找回密码
 立即注册
查看: 128|回复: 0
打印 上一主题 下一主题

Many crooks are not necessarily because of how clever tricks to succeed

[复制链接]

12

主题

12

帖子

88

积分

注册会员

Rank: 2

积分
88
跳转到指定楼层
楼主
发表于 2015-5-9 04:53:19 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
Many crooks are not necessarily because of how clever tricks to succeed, but to use the dark side of people's minds,chaussure nike pas cher femme, such as the recently seen on the phone card copying scam, if you do not move crooked mind, how would fall for it? Two weeks ago, a friend of the author's Wang received such a message "professional phone SIM card remote cloning, eavesdropping other calls, intercept each other text messages, snoop trade secrets and master lover whereabouts necessary. Tel ×××". This message lets Wang bangs, thought I finally hit a handsome and successful career of her boyfriend, but recently he suddenly become somewhat ambiguous, Wang and the other trying to get a phone and told her boyfriend phone number. Unexpectedly, the other with her boyfriend phone number quickly called the phone, Wang immediately dispelled all doubts, to remit 1,000 yuan,http://www.xinhelan.com/home.php?mod=spacecp&ac=blog&blogid=, waiting for the other sent a copy of the SIM card. Waited a week I have not received phone cards,air max femme pas cher, Wang felt bad, and quickly with each other on the phone, but found that the phone has been shut down. That Wang suddenly realized that his fooled,https://fis.encs.concordia.ca/helpdesk-cgi/quota.cgi, and the encounter told reporters.
?
I tried to phone a few said remote copy phone card people,http://cbb.fcsswj.com/home.php?mod=space&uid=16205, Wang said the case of the discovery of the same. As we all know, the mobile phone SIM card to save the user information, the network identification,air jordan pas cher, account payments thanks to it, its role comparable to the phone's "identity" and "debit card", if no card copy SIM card can only get consumer rights protection, communications security is non-existent,http://www.ipakorea.com/home.php?mod=space&uid=1381, the phone would not become a time bomb?
?
Well, the Internet and text messaging unknown SIM card copy boast is that true? SMS can intercept calls? With this question, I have conducted some research.
?
April 14, I went to Beijing Xizhimen South Street, where the traditional "telecommunications services Street" in the telecommunications business, a lot of mobile phone sales maintenance shop. I pretend to need to "copy the SIM card" asking each customer. However, whether it is hanging Telecom, China Mobile,air jordan pas cher femme, China Unicom logo regular business offices, service department, or greater than second-hand mobile phone shop signs facade, personal maintenance, staff have indicated that not remotely copy SIM card.
?
April 15, I went to the so-called "China's Silicon Valley" Zhongguancun. Hailong, Ding Hao Electronics Mall and other famous mobile phone counter, maintenance shop, the staff also said SIM card remote replication impossible.
?
Mobile phone SIM card remote replication in the market does not exist. Well, technically feasible? I consulted the relevant authorities.
?
Technical director of a well-known mobile antivirus vendors Lo told the author, "Remote Copy" can not be achieved technically. A computer communications professional colleges and universities,air max outlet milano, Professor Yang also expressed the same view. Professor Young said that as encryption technology, "That is not the original SIM card remote replication" can not be achieved. I also consulted with professionals in the field of mobile communications, they told the author, and bank cards,http://portal.dl.saga-u.ac.jp, each card has a separate SIM card number, the equivalent of SIM card ID. At the same time, each card has a separate password, stored in a SIM card unreadable area, with high security, cloning may not exist. In the network can send a signal to a phone card, you can hear each other talk and see each other mobile content going.
?
Since there is no "remote cloning" possible, why Wang to receive each other with their mobile phone number a call from her boyfriend do?
?
A removed from the mobile phone industry for many years, "insiders" to the author bare inside story - the original, although it is not "no card copying" but liars can be obtained by hackers on Internet telephony software installation software, Internet telephony Main and caller ID into any cell phone number and then call out, resulting in the SIM card phone number to be copied illusion. According to his understanding, and many people cheated. Search for "Internet phone" on the Internet and found a lot of software to provide "any significant number" function. Obviously, a liar is the use of this hacker software to simulate user's phone number,http://community.creativemediaacademy.net/viewtopic.php?pid=306183#p306183, even by simulating public security organs, courts, banks and other national governments, the number of financial institutions fraud.
?
Thus,http://bbs.zhiyoo.com/home.php?mod=spacecp&ac=blog&blogid=, SIM card, remote replication is simply crooks take advantage of people's psychological privacy sniffing designed lie,http://www.51yam.com/home.php?mod=spacecp&ac=blog&blogid=, do not be taken seriously.
?(Edit: SN026)
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

j關於我們
尚未設置

Archiver|手机版|小黑屋|一起主機網  

Copyright 2013 最新最精彩-社区论坛 版权所有 All Rights Reserved.

Powered by Discuz! X3.1

© 2001-2013 Comsenz Inc.

快速回复 返回顶部 返回列表