placement of funds webmoney

DeEvro.ru

 

Safe use WebMoney

Безопасное использование WebMoney

The general information on safe work in a network the Internet

It is known, that because of an openness of reports and imperfection of operational systems the user connected to a network (both to local, and to global) can be easily attacked from the outside, from other network computers for the purpose of theft or destruction of data.

As a rule, files with confidential keys, personal logins and passwords for using those or other services and other important information with which help it is possible to get access to computers of a local area network and, hence, to the information placed on them become objects of theft.

For prevention of not authorised access the whole complex of measures, since organizational and finishing special program and hardware, such as fireproof walls, Firewall, Proxy-servers, uses of means of anti-virus protection and so forth is used

Further we result a number of recommendations for protection of the personal computer against not authorised access. Experience shows, that following these recommendations, it is possible to entrust fearlessly to the computer of the sum in ten thousand dollars. At the same time it is important to understand, that the questions, concerning protection of computers of a corporate network dare at higher level, with obligatory attraction of the qualified experts.

So, for computer protection on which the confidential information is stored, we recommend you the following:

  • Reflect on expediency of installation on computer Windows 2000 or Windows XP, refuse use of out-of-date operational systems Windows 95/98/Me. You can use Linux (Unix) systems, but high-grade protection of such operational system demands intervention of the expert of very high level which are accessible far not to everyone (and the more so operation of products of emulators of OS similar VmWare). If you do not have such experts ten times think and consult with experts before to make a choice.

  • Make constant updating Service Pack and Hot-fix, accessible on a site windowsupdate.

  • Necessarily realise (independently or with attraction of the expert) protection operational systems with the maximum approach to safety standards see here here again.

  • Establish a personal fireproof wall of type Outpost, ZoneAlarm or similar to them (in Windows XP use OS built in this Firewall) and close on entering and proceeding access all ports and ip-addresses, except used by you in work (ports and IP the addresses necessary for work c WebMoney Transfer are described in instructions on connection on a site webmoney.ru).

  • Use modern anti-virus means with timely updating of virus base.

  • NECESSARILY supervise all entering stream of the information (web, email, news and so forth) on presence Trojans Horses and to that similar "evil spirits". As even at performance of all actions specified to given point your computer will be still defenceless at attacks of this type. DO NOT START!!! Executed modules: programs (.com, .exe), скритпы (.js, .vbs), package files (.bat, .pif), files of documents with macros (.doc and so forth) etc. if these files are received from NOT a reliable source in a network the Internet.

  • Store files with the classified information on the replaceable carrier (a diskette, a replaceable disk, CD, a smart-or a flesh-map and so forth).

  • Periodically do a copy on other (reserve) replaceable carriers.

  • Having finished work in system, do not forget to take the replaceable carrier and to clean it in inaccessible for surrounding a place.

  • Store the replaceable carrier with the classified information and its copy separately from each other, in reliable places.

  • Attentively study possibilities on maintenance of safety and protection against not authorised access, put in pawn in systems used by you.

  • Departing from the computer (even for some minutes), necessarily block it or finish the programs used for financial operations and demanding raised privacy. Thus do not forget to provide inaccessibility of external carriers with the classified information.

  • Working with program WebMoney, do not visit at this time other sites. Having worked with the program - close it, remove from the computer the carrier with files of passwords and purses and only after that can spend surfing on a network the Internet.

  • At all do not allow extraneous programs to get access to passwords or confidential keys. If any foreign program (even with good intentions!!!) suddenly asks you to enter the password from the account in payment system or to specify, where confidential keys from the account in payment system in no event it do not do lay!!! To passwords and keys software products for which these keys and passwords are intended should have access ONLY.

Having executed our recommendations, you essentially will raise safety of the computer, will provide confidentiality of management and safety of money resources in electronic bank and payment systems.

 

Content

 

 

 

Certificate
To check up the certificate

Contact. Privacy Policy

2008-2017 Copyright (c) Andrey Kochurov