How to prevent mobile phones from being mined by others
1. Back up important data and photos and restore factory settings. Don't install applications from unknown sources. In addition, don't authorize in permission settings
2. You can swipe the computer to see if it can't work. Besides, the computer needs to clean up the memory on time so that it won't get stuck. The memory of the mobile phone is seriously insufficient. It is recommended to clean up the memory lightly, and then restart your mobile phone again
3. Clear the data of the mobile phone. If there are important things, save them on the network disk first, and then restore the factory settings three times. This is safer
1. Set the security level of the browser. Our common browsers all have the function of security level setting. Through reasonable setting, we can effectively filter the access restrictions of some illegal websites, so as to rece the damage to computers and personal information
2. Firmly resist reactionary, pornographic and violent websites. On the one hand, these bad information will affect the physical and mental health of teenagers, on the other hand, many illegal websites will use browser vulnerabilities to attack users3. Don't click illegal links at will
When downloading software and materials, we should choose the regular website or official website5. Turn off some sensitive functions in common communication software. Such as "people nearby" in wechat and "allowing strangers to view photos" in wechat privacy
6. Do not take photos of your family and address. If it goes on like this for a long time, as long as it is analyzed and summarized by others, the information exposed will become a complete set of information, which hides all kinds of unpredictable risks
Do not test related information on the Internet. Some websites do surveys and ask for information about age, hobbies, gender, etc. to do it for a small profit. This information may be used by others, and graally summarized, and sold to others for profit or threatIn fact, it's not difficult. When we use mobile phones everyday, there will be some background applications, which will be "killed" after restart. However, if the mobile phone is hacked and rebooted, it will enter a high load state again, and the system running memory will be used up quickly. Therefore, if the mobile phone is stuck, hot or dead for no reason, it may be g
it is possible that hackers steal all the information before using mobile phones to "mine" cryptocurrency. People will not only encounter problems such as cell phone stuck, fever and even crash, but also other financial losses
moreover, it is worth noting that some mobile mining apps, in the name of "mining", allow users to invest money and continue to develop offline
세 51032; 49345;
To be exact, brushing is impossible to prevent. If the person who takes your mobile phone doesn't need the information on your mobile phone, you can reset the mobile phone through recovery, and then you can brush the phone. Although it can not completely prevent the machine from brushing, some settings and methods can be used to improve the difficulty of the machine brushing, so as to rece the risk of the machine being brushed:
1. You can set a password for the mobile phone
the combination of numbers and letters can be used as far as possible to improve the difficulty of cracking the password
2. Turn off USB debugging
try to avoid turning on USB debugging in daily use, and turn it off in time after use if necessary
3. Don't swipe into the third-party recovery
the third-party recovery provides convenient conditions for swiping the machine, which brings the risk of being swiped at the same time, so you should use the official swiping program, so you can try your best to avoid being taken advantage of by others
4. Timely updating the system
system updating will improve the security protection ability and rece the risk of being cracked
5. Although using the official system
tripartite system can bring some new functions and improve the experience, it is also accompanied by risks, which may lead to loopholes and easy to be unlocked
some Samsung models support the "find my phone" (remote control) function, which can be used to track and control your device remotely through network services
the "find my mobile phone" function can only be enabled if the following conditions are met:
1. You need to bind Samsung account before losing your mobile phone, and activate the remote control function in the device
2. The device should be on and connected to the network
3. When the above conditions are met, log in through a computer or other mobile phone https://findmymobile.samsung.com/ -Enter Samsung account and password - after login, "searching for device" will be displayed in the upper left corner to locate the current location of the mobile phone. After successful location, "last location + current time" will be displayed
at the same time, you can also use "lock my device", "erase my device" and other functions to minimize the possibility of your personal information being disclosed
prompt:
1. If the condition 1 or 2 is not met or the mobile phone is reset, the "find my mobile phone" function will not be realized
2. After the mobile phone is lost, it is recommended that you modify the relevant account password bound with the mobile phone number in time to avoid further loss.
if he only knows how to swipe, you can replace it with a mismatched rec mole to make it unusable, but if you ask this question, obviously you won't
suppose that he can swipe, and he doesn't need to swipe, just go to the factory mode or rec your data
the security of Android phones is not good.
1. First, open the Tencent mobile phone manager and click the personal center button in the upper right corner, as shown in the figure
view the usage of mobile app, It can be sorted by "usage time", "startup times", "application name", etc
of course, you can also click other options to see the corresponding information, such as the WiFi connected to the mobile phone, the account information of the mobile phone, etc 39;