A few days ago, the pornographic photos of US movie stars are known to women and children. While torturing the morals of movie stars, the pornographic incidents also sounded the alarm for computer users on how to protect their private information. People can't help asking, why did the "enjoy photos" spread out? How can ordinary computer users effectively protect their private information?
Regarding the source of the pornographic photos, there are currently two theories circulating on the Internet. One is that Kim Kardashian's photos were stolen while repairing the computer, and the other is that a hacker hacked Kardishan’s FTP server. In this regard, Webroot anti-virus experts believe that these two This argument is unreliable. No matter how confused Kim Kardashian is, it is impossible to casually hand over a computer with such sensitive information to someone to repair, and the person repairing the computer does not dare to spread the photos so blatantly; the second type of information is also unreliable. Kim Kardashian is unlikely to keep these photos on the Internet server for a long time because no matter how secure the network is, there is a possibility that the login password will be hacked.
Webroot Antivirus experts believe that the source of the pornographic photos is most likely from abandoned hard drives. Generally, computer users are very casual when disposing of discarded computers, thinking that they only need to format the data in the computer's hard drive. The formatted data is only moved to a house in the computer, and the data is restored and kept in the hard drive. Inside, people with a little knowledge of data recovery technology can easily recover these data. At present, there has been a group of people in my country who specialize in restoring valuable information in discarded hard disks and selling them for profit. They often buy or recycle old computer equipment from the waste market, and then restore the information in the hard disk to restore the valuable information. Sell it to get more benefits than the value of the hard drive itself.
Experts remind that to avoid similar incidents computer users must pay attention to the following methods when deleting files and disposing of discarded computers to perform unrecoverable processing of files and computer hard drives.
1. Process files. In normal times, you must not use the delete function of the system to delete important files. Instead, use the "file shredding" function of Webroot antivirus software to completely and irreparably shred the files.
2. Dispose of discarded hard drives. When disposing of used computers, individuals and organizations should treat computer hard disks especially. Don’t simply format them. Make sure to punch or destroy the disks in the hard disk to prevent the data in the hard disk from being illegal. steal.
Webroot proudly stands behind our products, which is why all Webroot products are backed by a 30-day money-back guarantee - no questions asked.
If you want more information, then you can call the expert of Webroot antivirus through webroot.com/safe
You can install this trusted antivirus software through webroot.com/safe