Joke Collection Website - Blessing messages - Log on to the SMS platform of Haian Parent School.
Log on to the SMS platform of Haian Parent School.
Guangyuan safety education platform login, Guangyuan school safety education platform website login entrance.
First, the entrance to the website of Guangyuan School Safety Education Platform.
Primary and middle school students or their parents in Guangyuan City will log in directly with the user name and password (the initial password is generally 123456) assigned by the class teacher after entering the school safety education platform (/). After logging in, you can change your password. Please use a familiar and unforgettable password. Parents are invited to study safety knowledge with their children at home and complete safety education.
Click to enter the entrance of official website, Guangyuan School Safety Education Platform.
Two, Guangyuan city school safety education platform login frequently asked questions.
1 Every time you log in, you will be prompted that the account password is wrong. How to get it back?
A: There are two ways: (1) Parents pay attention to the official WeChat account "Education for All" on the mobile phone WeChat, look up the account and password in the official WeChat account, and find the correct account and password by themselves. (2) Contact the class teacher, and the class teacher logs on the platform with his own account to enter account management-check the student account, find the student, check the student account and help reset the password 123456.
2 How to modify the account password?
A: Use the initial account password to enter the platform, click My Information on the homepage of the platform, and you can modify your account password after entering.
What should I do if the name in my personal data is wrong and I can't modify it myself?
Answer: contact the class teacher or school administrator to help modify it.
At the bottom of the login box on the home page, you can log in with qq, but clicking in prompts that you need to bind the platform account. Why?
A: After the platform account needs to be bound with qq number, you can log in directly with qq instead of account next time.
Five students have transferred to another school. How to update the school, grade and class information in the materials?
A: The schools of transfer students will be deleted. Just contact the current class teacher to add an account for the students, and the information in the account will be automatically updated after logging in.
6 Why can't I find my own school in the school column when I retrieve my account password from the official WeChat account?
Answer: You may have chosen the wrong district or county. Please select "directly under the city" or other districts and counties to find out whether there is a school.
7 The account and password retrieved from WeChat can be logged in on the computer. Why does the mobile phone always prompt that the account and password don't match when logging in?
Answer: In the case of mobile phone login, it is best to switch the mobile phone input method to English to enter letters and numbers, and there can be no spaces or other symbols in the middle of the account.
8 We have paid attention to the official account of WeChat WeChat on WeChat. How to retrieve the student's account and password?
Answer: After entering the official WeChat account, click Security Education-Find the account password, fill in and submit the information according to the prompts, and the system will automatically query the account password and display it.
9 What should I do if I look up the account password on WeChat and prompt "The account has not been opened, please contact the class teacher"?
A: If this prompt is given, it means that the system really can't find the matching account information according to the information submitted by the students.
There are three possibilities: 1. The student account has not been opened yet. 2. The account has been opened and deleted by mistake. 3. When checking the account number and password on WeChat, some information was filled in incorrectly.
You can contact the class teacher to help verify and add an account.
10 Where can I switch accounts after WeChat finishes homework?
Answer: When you need to switch accounts, you need to find the "Exit" button on the page, exit the current account, and enter another account to log in.
For example, you can return to the main interface of WeChat and enter the skills center-click the arrow on the right of your profile and click Exit to log in.
1 1 The student's account number has been issued by the school. Where can I find my parents' account number?
A: Parents don't have hukou. Parents can use students' accounts to log on to the platform and lead students to learn.
12 needs an account to access the platform. Can I register my own account? Didn't see the registration place?
A: Generally, schools will issue accounts after the start of school, and they don't need to register themselves. If you don't have an account password, you can contact the class teacher for consultation.
13 students change classes in the middle of the semester. How to modify the class information in the materials?
Answer: Student information cannot be modified by itself. You can contact the school to adjust students' grades and classes.
Three, the accumulation of safety education knowledge in primary and secondary schools
Preventive measures for network security of primary and middle school students
How to prevent mailbox security
1. Don't check emails from unknown sources.
Some e-mails on the Internet now contain mail bombs or viruses. These two dangerous emails may reveal personal privacy and may affect the computer!
Precautionary measures: It is best to directly delete emails of unknown origin.
2. Don't run email attachments easily.
Don't easily open attachments in emails, especially some programs that can be run directly. Always be vigilant and don't publish your private email address easily.
Matters needing attention: apply for a forwarding mailbox at the forwarding station, use email client software (such as FoxMail and Outlook) to receive emails, and at the same time limit the size of emails through software to filter spam; Install a powerful anti-virus software, and email attachments should be scanned with anti-virus software before use.
3. Set a secure email password.
If your email password is too simple, your email password will be easily guessed in the face of some powerful explosion cracking software. If the password is secure enough, the probability of guessing is almost zero.
Specific setting method: don't use numbers or letters that are too obviously related to yourself as passwords, such as birthday, ID card, English name, etc. Passwords should be as irregular as possible; Remember to exit safely according to the website interface prompt after using the mailbox; Never use the functions of automatic login and automatic saving of user name and password; If you need to store important personal information in your mailbox, don't store it in plain text.
Note: Although some of the above methods may be inconvenient to use, what's wrong with being safer?
4. Install a powerful security tool.
If you use the mail tool to receive mail locally, you must install a powerful security tool. At present, general anti-virus software has email scanning function, but the functions are different, so it is essential to install a powerful tool.
How to make the blog safe?
In the Internet age, blog, as the representative of Web2.0, has attracted more people's attention. Stars also want blogs to be a platform for direct face-to-face communication with fans. Recently, however, the password of celebrity blogs has been stolen frequently. In fact, there are several common ways to crack passwords:
1, the password setting is too simple, and it was cracked by hackers.
2. Trojan virus was infected in the computer, and the password was memorized after the keyboard was monitored.
3. Use some special software to crack the login name.
4. Illegally obtaining user passwords through network monitoring.
5. People around you reveal their passwords.
The password of Han Han's blog is cracked by hackers, which can be prevented from the following aspects.
1. Don't use numbers or letters that are too obvious to you as passwords, such as birthday, ID number, phone number (mobile phone number) and English name.
2. Don't set the password too simply. The password should be longer than 8 digits, and the method of "number+letter+symbol" should be adopted. Such as: 123china@
Note: If the password is copied too much and easily forgotten, you can find a notebook to write it down and keep it properly.
3. When entering the password, the order is wrong. For example, if the password is 12345678, you can enter 5678 first and then 1234, so that hackers can only get the wrong password.
Note: This method has the latest news, and the hacker has solved this problem. Please don't use it many times.
4. First enter the password or user name in word or Notepad, and then use shortcut keys (ctrl+c and ctrl+v) to copy and paste.
Note: Remember to delete the text in Word or Notepad in time after pasting.
5. Prevent the computer from being infected with Trojans, and don't download and install software of unknown origin. Don't open emails of unknown origin.
Note: A powerful Trojan scanning and cleaning tool and antivirus software need to be installed here.
6. Use security tools to scan your computer regularly to minimize the chance of virus infection.
How to retrieve the stolen blog password?
1. Now most blogs have password retrieval function. You can get your password back by filling in the password prompt questions and answers you filled in when you registered.
2. Contact the website provided by the blog directly, or you can retrieve the password through normal channels.
Security Precautions for Chat Tools
QQ and MSN Messenger are indispensable chat tools for surfing the Internet now, and it is also a way for personal privacy to be easily leaked. The specific network security channel has a good topic "MSN information security attack and defense actual combat" and "Creating a new QQ security practical manual". If you read it carefully, it will help you to use chat tools.
Protection of network privacy
Personal privacy includes many aspects. Here, the secret network security channel only talks about the Internet.
1, clear your online record.
The URL of the visited website will be left in the address bar of IE browser. If you don't want people to know, you can clear it by the following methods:.
Open IE's Tools menu and click Internet Options to open the Internet Options Settings dialog box. Click "Clear History" with the mouse, and then click "OK" button. If you look at IE's address bar again, you will find that there are "options" in the address bar. Click the "Auto-Complete" button under the "Contents" tab. In the pop-up "Auto-Complete Settings" dialog box, click "Form", "User name and password on the form" and "Prompt me to save the password", and then click ".
Note: If you want to leave the content of future employment without historical records, please remove the box in front of "Form".
How to prevent hacker attacks
Nowadays, network hackers are rampant and hacking tools can be seen everywhere. They can carry out malicious attacks on computers on the Internet. Therefore, you must pay attention to safety precautions when surfing the Internet, which can protect your privacy most effectively.
1, don't mess with the software.
Don't download software online, especially some software of unknown origin, and don't browse some unsafe personal or unhealthy websites. Don't click on the network link sent by others without confirmation. Probably a website for fishing.
Relatively speaking, you can go to some big stations to download the required software, such as Tianji, Sina and other download stations.
2. Attacks on malicious web pages
Malicious web pages have become one of the biggest threats today. To avoid the attack of malicious web pages, it is only necessary to prohibit the operation of these malicious codes.
Click Tools -Internet Options-Security-Custom Level in IE browser, define the security level as Security Level-High, set items 2 and 3 in ActiveX controls and plug-ins as disabled, set other items as prompts, and then click OK. After this setting, when you browse the web with IE, you can effectively avoid malicious code attacks in most malicious web pages.
3, stop the Trojan horse plan
Don't download and run programs that others give you, because some programs may be Trojan horses. If you install these programs, they will change your system or connect to remote servers without your knowledge. In this way, hackers can easily access your computer.
4. Set a strong password
As mentioned above, setting a good password is of great help to your security, so it is best not to have your own birthday, phone number or some simple character combinations, because others may crack and invade through exhaustive methods. When setting up the computer, you must use a combination of uppercase and lowercase letters, special symbols and numbers to ensure that the password is longer than eight digits, and change the password at regular intervals.
5. Don't use the camera easily.
There are many incidents of revealing personal privacy through cameras. After a hacker invades a computer, you can easily turn on your camera, so unplugging the cable from the computer, or aiming at the wall and covering the camera with a piece of cloth are all good preventive measures.
6. Guard against spyware
Spyware is attached to shared files, executable images and all kinds of free software, and sneaked into the user's system without the user's knowledge. Spyware can track online habits, record keyboard operations, capture and transmit screen images. If spyware enters the Windows system, it will often become a dangerous tool in the hands of criminals.
To remove spyware:
Scan your computer comprehensively with antivirus software. Some antivirus software will find and delete spyware. However, anti-virus software may not find spyware when monitoring your computer in real time. Set antivirus software to scan your computer regularly.
Run legitimate products specifically designed to remove spyware. Many vendors offer products that can scan your computer to find and remove spyware. Popular products include Lavasoft's Ad-Aware, Webroot's SpySweeper, PestPatrol and Spybot Search and Destroy.
You should make sure that your anti-virus software and anti-spyware software are compatible. Install this software in stages to ensure that it will not accidentally bring problems to the computer.
How to protect the security of mobile phones
If the mobile phone is lost in He Jie, if it is not handled properly, not only the number information in the mobile phone will be stolen, but also some other cheating incidents may occur. Therefore, as the most important communication tool for modern people, it is very important to prevent theft, virus and loss.
Now, with the rich functions of mobile phones and the vigorous development of smart phones, there are more and more security risks involved in mobile phones.
Mobile phone virus
Mobile phone virus is an important way to lead to mobile phone privacy leakage. If the mobile phone is poisoned, not only the content of the call is unsafe, but also the private data stored in the mobile phone is unsafe. Now that the mobile phone operating system is gradually standardized, it is easier for hackers to find loopholes. Through system vulnerabilities, they can attack the mobile phone that is surfing the Internet, thus stealing all the information in the mobile phone.
The first thing to do in mobile phone antivirus is to download software and other information from the internet as little as possible, and pay attention to monitoring the abnormal situation of mobile phones at any time in order to find the virus in time.
Here are two ways to prevent mobile phone viruses:
1, the caller ID of mobile phone is garbled. When a call is dialed in, the phone usually displays the incoming number. If it displays other words or strange symbols, it may be attacked by viruses. If this happens, the user should not answer or turn off the phone immediately. If you answer an incoming call, you will get a virus, and all the settings in the machine may be destroyed.
2. Don't check the text messages sent by strange numbers. If your phone receives some abnormal numbers, don't open garbled text messages. If you read the poisoned message, the keyboard of the mobile phone may be locked, and even the IC card may be destroyed. Therefore, please don't open the short messages sent by strangers easily and delete them in time. At the same time, you should turn off the phone as soon as possible, take out the SIM card and insert another phone (preferably a different brand). After deleting the suspicious SMS, insert the card back into the original mobile phone. If it still can't be used, you should contact the mobile phone service provider as soon as possible to disinfect the mobile phone through the wireless website or through the IC access port or infrared transmission interface of the mobile phone.
3, Bluetooth mobile phone leaks privacy
The British BBC TV station ran a program aimed at the mobile phone leak caused by Bluetooth technology defects. In the program, hackers randomly attack mobile phones from the streets of London. Results Among the 192 mobile phones contacted, 54 returned the internal data of the mobile phones without the owner's confirmation. Fortunately, information theft only happens when Bluetooth is not encrypted, and the transmission distance of Bluetooth is relatively close, so stealing is easier to be found. So don't worry too much about being stolen. As long as the encryption is done well, the security of data transmitted by Bluetooth is still guaranteed.
Anti-virus method of Bluetooth mobile phone
1. Be especially careful when transmitting files via Bluetooth to avoid receiving virus files.
2. How to turn it off without using the Bluetooth function?
3. If you receive a message from an unknown source, do not open it and delete it directly.
4. Don't install mobile phone programs of unknown origin at will.
5. Download ringtones and mobile games, please go to legal official website.
6. If you are accidentally poisoned, please immediately delete the virus application and reinstall the infected application.
4. I lost my mobile phone
The loss of mobile phones may expose some personal privacy stored in mobile phones, especially some mobile phones, so it is very important to protect the information in mobile phones. First of all, you should use the security function of the mobile phone, lock the keyboard of the mobile phone and install powerful security protection tools. Here, I recommend a good mobile phone security software "Netqin Anti-Theft Guard".
How should I set the password?
The secret network security channel has talked about how to set the password several times. Here as a key point, explain and introduce ten aspects that must be paid attention to when setting passwords.
1. Password length should not be less than 8 digits. Use a set of uppercase and lowercase letters, symbols and numbers.
2, don't use any words, birthdays, numbers, mobile phone numbers as passwords, this is too easy to crack.
3. Don't start with a relatively small order of letters or numbers, such as A, B and C, because the program of dictionary brute force cracking generally starts with the order of numbers or English letters.
4. Install reliable antivirus software. If you have a Trojan horse in your computer, no matter how complicated the password is, it won't have any effect.
5. Change your password regularly, such as the first Friday of every month, so you don't have to reconsider. Just change the order of the passwords. It's easy to remember.
6. Don't use passwords everywhere. Set passwords according to the principles of importance and unimportant.
7. Use abbreviations of phrases that you can remember, including numbers and symbols.
8. Don't give your login name and password to others easily. If it is provided to others for special reasons, please change the password in time after the other party uses it.
9. Please don't use repeated or continuous numbers and letters as passwords.
10. Please do not use some login user names as your password.
Encrypt your personal data.
To encrypt personal data, we can use the encryption function that comes with Windows or some professional encryption software.
1. Encrypt files with EFS.
(1) In the folder to be encrypted, select Properties, then click the General tab in the pop-up window, and then click Properties → Advanced at the bottom. In the Compression or Encryption Properties column, select Encrypt content to protect data.
(2) Click "OK" to return to the file attributes and click "Apply" to open the window of "Confirm attribute change", check "Apply this to this folder, subfolder and file", and finally click "OK" to start encrypting the file. In this way, all original and new files and subfolders in this folder will be automatically encrypted.
- Previous article:136 received the short message from 130.
- Next article:Can I still turn off the phone?
- Related articles
- How about Zhong Hengxin's real estate lawyer?
- I dreamed that my message was not received by the other party.
- How to retrieve the SMS deleted by iphone?
- Please give at least 20 blessing messages suitable for sending to customers in spring ~ ~ ~ ~ More than 1 message, more than 1 minute ~ ~
- Where is the most effective way to complain about pornography?
- What is the daily transfer limit of Shanghai Pudong Development Bank?
- How can COVID-19 patients integrate into normal life?
- What if the mobile phone is stolen and deleted?
- What does Hengyi loans overdue China Construction Bank mean by sending short messages?
- There is something wrong with the mobile phone card, so it is impossible to communicate by SMS. This is my identity.