The versatile use of the Internet continues to improve our quality of life as a blessing. The number of internet users is gradually increasing. Almost every field including social communication, information exchange, business is now in our hands for the benefit of the internet.

Using the popularity of the internet, some endangered geniuses are harming the general internet users in various ways. As a result, ‍financial and social harm, including personal information protection is being done. With a little awareness, we can be much safer on the Internet.

What is Internet Security?

Internet security is the process of trying to avoid potential harm online.

In fact, no process is 100% safe on the Internet. We can only use some of the procedures to increase security.

If we compare internet security with a house, then the security of that house will depend on what material the house is made of. The impact resistance of a house made of concrete must be greater than that of a house made of straw and bamboo.

Why does Internet Security is needed?

Security is needed to ensure the protection of personal information and property on the Internet. Hackers are those who steal and misuse your personal information in various ways. They use various viruses and malware to steal your information like bank and credit card information, photo galleries, email, and social media accounts, etc. Which can subsequently tarnish the image of your social life, including money stealing.

How we become victims of Hacking

Hackers are constantly inventing new ways to steal our information. Our ignorance is most responsible for leaving our personal information in the hands of others. There are many more ways we can be victims of hacking. Here are some common methods and some possible ways to get rid of it.

1. Our Ignorance

We ordinary users are not very careful in using the internet. And hackers take advantage of this carelessness to steal our information. Some common mistakes that we make when using the Internet are:

  • Disclosing of all types of personal information online. Such as: date of birth, place of birth, full home address, mobile number, email address, etc.
  • Using own or loved one’s name, mobile number, date of birth, area name etc. as a password.
  • Using an easy password. Such as: 123456, 11223344, 854321 etc.
  • Using a password smaller than 8 characters.
  • Using a word that is habitually more pronounced as a password. For example, someone utters Oh my God in words. And if he uses ohmygod as a password, then the hacker who knows him may easily guess his password.

Methods of Remedy

  • It is best not to publish personal information online unless absolutely necessary.
  • Do not use your own or loved one’s name, mobile number, date of birth, area name, etc. as passwords.
  • Don’t use a password that anyone else can easily guess.
  • Use at least 8 characters as a password.
  • Use a combination of upper case (A-Z), lower case (a-z), numeric letter (0-9) and special character (-_ @ # $ etc) in a password.

2. Viruses & Malware

Viruses and malware are a kind of malicious code or program that hackers create for stealing our information. When viruses and malware enter a computer, it is automatically installed and our information is being sent to the hacker through the internet.

Some viruses cannot be removed by using antivirus. These enter the computer’s BIOS and steal information. In this case, it may not be possible to remove the virus by setting up a new Windows.

“Keylogger” is a type of virus, that steals strokes of our keyboard and sends it to hackers. That is, the Keylogger virus records what we have pressed on the keyboard as ID and password and sends it to the hacker.

There are also many other types of viruses. Some malicious viruses steal our browser’s cache, browser-saved IDs, and passwords. Virus programs are mainly designed to harm others.

How do viruses and malware enter our devices?

  • Using a portable device (like Pendrive) that contains viruses.
  • If you curiously click on a link that contains viruses.
  • Downloading apps or software without any reliable source, etc.

Methods of Remedy

  • Do not download apps or software without trusted sources.
  • Don’t click without being sure of any links that create curiosity or excitement.
  • You can get information by searching the internet before using any unfamiliar app, software, or link.
  • If the computer’s autorun option is on, turn it off. To do this, first, open the Run (Windows key + R) option. Enter gpedit.msc in the dialog box. Then go to Administrative Templates -> Windows Components -> AutoPlay Policy -> Turn off AutoPlay from User Configuration. From here select Turn off AutoPlay -> Enable and Turn off AutoPlay on: -> All devices and Apply and Ok.
windows keyr
Run command
run gpedit.msc
gpedit.msc command

Some Ideas

Usually, ordinary users don’t understand whether the Keylogger is installed on our computer or not. So we can use a little trick while writing our ID and password.

Suppose, your password is MyPassword_1234. Then when writing your password add some extra letters to it. Such as My_1234_Password_1234. Then, before pressing Enter, select the extra letters (1234) together and delete them with backspace. Then log in to the account. Then the hacker will have very little chance of getting your correct password.

3. Being a Victim of Phishing

In this method, the hacker creates a clone of a site that you are using. That is, create a website that looks the same as a site that you are using. You will be asked for your ID and password if you want to use that clone site. Which will be stored in the hacker’s database.

Suppose you use Facebook regularly. Now a hacker wants to hack your Facebook ID. Then he will create a site that looks like Facebook. Then he will send you the link of that site by email, message, or any other way. If you want to enter the phishing site, you have to give your ID and password. And in this way, hackers can steal your ID and password.

Methods of Remedy

  • If you receive a verification email from a website (Facebook, Gmail, etc.) that you are regularly using, then check the link to see if the domain is OK.
  • First, log in directly to the website from which the email came. Then click on the link in the email.
  • If you are asked for your ID and password after clicking on a link shared or inboxed by someone, be careful.

4. Man-in-the-Middle Attack

In this method, the hacker hides himself between the user-side and the server-side and then captures the information that he wants by tempering the data.

When we visit a website by using a browser, a request goes from our browser to the server of that website. Then the server sends data to the browser based on that request. In this communication stage between the server and the browser, hackers hack the information by hiding himself.

If the information came from the server-side is not encrypted, the hacker can easily tamper with it.

Methods of Remedy

  • Before providing sensitive information (bank account or credit card information, etc.) see if the site has an SSL certificate. That is, whether there is https:// at the beginning of the website. Otherwise, refrain from using this information.
  • It is better not to provide such information unless it is a trusted website.

Some Ideas

Sometimes we may need to send a very important file to someone else. In this case, we can send the file piece by piece without sending the file at once.

Suppose, our file is 10 MB. Then first we will split the file into 2 or 3 parts using WinRAR or any other archive software. Then a part will be sent using an email. Other parts will be sent using another email or messaging app. In this method, every part will be sent using different mediums.

The sender must be told which software has been used to split the original file. This is because the same software may need to be used to reattach the file. That is, if we split the original file using WinRAR, then we may need to merge the pieces again using WinRAR.

If you send the file in this way, it will not be possible to get the original file without all the pieces. And it is almost impossible for any hacker to hack every medium and steal all the pieces.

How to Split the file using WinRAR

  • You must have WinRAR software installed on your computer. If not, download WinRAR and install it.
  • Click the Mouse right button -> Add to archive … on the file you want to split.
winrar add to archive
WinRAR – Add to archive….
  • Write down the size of each piece in the Split to volumes, size box, and click OK.
winrar file split
WinRAR – File Split

How to Recover the Split File using WinRAR

Put all the files in one folder. Select all the files with Ctrl + A. Click the right button of the mouse. Click Extract Here. Then the original file can be found.

winrar file
WinRAR – File Extract

Here are some common methods of how our information can be stolen online and how to protect them from it. We need to be careful about where and how we are using our information to avoid online hacking.

Leave a Reply