Don't face it!

Source: Internet
Author: User

A group of hackers accidentally sat together at the 10 th U.S. Hacker Conference in 2002 to access the Internet at the conference, however, the username and password of the unsecure password are written on the paper tray of the restaurant, pasted on the wall, and a large "Sheep" is written on the wall ". Hackers want to educate people that "you are likely to be monitored at any time" and embarrass those who participate in the conference: those who can attend the hackers' conference, it's no wonder that you have been stuck to the sheep wall because you don't pay attention to security.

 

Since the wall of sheep, also known as the sheep wall, has become a frequent and interesting activity at various hacker conferences or security conferences in the West. Each time hackers come up with new tricks to create traps at the conference site, intrude into or intercept the computers, mobile phones, and Internet activities of participants, and project several attacks onto the walls of the sheep.

 

The most interesting part of the 2014 Internet Security Conference is the wall of sheep on the third floor of the venue. Because the venue provides an open Wi-Fi network and non-encrypted network sessions can be monitored, the organizer creates a "sheep wall" and listens to the entire Wi-Fi network, the account, password, and URL for plaintext transmission are extracted and automatically sent to the IRC channel (of course, the account and password are partially masked ). The sheep wall always sends an http session and email login account and password, so that everyone can truly feel the danger of wireless network attacks, and actively let some possibly attacked audience find problems, some unencrypted network service providers and client software are also exposed.

 

Wotong reminds our friends:

  1. Stay away from the wireless network and turn off bluetooth: hacker behavior is ongoing anytime, anywhere.
  2. Encrypted information: if you do not want any third party to know the information, you must encrypt all messages that must occur.
  3. Don't accept: Any USB flash drive handed by anyone may be a mandatory killer for stealing your personal information.
  4. Network service providers and client software that are not well encrypted must support htts encryption,Don't face it!

Wosign focuses on PKI technology and issues globally trusted SSL certificates, code signature certificates, and client certificates to global users, as well as R & D and sales of high-tech products related to PKI technology. Our company is the only commercial CA in China that supports all operating system browsers and servers through international audits, top-level root certificates with global trust.

 

Don't face it!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.