We continue on the prevention of information leakage Technical precautions against network leakage: First, identity authentication. The identification of the user by the computer is mainly to check the password input by the user. The use of the resource information by the legitimate user in the network also has the problem of using the right, so the use of the password must be strictly managed. Of course, there are other methods for identifying the user, such as using magnetic cards, fingerprints, sounds, retina images, etc. to authenticate the user. The second is to monitor the alarm. A detailed record of the working conditions of legitimate users in the network, the number of attempts and time for illegal users to enter the network. The telephone number and the like are recorded and an alarm is issued to trace the whereabouts of the illegal user. The third is encryption. The information is encrypted and stored in the computer with a special call password. In this way, after t