找回密码
 立即注册
查看: 90|回复: 0
打印 上一主题 下一主题

Ez6v94eo7o

[复制链接]

5

主题

5

帖子

43

积分

新手上路

Rank: 1

积分
43
跳转到指定楼层
楼主
发表于 2014-11-20 02:32:22 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
After the traffic monitoring, computer open any web page, there is a corresponding record on the phone. May be freely distributed microblogging, deletion of personal data and information.
Subjects using a wireless router internet computers
Purpose of the experiment to verify whether scored router and steal computer data
Experimenters friends "Evi1m0",http://cowoco.net, the reporter
Chinese Commercial News reporter Rao Fangjing
Interns Du Wenying
"If the router was rub network, he would not threaten me? If the router is connected to a malicious stranger, what they do?" Recently, know this road almost online issue attracted 1833 people's attention.
March 16, netizen "Evi1m0" in the know how to capture almost next door broke the news online, "Goddess," the router, and black into the process of their computers,spaccio woolrich, phones. This "real" people are online sparked a discussion about router security issues.
Experiment a
?
Password will break?
Reporters contacted friends "Evi1m0", Liu Yanshuo, FF0000TeAm founder, currently works Beijing Information Technology Co., Ltd. Chong Yu know, he told reporters restore the entire process to break through QQ way dialogue and real screenshots.
"First of all look for the entrance, which is the other side of the Wi-Fi." After opening the wireless signal, with a cracking tools  a linux-based operating system, after the import password dictionary, began to crack. He told reporters that the threshold is very low crack the password,basket nike pas cher, and the password dictionary software from the Internet can be used to download to.
5 minutes later,piumini moncler, he successfully cracked the wireless password to connect to the other side of the router, the router after entering the WEB management interface to view all the devices connected to the network.
"He recorded the other landing sites, I can log in at the same time its every move,http://www.res99.com/nexres/search/power_search.cgi, all I could see." Liu Yanshuo told reporters, although they can not see each other's account, password, but he can hijack the account has been logged.
Results: cracked passwords, invade the router.
Experiment two
?
To see privacy?
According to Liu Yanshuo approach reporters with a brush after Android phones on a laptop computer were listening experiments,tn requin pas cher.
Reporters first preloaded with a hacking software for mobile phones and a laptop connected normal system on the same wireless network. After opening the hacker software on your phone, all devices connected to the wireless network are displayed on the phone.
Reporters select their laptop traffic monitoring. In the listening process, any page on a laptop open on the phone has a display. Select the display as "weibo" page after a session hijacking, without any account, password, the phone automatically log on to the web version of microblogging personal accounts, and can be freely distributed and deletion of personal information.
Liu Yanshuo said, "This is just a simple hijacking, terrible things in the back, along with listening deeply personal privacy will be one level of exposure."
Results: successfully boarded the other side of microblogging.
Consequence Analysis
?
TV can be controlled
?
Bank capital is not safe
In that "combat", the Liu Yanshuo through personalized domain address and access to information to be combined, not only by the goddess phone numbers, photos, microblogging, letter, QQ number, all network accounts, etc., but also through the already TV box connected to a wireless router to control each other's television.
In addition to personal privacy from prying eyes,hogan, Dr. Shi Xiaohong 360 security experts in an interview with reporters, also said the hackers also tampered router DNS. "This means that the user access to the bank's official website address,louboutin homme pas cher, there may be artificially produced fake phishing sites to steal bank account numbers, passwords."
According to the Center for Internet Security 360 detects data show that in the last week, the amount of 360 security guards, "Home Network Management" feature to reach 9.14 million times, repair hackers tampering with DNS router 468,000 units,piumini peuterey outlet, accounting for the total detected 5.1%.
Nevertheless, the security issues of the router is still often ignored the majority of users.
Security alert
?
How routers anti crack
So, daily life, and the public how to prevent the growing problem of router hijacking security problems? Internet security experts and netizens 360 center "Evi1m0" to everyone Weapon follows:
1. When setting up a wireless home router's password,piumini peuterey outlet,http://tsuruo.jp/cgi-def/admin/C-002/found/visit/main.pl, choose WPA2 mode,scarpe hogan, password settings, the more complex and difficult hacking will be high. 2, router management web logins, passwords, do not use the default admin, can be changed to letters plus numbers of high-strength password. 3, install security software LAN has ARP protection in the device,tn requin pas cher, to prevent hackers hijacked rub network. 4,woolrich parka, often log into the router management background, to see if there do not recognize the device connected to a Wi-Fi, and if so,louboutin femme pas cher, in time to clear it. 5, Do not tell people your wireless password credible. 6, mobile devices do not "escape" or ROOT, connection unsolicited wireless network.
(Original title
[url=http://www.boxoffice-services.com/ajaxplorer/abercrombie.php]abercrombie pa
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

j關於我們
尚未設置

Archiver|手机版|小黑屋|一起主機網  

Copyright 2013 最新最精彩-社区论坛 版权所有 All Rights Reserved.

Powered by Discuz! X3.1

© 2001-2013 Comsenz Inc.

快速回复 返回顶部 返回列表