Sharing network bandwidth is one of the consensus advocating programs to save resources and has significantly increased and grouped into many networking communities. However, those good intentions of sharing the network bandwidth might attract the attention of intelligentsia and hackers to access personal or enterprise's confidential information. Because most of the versatile digital networking equipments can share the outside file service without starting the computer, thus personal resources will be utilized without any notice or advanced permission. Moreover, the innovation of network phishing, intelligent criminal and cracker's attacking has dramatically induced and increased the occurrence of information security, social security, national security, and international networking community security problems day by day. Those attacking have forced the supervisors and administrators of the information management of Government, enterprises, and research institutes to face the unpredicted information security problem and try to rescue from the disaster by fixing the leakage of information security. Thus, beware of personal networking behavior and increase the robustness of firewall or anti-virus system is insufficient passive validating methods. In order to provide more convenient utilization of networking and achieve the goals of resources sharing and protecting private information simultaneously, positive defense and protection strategy such as the development of network's security checking criteria, anti-sniffing software and encrypting software is a must. Thus, the shortcoming and leakage of information security issue can be remedied and rescued in time to reduce the risk of being attacking and decrease the cost of loss.