Recently, QQ users Security Center received a report, reflecting the receipt issued in the name of counterfeit fraud Tencent message to trick users into the site of non-official website, enter your password and secret security information, passwords and password security fraud-related information.
mail fraud including \It was in the complaint you verify your account to protect data, \Requires you to use your phones to send information security. To provide authentication codes. Daohao are higher by confusing the name of the email address, so the class has a high fraud fraudulent e-mail. The large number of QQ users to be vigilant, pay attention to recognize and avoid fraud.
QQ Security Center to use e-mail address:
service@tencent.com
Tencent QQ Security Center
2009-7 - 09
reminded: be careful Tencent QQ mailbox inside the Trojan horse posing as mail. recent hacking furious!!
Trojan e-mail note: Recently a lot of hacking. Tencent ######## name to the number of mailboxes you buy inside the hair Trojan e-mail as long as you input the data point will be stolen.
Please note: If you buy QQ number of mail inside. If there is a similar example
service@tencent.com Tencent sent by the sender or a similar name Tencent Security Center signs. That you account was abnormal in the remote risk of complaint. tell you to lift the restriction point to enter your protection information. or that you obtained a permanent protection status, or that you get the real-name identity verification data protection needs, or that you made a spam been reported. tell you to enter your password information, or to protect the information. or tell you to send messages using a mobile phone enter the verification code. should be careful. This is a trojan e-mail. Tencent will not send any mail to you. And this is cheating Your passwords and protect data. Do avoid. not to point-mail messages. Do not give yourself the number of information!! (who told you to enter your account and any protected information. called the verification code you enter your mobile e-mail messages are Trojan . lie to you the information. should not. care be taken in, plus you ask if there is fraud verification code on your phone. do not be!)
=========== === QQ password security Tens =============
1. Tencent applications to password-protected, so if your password is compromised or forgotten password protection can also be used to take back.
2. QQ number of bits in the password must be more than 8 bits, and preferably contain numbers + letters + special characters, otherwise the super computing power of modern computers, to crack xxx password you just QQ is easy.
3. Do not fill the true age of QQ,
cheap barca jersey, E-mail and other sensitive information, but can not tell anyone, be careful luck.
4. not to send you free to run other people's files, even files that look very attractive and do not run it easily, such documents often are hidden behind the hidden secrets and dangerous .
5. in the Internet cafes must be removed when leaving QQ chat records, it is best to order your QQ number to delete the entire folder named, but also to empty the Recycle Bin.
6. Note that the latest version of the QQ, QQ attack tool for mostly for a version of its updated version will not upgrade the speed than the QQ update faster.
7. hide their real IP, the Internet through a proxy server can reduce the chance of people find themselves, and avoid attacks by others. Of course, useful for the hacker master of this trick is not too large, it is fortunate that the master is not a lot.
8. be prepared in advance of two commonly used passwords, login using a QQ in the use of right-click the bottom right corner after the QQ icon, select \password \off the assembly line before the change of the password is neglect records.
9. QQ password to do with Chinese characters to the keyboard recorder failure. Since most of the keyboard recorders are only recorded on the keyboard, not the password on the clipboard to take notes, so if by way of copying Chinese characters as a prepared copy of QQ password, keyboard recorder almost was not QQ passwords may be stolen, there is no worry about the.
10. use of process management software, anti-QQ password theft. Trojan Records QQ password is hidden, by pressing Ctrl + Alt + Del to find them is unlikely. At this point, a process management software has become very necessary, because the Trojans to the preparation of the present level, the majority of its process can not be hidden, so use the process management software can find them, then you can terminate the process effectively prevent Trojan. After that we can safely to use the QQ.
QUOTE:
=================== Analysis of cause and recover stolen QQ method ============
based on my personal experience :
1: the Trojan horse stolen , or that you do have a Trojan on the machine, or is the time to visit the website of the (in this horse, it is difficult perceptible, it automatically shut your QQ, then you can do not pay attention The Trojans then landed at this time has begun to record your information), so a further reduction of the best software in case you reset the machine and then restore the software, visit some of Marin must have had then you must manually delete these virus ah horse, to remove in the registry!
2: hacking who use our bad habits, such as your password and you often go to sites QQ (such as a number of forums) and login password, like someone got that data from a database site has been the equivalent of your QQ password, Pale Ba so everyone's best not to get a password, or theft of your QQ do not know how it!
stolen: Do not immediately after they were stolen when Cha Du QQ, using sniffer tool to send e-mail and look up Trojan-mail password so the password to that mailbox, you can put it back e-mail password changed, you can use to apply password protection to Forgot password protected, application lawsuits lines,
barcelona jersey cheap, but so hard to
QUOTE:
How to prevent and Q QQ coins.
A game currency stolen: your password is too simple, and in Internet cafes and other public places used QQ, so software solutions using some guess guess solution can easily try out. QQ where you are registered in the Email account was hacked, the situation is similar to the first case, the so-called \password sent to the mailbox. QQ game project points, game B, QB, who is the Pirates of the dense target. Which mainly B game, so players have to carefully protect their game B, be sure to set your account password, each time the game comes to an end , remember that the money deposited into the account. At the same time to account security, set up an account spending limit (minimum 1), just in case the password again to minimize the damage can compromise. relatively large number of players for QB, to set on the amount of spending within a certain case,
lebron james jerseys, even if the password is stolen, people can only take you within a day quantitative QB.
II: QQ QQ numbers game account and condemnation, so want to protect QQ own password security, password protection to apply QQ. Avoid: QQ number of password protection if forgotten, or not in their own hands, going for the long-term interests, such numbers do not QQ as their primary number
Third: If the Internet at home, we must protect their computer, install antivirus software. must open the firewall and antivirus monitoring center at any time with their computer monitors. antivirus software upgrade update in time, while their own versions using QQ shall be updated
four: the computer you are using a \email to a mailing address. Please do not download unknown software, especially the hacker class, xxx type of software, the software may use your curiosity ambushed inside a Trojan horse, when you blow someone else, when everyone knows black people have been buried for their own under a curse. Do other people at random to receive pictures and files. And do not send random people and open the URL. Comparison of two popular file formats:. Exe files are probably for the implementation of Trojan,. Scr is a screen saver, where you can load the trojan, the synthesis of the ordinary with pictures and horse .. if someone sent you photos or pictures, the best way to use to send the screen capture, if special circumstances should the format of images and other commonly used image format bmp.jpg.gif before they can open if not sure whether to receive a picture or a Trojan can be used as a method: the received file into a folder, then right-click the file and not open} {select, then view the folder For more information on the left, if the picture if the picture will directly reflect the reduced graphics .. if additional information is displayed, do not open.
Five: Do not over-trust anti-virus software illusions. Trojans can not all be out of killing anti-virus software because some software just launched, or a registered version of the very few people use, this disease is difficult to find anti-virus software company, virus database even more , and also may not join this disease, such as Trojan viruses, antivirus software is out to kill not only as their own anti-virus software so the Trojans killing an auxiliary tool, and not to indulge in over-reliance on it.
Six: Enter the password of the two tips.
1. Some software can intercept the password interception of 9 digits, so you enter the QQ number I remember when some more before the QQ number 0, so without prejudice to their landing QQ, QQ will also reduce the possibility of loss. This is probably most of my friends know.
2. Large Most of the passwords might be intercepted software {} are not known all the time sequencing method in accordance with mechanical interception Password: your password is the time in accordance with the order to intercept the password. For example, you have two digital input 12, to intercept password is the 12, but if you enter 1, then the mouse arrow to move to a front input 2, then the password is the password for the interception of 21 but the software are mostly chronological order according to input the password, the password is truncated to 12 rather than 21 correct password, which is most of the password interception software vulnerabilities, interested friends may wish to test it .. If that's the password for all of ridiculous interception software, then we all enter the password used to form this ; no one can no longer lose their QQ password.
Seven: normal QQ should develop good habits of using personal settings must remember to change the authentication in the default value is set to \Add as a friend to me \In the network security settings in the settings \Note QQ password length and complexity of the set is best not to go to Internet cafes and other public occasions QQ. Really need to pay attention to delete your information before leaving and password records. Internet cafes in the machine if the Restore Wizard is installed, so at the time and leave,
nfl wholesale jerseys, must restart the machine again, so OK.
Do not mess then, chaos to order some unknown DD, in Internet cafes Internet cafes mode be selected landing off the assembly line, remember to remove Internet records!
1. Q: Do you home safe secure a certain number of you?
A: The numbers are safe, shop number stored in the hands of the majority of the new at number 0, the sun is at No. No. from hanging. source of regular. not stolen smuggled goods. does not exist was appeal possible. presented the history of early code, absolute security.
more than Taobao shop chain restaurant, sales numbers more than 3 years, the good faith. conscience sell numbers. All praise shop 100% trustworthy.
//============================================= ======
★ second part of the number of security issues: (No safety concerns for buyers, please carefully read)
//============== =====================================
Note Trojan e-mail. to protect their account to purchase the security
Please note: If you buy the QQ number of mail inside. If there is a similar example
service@tencent.com Tencent sent or
call the sender of a similar 2 on behalf of the protection of your upgrade. or that you obtained a permanent protection status. tell you to enter your password information
or protect information. should be careful. This is a Trojan e-mail. Tencent will not send any mail to you. And this is cheating and protect your password
information. Do avoid. not to point-mail messages. Do not give yourself the number of information!!
//============================================= ==============
★ Part III: For confirmation, to request to change the password, then confirm the application complete protection buyers see here:
/ / == ================================================== =======
buyers are worried about the problem
1, number about 3-7 days to change your password (login IP and IP are often the same on-line),
tennessee titans jerseys, half-way by the seller (or others) how to do to change my password?
Answer:
negative Daohao may change your password, because he's linked to IP certainly not a long time you can not change the password.
(What is your horse machine, you assume the risk itself is not the seller assume)
deny the possibility of the seller to change the password,
First, the seller does not own accession number, the number is at the number, did not visit before, can not change password, there are so many numbers where the seller has time to go hang?
Second, the seller is selling you my number, you should trust the person selling you my number, will not move your number.
Third, you have the right to evaluate, you can change the password in the evaluation of any one of the sellers will not provide you quick little hundred years of work went lost his credibility, right?
//=================
/ / change the password on:
//========== =======
now buy a new number, you must use 3-15 days in the local (individual numbers for a long time point) to make regular use of IP and IP agreed to change the on-line. Proposed on-line at least 2 hours a day or more. Continued use. Does not replace the computer
//=================
/ / on the number of protection:
//============== ===
without bail: the numbers do not apply to any password-protected. Apply password protection to your purchase!
click the link below to apply verification number is not password protected:
sent Paul: (you can buy right away is the only change your password, immediately change the number of protection)
has applied for a good password protection, you bought I give you password protect information, security mailbox.
you take can change the information instantly into your own,
cheap kobe bryant jersey, absolutely 100% safe.
comprehensive comparison: No No not immediately change the password protection, protection can not be changed immediately, only through the claims are 2nd generation protection,
which no protection can be set to their ID card number, protection can not be sent.
get the advantage of protection can immediately change the password and password protection, 100% safe, but identity is not modified.
Please do not attempt to answer that the seller has the duty and responsibility of all the problems the buyer, the buyer's obligation to meet all the requirements, and buyers do not need to respect the seller, you can even play down the seller free to trample on the personality, made a very rude question.
talk about courtesy, respect for the seller.
map is equal exchange trading, you may feel that buyers earn your money, but trading is completely voluntary, and not what you give alms sellers, shop there
happened dozens of the same number is people saw the situation, and respect is mutual, arrogance will only drive away honest sellers, only those who cheat,
their map is deceiving you, they are rude to you again very, very enthusiastic promise you inconsistent with the requirements of common sense
QQ Pick Address: 【5 6 7 8 QQ has the goods】
website:
http://qq10000.net (Recommended Pick page)
Taobao shop:
http://189991000.taobao.com
selected number to contact 24-hour online customer QQ: 53618 Mobile: 15555557518