Position: Home page » Equipment » How to prevent mobile phones from being mined by others

How to prevent mobile phones from being mined by others

Publish: 2021-04-22 15:36:01
1.

1. Back up important data and photos and restore factory settings. Don't install applications from unknown sources. In addition, don't authorize in permission settings

2. You can swipe the computer to see if it can't work. Besides, the computer needs to clean up the memory on time so that it won't get stuck. The memory of the mobile phone is seriously insufficient. It is recommended to clean up the memory lightly, and then restart your mobile phone again

3. Clear the data of the mobile phone. If there are important things, save them on the network disk first, and then restore the factory settings three times. This is safer

< H2 > extended data:

1. Set the security level of the browser. Our common browsers all have the function of security level setting. Through reasonable setting, we can effectively filter the access restrictions of some illegal websites, so as to rece the damage to computers and personal information

2. Firmly resist reactionary, pornographic and violent websites. On the one hand, these bad information will affect the physical and mental health of teenagers, on the other hand, many illegal websites will use browser vulnerabilities to attack users

3. Don't click illegal links at will

When downloading software and materials, we should choose the regular website or official website

5. Turn off some sensitive functions in common communication software. Such as "people nearby" in wechat and "allowing strangers to view photos" in wechat privacy

6. Do not take photos of your family and address. If it goes on like this for a long time, as long as it is analyzed and summarized by others, the information exposed will become a complete set of information, which hides all kinds of unpredictable risks

Do not test related information on the Internet. Some websites do surveys and ask for information about age, hobbies, gender, etc. to do it for a small profit. This information may be used by others, and graally summarized, and sold to others for profit or threat




2.

In fact, it's not difficult. When we use mobile phones everyday, there will be some background applications, which will be "killed" after restart. However, if the mobile phone is hacked and rebooted, it will enter a high load state again, and the system running memory will be used up quickly. Therefore, if the mobile phone is stuck, hot or dead for no reason, it may be g

it is possible that hackers steal all the information before using mobile phones to "mine" cryptocurrency. People will not only encounter problems such as cell phone stuck, fever and even crash, but also other financial losses

moreover, it is worth noting that some mobile mining apps, in the name of "mining", allow users to invest money and continue to develop offline

3. This is totally reassuring,
4.



세 &# 51032; &# 49345;

5.

To be exact, brushing is impossible to prevent. If the person who takes your mobile phone doesn't need the information on your mobile phone, you can reset the mobile phone through recovery, and then you can brush the phone. Although it can not completely prevent the machine from brushing, some settings and methods can be used to improve the difficulty of the machine brushing, so as to rece the risk of the machine being brushed:

1. You can set a password for the mobile phone

the combination of numbers and letters can be used as far as possible to improve the difficulty of cracking the password

2. Turn off USB debugging

try to avoid turning on USB debugging in daily use, and turn it off in time after use if necessary

3. Don't swipe into the third-party recovery

the third-party recovery provides convenient conditions for swiping the machine, which brings the risk of being swiped at the same time, so you should use the official swiping program, so you can try your best to avoid being taken advantage of by others

4. Timely updating the system

system updating will improve the security protection ability and rece the risk of being cracked

5. Although using the official system

tripartite system can bring some new functions and improve the experience, it is also accompanied by risks, which may lead to loopholes and easy to be unlocked

6. If your mobile phone is lost, you can report to the relevant department and register. And report the loss / replacement of mobile card and payment account as soon as possible, and modify the login and payment password of relevant account
some Samsung models support the "find my phone" (remote control) function, which can be used to track and control your device remotely through network services
the "find my mobile phone" function can only be enabled if the following conditions are met:
1. You need to bind Samsung account before losing your mobile phone, and activate the remote control function in the device
2. The device should be on and connected to the network
3. When the above conditions are met, log in through a computer or other mobile phone https://findmymobile.samsung.com/ -Enter Samsung account and password - after login, "searching for device" will be displayed in the upper left corner to locate the current location of the mobile phone. After successful location, "last location + current time" will be displayed
at the same time, you can also use "lock my device", "erase my device" and other functions to minimize the possibility of your personal information being disclosed
prompt:
1. If the condition 1 or 2 is not met or the mobile phone is reset, the "find my mobile phone" function will not be realized
2. After the mobile phone is lost, it is recommended that you modify the relevant account password bound with the mobile phone number in time to avoid further loss.
7. If you have an Android phone, it's impossible to prevent others from swiping it. It depends on the skill of that person. If he can brush, you can't prevent it. Of course, according to the keys you said, it's the card brush
if he only knows how to swipe, you can replace it with a mismatched rec mole to make it unusable, but if you ask this question, obviously you won't
suppose that he can swipe, and he doesn't need to swipe, just go to the factory mode or rec your data
the security of Android phones is not good.
8.

1. First, open the Tencent mobile phone manager and click the personal center button in the upper right corner, as shown in the figure

9. First, enter the mobile phone dial page, and enter the corresponding string: Huawei: * \\\\\\\\\\\\\\statistics "

view the usage of mobile app, It can be sorted by "usage time", "startup times", "application name", etc

of course, you can also click other options to see the corresponding information, such as the WiFi connected to the mobile phone, the account information of the mobile phone, etc&# 39;
10. Set your mobile phone to a visitor mode, so that you are not afraid of lending your mobile phone to others,!
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750