Hello to all dear people of steemit
today a lot of hackers born at internet
Those are just the big ones that get reported in the news. Millions take place every year that are not reported. Despite that, the public is suffering from "security breach fatigue." No one seems to care anymore. As the public becomes "dulled" to the importance of these breaches, they are more likely to ignore some basic measures to protect their systems.
i write some steps for have a safe computer
(((( i promise you dont read some steps in last so please read ))))
Never, Ever Click on a Suspicious Link
I hope this is superfluous information, but NEVER click on a link sent to you in an email. I don't care if it came from what appears to be trusted source, such as your bank or friend, NEVER click on a link in your email. It is so easy for me to embed malware in that innocuous looking link that it is child's play.
In addition, if I hack your friends email account because they had a weak password, I can then send you emails from his/her account with malicious links that will give me control of your computer.
Once I have control of your computer, I can steal whatever info is on your computer including your passwords to other accounts (bank, brokerage, other email accounts), social security number, and your identity. Then, I can sell each of those on the black market.
Do Not Use Adobe Flash
Adobe's Flash Player is on nearly every computer and even Android devices that install it manually. It enables us to run those interesting Russian dashcam videos as well YouTube, animations, etc. Without it, when you go a website with video or animations, you get that ominous looking message that you need to install Flash Player and a blank screen.
A few years back, Apple and Steve Jobs made a controversial decision to ban Flash player from their iOS. It has been reported that Jobs made this decision out of vindictiveness toward some personalities at Adobe. Instead, I suggest, that Jobs made this decision because Flash Player is such a poorly designed and coded piece of software that he wanted to protect his mobile operating system from it.
Flash Player is among my favorite pieces of code to hack. Nearly everyone has it and it is SO flawed. I know this is radical step, but if you really want to make certain that your system is "bullet" proof, remove Flash Player from your computer, tablet, and smartphone. Even with updates, new vulnerabilities come out daily for this "hackers best friend."
Use a Really Good Firewall
Although Microsoft ships a rudimentary firewall with its operating system, I strongly suggest that you install a third-party firewall for better protection.
There are many third-party software firewalls out there, some better than others, but I want to suggest Zone Alarm's Free Firewall. As the name says, it is free and very effective. Not only does it block outsiders from getting in, but it also stops malware from accessing resources on your computer and talking out (hackers need to control the malware, so the malware must be able to communicate OUT to be effective).
I'm hoping that those who are reading this will take this basic measures to protect your system and data and make it far more difficult for us hackers to exploit your system. Don't worry about us, we know that most people won't take these measures, leaving plenty of easy pickings for us.
Use two-factor authentication. Two-factor identification requires you to enter a code sent to you in a text message or another service to access your account after you enter your user name and password. This makes it more difficult for a hacker to access your information, even if they are able to crack your password.
Most major websites, including popular social media networks, have some form of two-factor authentication available. Check your account settings to learn how to enable this feature.
You can set up two-step verification for your Google account.
Popular app alternatives to receiving a text message include Google Authenticator and Microsoft Authenticator.
Make sure you're on an official website when entering passwords. Phishing scams – instances in which a malicious page pretends to be a login page for a social media or bank account – are one of the easiest ways for you to get hacked. One way to spot phishing scams is to look at the site's URL: if it closely resembles (but doesn't exactly match) a reputable site's URL (e.g., "Faecbook" instead of "Facebook"), it's a fake site. 
For example, enter your Twitter login information on Twitter's official page only. Avoid doing so on a page that asks for the login information in order to share an article or something similar.
An exception to this rule is when a university uses an existing service (e.g., Gmail) through their home page.
Browse using secure web apps. It may be tempting to use third-party browsers like Tor or Dolphin, but synchronizing your Google Chrome account or Safari account between your phone and your computer will both prevent the need to re-enter saved passwords and protect your device from unsafe websites.
Avoid jailbreaking (or rooting) your phone or side-loading apps. Both iPhones and Androids have security safeguards that can be bypassed by jailbreaking or rooting the respective devices, but doing so opens your phone up to attacks and infections that would have previously been impossible. Similarly, downloading apps from unverified sources ("side-loading" apps) greatly increases your risk of contracting malware.
Android phones have a built-in security suite that prevents you from downloading apps from unknown sources. If you do choose to disable this option (from the Security tab in Settings), you'll need to carefully verify websites from which you download apps before proceeding with the downloads.
Back up your data frequently. Despite even the strictest security, it's still possible that your data may become compromised. This may be the result of hacking, or simply computer failure. Backing up your data ensures you don't lose anything.
There are cloud-based services you can use to back up your data. Check the security of these services carefully before joining one. While you may be tempted to go with the least expensive service, you want to make sure your data will be kept safe.
You also can use an encrypted external hard drive to back up your data. Set up your computer to run automatic backups daily, at a time of day when you aren't normally on your computer.
Enable a firmware password. If your computer has the option available, require users to enter a password before rebooting from a disk or entering single-user mode. A hacker cannot get around a firmware password unless they have physical access to your machine, though you'll need to be extremely careful not to forget or lose the password since it is immensely difficult to reset. To create a firmware password:
Mac - Restart your Mac, then hold down ⌘ Command and R as it boots up. Click Utilities, click Firmware Password Utility, click Turn On Firmware Password, and create your password.
Windows - Restart your computer, then hold down the BIOS key (typically Esc, F1, F2, F8, F10, or Del) as your computer boots up. Use the arrow keys to select the password option, then enter your preferred password.
please upvote and resteem