在糟糕的过去,在每个人的口袋里都没有一台小型超级计算机之前,许多人上网的唯一途径就是通过网吧(internet cafe)。你会出现,支付几美元,然后在一段时间(set amount)内为自己买一台电脑。
如今,在西方世界,使用公共计算机的情况相对较少。无论如何,在某个时候,您很有可能会被置于需要使用公共计算机的位置。也许您的手机已死或被盗?也许您在另一个国家,没有覆盖或 WiFi 接入(coverage or WiFi access)?在这一点上,酒店或(hotel or internet)网吧的电脑可能看起来像是救命稻草。
您可能不知道的是,公共计算机会带来重大的隐私风险(privacy risk)。那么当时机成熟时,您如何才能将使用这些看似无害的机器的危险降到最低呢?
为什么公共计算机存在风险?
首先(First),让我们澄清一下这些计算机带来的确切风险。公共计算机的主要问题是,它们是公共(public)的。使用您自己的个人设备,您可以依靠密码、密码和强大的磁盘加密来防止其他人获取您的敏感信息。
使用公共计算机,您在机器上留下的任何信息都在等待下一个用户随意处理。这是一个真正的问题,因为使用现代计算,您会像数字头皮屑一样左右留下信息。通常是在不知不觉中。
这些机器的另一个主要风险来自在您坐下之前使用过它的人。(before)不仅仅是因为典型的公共鼠标和键盘(mouse and keyboard)是一种生物危害,尽管这是另一个问题,但因为它们可能会给你留下各种令人讨厌的惊喜。
这些惊喜旨在以各种方式从您那里获取信息。这意味着你真的应该只在紧急情况下才使用公共计算机作为最后的手段。
检查任何可疑的东西
您应该做的第一件事是检查是否有任何可疑(anything suspicious)的东西插入机器。一个常见的项目是USB 键盘记录(USB keylogger)设备。
这是一个位于键盘和计算机之间的(keyboard and computer)USB 设备(USB device),它记录在该机器上的每一次击键。记录器的所有者稍后会回来转储其日志。然后它将搜索电子邮件地址、密码和信用卡(credit card)号。
如果你看到任何你不认识(t recognize)的奇怪东西插入计算机,最好去别处。
浏览器隐私模式是您的(Browser Privacy Modes Are Your)朋友
如果您要使用计算机上的浏览器浏览网页,那么您绝对应该将其切换到隐私模式。例如,在Google Chrome中,这称为隐身(incognito)模式。
当您从私人窗口(Window)浏览网页时,浏览器不会(browser doesn)永久记录您的任何信息。(t record)当您关闭窗口时,您的所有浏览历史记录(browsing history)、密码、登录名和其他类似信息都会消失。
不过,隐私(Privacy)模式不会对代理服务器或 ISP(server or ISP)隐藏任何内容(t hide anything)。所以不要访问被禁止的网站。如果您想在公共计算机上隐藏您的互联网活动(internet activity),您需要使用VPN,也许还需要使用Tor 浏览器(Tor browser)。但是,这是一个略有不同的讨论。
便携式应用程序和实时操作系统(Portable Apps & Live Operating Systems)
虽然在公共浏览器上使用隐私模式(privacy mode)是一个很好的常识,但最好完全避免使用该计算机上的任何软件。更好的是,您可以避免完全使用操作系统(operating system)!
这个难题的第一部分以便携式应用程序的形式出现。这些是不需要安装(t require installation)的特殊应用程序,它们是独立的,可以从任何媒体运行。因此,您可以在闪存驱动器(drive and plug)上加载便携式应用程序并将其插入公共机器。
其中首先应该是一个便携式防病毒包(antivirus package)。您可能还想添加便携式浏览器和便携式办公套件(office suite)。
当谈到跳过公共机器的操作系统时,您可以使用便携式虚拟机软件,运行(machine software)类似 Linux的干净操作系统映像(OS image)。这具有不需要重新启动的优点。
如果允许,您还可以从闪存驱动器或光盘启动实时操作系统。(boot a live operating system)确保您的任何个人信息都不会触及公共机器的永久存储!
清理自己之后
当然,使用便携式应用程序和实时操作系统需要一些远见。你需要准备一个闪存驱动器,把它扔进你的包里,然后希望你永远不需要使用它。如果您最终不得不在没有适当保护的情况下使用其中一台计算机,那么您需要在事后进行一些去污工作。(decontamination work)
您应该确保您的整个浏览历史记录(browsing history)和所有浏览数据都已被删除。您可能还想在机器上运行可用空间文件粉碎机(space file shredder),以确保无法恢复已删除的信息。同样(Likewise),请确保您没有在计算机的回收站(recycle bin)中留下任何东西。
如果您必须从该公共计算机登录任何服务,最好在第一时间更改您的密码。如果您还没有双重身份验证,您还应该确保为每个相关服务打开它。
一点预防(Prevention Is Better Than)胜于(Byte)治疗(Cure)_ _ _(Gig) _
如此关心公共计算机的安全(computer safety)似乎有点过头了。然而,在网络犯罪、身份盗窃(identity theft)和更糟糕的情况下,采取这几个步骤可能是让您远离严酷的互联网犯罪(internet crime)世界的关键。
因此,今天就准备好紧急闪存驱动器,(drive today)并确保当您已经处理了足够多的问题时,您永远不会被抓到。
How To Use a Public Computer Safely
In thе bad old days, before еveryone had a small supercomputer in their poсkets, the only way for many people to get internet access was thrоugh an internet cafe. You’d show up, pay a few dollars and then get a computer all to yourself fоr a set amount of time.
These days, the use of public computers is relatively rare in the Western world. Regardless, there’s a good chance that, at some point, you’ll be put in a position where you need to use a public computer. Maybe your phone is dead or stolen? Maybe you are in another country and have no coverage or WiFi access? At this point that hotel or internet cafe computer might look like a lifesaver.
What you might not know is that public computers pose a significant privacy risk. So when the time comes, how can you minimize the dangers of using these innocuous-looking machines?
Why Are Public Computers a Risk?
First off, let’s clarify the exact risk these computers pose. The main problem with public computers is, well, they’re public. With your own personal devices you can count on pass codes, passwords and strong disk encryption to prevent anyone else from getting your sensitive information.
With a public computer whatever information you leave on the machine is waiting for the next user to do with as they please. That’s a real problem because with modern computing you’re leaving information left and right like digital dandruff. Usually without knowing it.
The other main risk of these machines comes from people who have used it before you sat down. Not just because the typical public mouse and keyboard is a bio-hazard, although that’s another issue, but because they could have left all sorts of nasty surprises for you.
These surprises are aimed at skimming information from you in a variety of ways. Which means you should really only use public computers as a last resort if its an emergency.
Check For Anything Suspicious
The first thing you should do is check whether there’s anything suspicious plugged into the machine. One common item is a USB keylogger device.
This is a USB device that sits between the keyboard and computer, and records every single keystroke made on that machine. The owner of the logger will come back at some later time to dump its logs. It will then search for email addresses, passwords and credit card numbers.
If you see anything weird plugged into the computer that you don’t recognize, it’s best to go elsewhere.
Browser Privacy Modes Are Your Friends
If you’re going to be browsing the web using the browser found on the computer, then you should definitely switch it to privacy mode. For example, in Google Chrome this is called incognito mode.
When you browse the web from a private Window, the browser doesn’t record any of your information permanently. When you close the window, all your browsing history, passwords, logins and other similar information will disappear.
Privacy mode doesn’t hide anything from the proxy server or ISP though. So don’t visit prohibited sites. If you want to hide your internet activity on a public computer you’ll need to use a VPN and perhaps also the Tor browser. However, that’s a slightly different discussion.
Portable Apps & Live Operating Systems
While using privacy mode on public browsers is a good piece of common sense in a pinch, it’s better to avoid using any of the software on that computer at all. Even better, you can avoid using the operating system in its entirety!
The first part of this puzzle comes in the form of portable apps. These are special applications that don’t require installation, are self-contained and run from any media. So you can load up portable applications on a flash drive and plug it into the public machine.
First among these should be a portable antivirus package. You may also want to add a portable browser and portable office suite.
When it comes to skipping out on the public machine’s operating system, you can use portable virtual machine software, running a clean OS image of something like Linux. This has the advantage of not requiring a reboot.
If you are allowed to, you can also boot a live operating system from a flash drive or optical disc. Ensuring that none of your personal information ever touches the public machine’s permanent storage at all!
Clean Up After Yourself
Of course, using portable apps and live operating systems requires some forethought. You need to prep a flash drive, throw it in your bag and then hope you never need to use it. If you do end up in a situation where you had no choice but to use one of these computers without proper protection, you need to do some decontamination work afterwards.
You should make sure your entire browsing history and all browsing data has been removed. You might also want to run a free space file shredder on the machine to make sure your deleted information cannot be recovered. Likewise, make sure you didn’t leave anything in the computer’s recycle bin.
If you had to log into any services from that public computer, it’s a good idea to change your passwords at the first opportunity. If you didn’t already have two-factor authentication, you should also ensure it’s switched on for every service in question.
A Byte Of Prevention Is Better Than a Gig Of Cure
It might seem a little overblown to care this much about public computer safety. However, in a world of cybercrimes, identity theft and worse, taking just these few steps can be the key to keeping you safe from the harsh world of internet crime.
So prep that emergency flash drive today and make sure you’re never caught out when you’re already dealing with enough problems.