A group of hackers accidentally sat together at the 10 th U.S. Hacker Conference in 2002 to access the Internet at the conference, however, the username and password of the unsecure password are written on the paper tray of the restaurant, pasted on the wall, and a large "Sheep" is written on the wall ". Hackers want to educate people that "you are likely to be monitored at any time" and embarrass those who participate in the conference: those who can attend the hackers' conference, it's no wonder that you have been stuck to the sheep wall because you don't pay attention to security.
Since the wall of sheep, also known as the sheep wall, has become a frequent and interesting activity at various hacker conferences or security conferences in the West. Each time hackers come up with new tricks to create traps at the conference site, intrude into or intercept the computers, mobile phones, and Internet activities of participants, and project several attacks onto the walls of the sheep.
The most interesting part of the 2014 Internet Security Conference is the wall of sheep on the third floor of the venue. Because the venue provides an open Wi-Fi network and non-encrypted network sessions can be monitored, the organizer creates a "sheep wall" and listens to the entire Wi-Fi network, the account, password, and URL for plaintext transmission are extracted and automatically sent to the IRC channel (of course, the account and password are partially masked ). The sheep wall always sends an http session and email login account and password, so that everyone can truly feel the danger of wireless network attacks, and actively let some possibly attacked audience find problems, some unencrypted network service providers and client software are also exposed.
Wotong reminds our friends:
- Stay away from the wireless network and turn off bluetooth: hacker behavior is ongoing anytime, anywhere.
- Encrypted information: if you do not want any third party to know the information, you must encrypt all messages that must occur.
- Don't accept: Any USB flash drive handed by anyone may be a mandatory killer for stealing your personal information.
- Network service providers and client software that are not well encrypted must support htts encryption,Don't face it!
Wosign focuses on PKI technology and issues globally trusted SSL certificates, code signature certificates, and client certificates to global users, as well as R & D and sales of high-tech products related to PKI technology. Our company is the only commercial CA in China that supports all operating system browsers and servers through international audits, top-level root certificates with global trust.
Don't face it!