How to protect from cracking of Vkontakte

How to protect from cracking of Vkontakte

VKontakte – one of the most popular social networks in Russian-speaking Internet space. Unfortunately, personal pages of users of this resource are often cracked with malefactors for spam sending. In order to avoid it it is necessary to be able to protect the account.

Instruction

1. Use the difficult password at registration on social network "VKontakte". Alternate letters to digits and other keyboard characters ("" No. "", "" %"", "" *"", "" @"", "" & "," "!" ", " "= "", ""+"). Use lowercase and capital letters. The your password will be more difficult, the probability that the malefactor will manage to pick up it manually is lower.

2. Do not use on social network the password for e-mail or other resource. Otherwise when cracking VKontakte page you risk to lose all the accounts.

3. Try to change the password for new more often. Do it at least once a month. You store the new version of the password not on the computer, and in the paper daily log or a notepad.

4. Change settings of your page of VKontakte. Leave it visible only for friends. In the same way limit access to the photos, videos, personal data, etc.

5. You do not come into social network from an Internet cafe and from other computers to which strangers have access. On such machines harmful programs spies can be installed. They trace the passwords entered from the keyboard and save them in the separate file.

6. Install the qualitative antivirus software on the computer and systematically update it. Regularly scan the hard drive on presence of viruses.

7. Do not load from the Internet the applications for VKontakte promising to raise rating or to increase the number of friends. It can be the spy software.

8. Be afraid of a phishing. It is a special type of Internet fraud which is directed to gaining access to confidential information of the user. If when loading any Vkontakte application to you suggest to enter the login and the password, do not do it at all. Report about the suspicious application of administration of a resource. If you receive letters with requests for confirmation of the password, react to them in the same way.

Author: «MirrorInfo» Dream Team


Print