machine that was already lit, it could be running background applications that jeopardize our security, such as keyloggers or trojan active.We do not know if the person using the machine was previously installed virus inadvertently or deliberately, especially if the machine does not have a reliable antivirus.
3.Access to programs from the Windows Start path
It is not advisable to start the applications by double-clicking the desktop shortcuts, since they can reference other executables and do not necessarily indicate their icons.MSN Messenger icon on the desktop could not be more than a Trojan pitcher left by the previous user.It is best accessed from the Windows menu: Start / Programs.
There are also programs, decoys, which have the same interface as the original program and capture the user's password.Fake eg MSN, which we have already spoken in the post ofHacker Hotmail, a program identical to MSN, but it throws error to the logger and just the second active logger the original MSN for the user to log calm and not fall suspicious.
4.Closed sessions of your accounts to get away from the machine
Sometimes you may wish to use the toilet, buy something or just get away from the PC.In any case it is not advisable to leave the active access their Internet accounts, such as IM, email, etc.Nor leave papers with notes and personal items of value.
5.Consultation alerts commissioned on unfamiliar
Maybe the antivirus and / or firewall and / or antispyware you use on the machine is very good, but if we do not have enough knowledge about online threats, you may allow the execution of a malicious program or spyware that tries to take our information staff time we are connected.
6.Do not divulge your passwords in public
Although it may sound silly, I have witnessed more than once, of how the keys are disclosed in a public booth.One scenario: A friend tells him to another trust your key, not to mention the account, which you please log on while going to the bathroom and indicates the time, the manager, who plans to stay.
While the friend may be a person of complete confidence (but not so recommend to your password), the mere fact of mentioning the key leads to another stranger can then access the machine and review the record of contacts in MSN system (as it keeps a record) and make up with your account, plus the key: Bingo.
7.Do not use for banking or sensitive information
If we are to make a bank transfer is not appropriate to use these public phones, as well as the implicit threat that may exist in the system, perhaps infected, the place can be full of curiosity with bad intentionsfor these types of transactions using a trusted machine.
Nor is it advisable to use these machines to affidavits of the tax system.In Peru, SUNAT offices have specially equipped cabins and secure where, in addition to having a quiet environment with trained staff to help with questions you have.
8.Special security by typing your passwords or access
Shoulder surfingis the name of the hacking technique that involves physically spying on the victim.As its name implies, this practice is usually to commit spying over your shoulder, so that should be especially careful and always watch their backs when they write their passwords.
I recommend not using the numeric pad, but rather the number buttons horizontal, especially if your password is your phone number or series simple as 123456, as this is much easier to find your password.
9.Beware of the physical information cull
When we use cabins sometimes need to do temporary notes, which sometimes throw trash in the same cabin.If it is something sensible, such as personal information (names, addresses, phone numbers or even worse, passwords) it is best to take the paper or post-it and delete it later at home or other place where we have more certainty that can not be misusing it.
To become a fact, there is even a type of hacking that is to review the trash cans of the individual victim, or target, calleddumpster diving.
10.Make sure you log out and restart the PC to retire
Another common mistake, not only to access public phone booths, but when browsing the Internet in general is CLOSEthe windows of our mail or Internet accounts without closing session.This is a drawback, as there are cookies (small files which our information is stored) assets must be finished.It is bestLOGOUT, thenCLOSEthe browser window and finallyRESTARTthe system.