Security Best Practices
Basic Security Principles
1. Protect Your Magic Link
Your Magic Link is the key to your system:
- โ Store in a secure place: Password manager or encrypted notes
- โ Donโt share: Unless with absolutely trusted individuals
- โ Regularly check login history: View recent login activity in Admin Panel
- โ Donโt screenshot and share: Screenshots may contain the complete Magic Link
- โ Donโt post in public places: Forums, GitHub, social media
2. AI Partner Permission Management
| Partner | Permission Level | Usage Recommendations |
|---|---|---|
| Rose | Host Root | Only use when system administration is needed |
| Ada | Container only | Suitable for external interactions, business processes |
| Vi | Container only | Suitable for testing, queries, non-critical tasks |
Why This Matters
Rose can:
- Delete all data
- Modify system settings
- Access other containers
Recommendations:
- Use Ada or Vi for daily conversations
- Only use Rose when system operations are needed
- When giving Rose commands, first confirm you understand the impact
Data Protection
Backup Strategy
Recommended backup frequency:
โโ Daily: Important business data
โโ Weekly: Full system backup
โโ Monthly: Offline backup (download to local)
How to Backup
-
Use Admin Panelโs Export Data
- Includes all container configurations and data
- One-click download, simple operation
-
Regularly download important files
- Through Admin Panelโs file management
- Or use SFTP (if configured)
-
Version control
- Put important code configurations in GitHub/GitLab
- Donโt rely solely on a single copy on the VPS
Sensitive Data Handling
โ Donโt let AI partners handle:
- Credit card numbers
- Bank account passwords
- ID numbers (unless encrypted)
- Customer personal privacy data
โ Can let AI partners handle:
- Business process automation
- Public data analysis and organization
- General customer service inquiries
- System maintenance commands
Connection Security
Use Strong Passwords
If you have configured SSH or other direct access:
- Use passwords of at least 16 characters
- Mix uppercase, lowercase, numbers, and symbols
- Use password manager to generate and store
- Enable SSH Key authentication (more secure than passwords)
Network Environment
- โ Use trusted networks: Avoid public Wi-Fi when accessing Admin Panel
- โ Check HTTPS: Ensure the address bar shows ๐ lock icon
- โ Regularly update browser: Keep latest security patches
Monitoring and Alerts
Regular Check Items
| Item | Frequency | Check Method |
|---|---|---|
| Login history | Weekly | Admin Panel โ System Logs |
| Resource usage | Daily | Admin Panel System Bar |
| Backup status | Weekly | Confirm last backup time |
| Container updates | Monthly | Check for new versions |
Warning Signs
If you notice the following, there may be a security issue:
- โ ๏ธ Unknown login records
- โ ๏ธ Abnormal container resource spikes (possible mining malware)
- โ ๏ธ Unfamiliar processes running
- โ ๏ธ Files modified or deleted
When anomalies are detected:
- Immediately stop using the affected container
- Contact RealVco support
- Check recent backups
- Re-deploy if necessary
Advanced Security Recommendations
Enable Two-Factor Authentication (if available)
If RealVco supports it in the future:
- Link phone number
- Use Authenticator App
- Hardware security keys
Network Segmentation
If business scale is larger:
- Use dedicated network segments
- Limit AI partner network access scope
- Set stricter firewall rules
Log Auditing
Regularly review:
- AI partner command execution logs
- File access logs
- Network connection logs
Emergency Response
If You Suspect Intrusion
-
Immediately disconnect
- Clear browser data
- Donโt click any suspicious links
-
Contact support
- Provide time and details of anomaly discovery
- Support will assist with investigation and handling
-
Check backups
- Confirm recent clean backup
- Prepare for restore (if needed)
-
Re-deploy (last resort)
- Will generate a new Magic Token
- All old tokens immediately become invalid
Security is an Ongoing Process
There is no absolute security, only continuous vigilance. Develop good habits:
- ๐ Regular updates: Keep systems and tools up to date
- ๐ Regular backups: Ensure data has redundancy
- ๐ Stay vigilant: Watch for warning signs
- ๐ Continuous learning: Stay informed about latest security threats
Contact RealVco support team anytime when assistance is needed.