Hackers say: N ways to get your computer down in my 104 keys

Source: Internet
Author: User

Referring to hackers, but the "deep love, Hate cut" the old saying.

one hand

For those interested in computer players, hackers superb computer skills, have to call the sigh of admiration, you can never guess what the next step will be how;

On the other ,

Some of the bad behavior of hackers led to personal, business, and even the entire state of the confidential black hands.

For hackers, there are a number of ways to get your computer to fall down on its keyboard within minutes.

Don't believe me? View

650) this.width=650; "title=" 47396932232126120.png "src=" http://s5.51cto.com/wyfs02/M00/7E/47/ Wkiom1b7rbdjnpwpaaqts05gecc010.png "alt=" Wkiom1b7rbdjnpwpaaqts05gecc010.png "/>

If you think you can be spared by pulling out the network cable, you really think wrong.

All along, there are three ways to get a computer's key,

In the course of the study, when sending encrypted messages to a computer, hackers were decrypted in the background by the electromagnetic waves emitted by the computer. By the detection of the wire, it is found that when the narrow-band signal appears, it unlocks a password. The hacker passes through a 15-centimetre-thick wall that captures 66 decryption processes, and this process takes only 3.3 seconds to get the key.

650) this.width=650; "title=" 815588184174788787.png "src=" http://s2.51cto.com/wyfs02/M01/7E/47/ Wkiom1b7rxqgtruvaaiditfeyby707.png "alt=" Wkiom1b7rxqgtruvaaiditfeyby707.png "/>

So magical, I believe it will soon become popular among hackers.

However, if hackers want to make this "stethoscope", the first thing to do is to filter the background noise, in countless electromagnetic waves to find out what is the computer work issued, and this requires a very high physical basis, the traditional dead house programmer can not be done.


Hacker: I use Word to kill you Guest: I'll kill you with Word .

To the computer, the processing of the format of the office workers, who would not think one day, the suffix ". doc" Word document, has become a violation of our computer's culprit.

650) this.width=650; "title=" 746804497511554606.png "src=" Http://s5.51cto.com/wyfs02/M01/7E/43/wKioL1b7RjKwiPp_ Aahcb6ymdjw952.png "alt=" Wkiol1b7rjkwipp_aahcb6ymdjw952.png "/>

As shown, the picture is a document received by a senior executive in a Ukrainian power company, and if clicked "agreed", it would instantly plunge itself into a trojan trap designed by hackers. In addition, has repeatedly attacked the Chinese communication Enterprise "Dark Inn", its habitual trick is also like the Enterprise executive sends the message which contains similar Word or Excel attachment.

And how to have targeted "bait" is also a learning, hackers will find ways to analyze your identity background, according to your occupation or hobbies, targeted set of "bait" mail. For example, they will impersonate the invitation of the Golf Club, or the "lethal" brand new trial for girls and so on.

still using a wireless mouse? Quit it.

In order to work and carry convenience, but also to throw off the shackles of cable, today's office workers are like to choose Wireless mouse, and the problem comes with it. According to the security company's "Bastille" study found that most wireless mouse and its receiver signal is not encrypted, that is, hackers can use this vulnerability to control and attack the target computer.

In fact, the operating principle of using a wireless mouse to attack is not complicated. Most mouse manufacturers use a common protocol, in short, once you accidentally lose the mouse, you do not need to buy a new one instead of a receiver can continue to use, and hackers use just the point. By simulating the same mouse signal, the wireless receiver mistakenly thinks it is a new mouse access and listens to its instructions.

650) this.width=650; "title=" 169542609296865032.png "src=" http://s5.51cto.com/wyfs02/M02/7E/47/ Wkiom1b7rcpcwwysaaghy10jt-e662.png "alt=" Wkiom1b7rcpcwwysaaghy10jt-e662.png "/>

In addition, the remote control can also be based on the power of the receiver, the farthest control distance of up to 100 meters, if you have a certain degree of programming ability, you can also make a script, so that the same series of attacks in 1 seconds to complete, reduce the risk of being found (friendship with the mouse model may be attacked).

In this way, the "quit" thing is really much!

Suddenly miss the most original paper office ...


Paper Office: Stop It!

Small part said: Deploy Wing fire snake security encryption software, the sky came five words, it is not a matter, safe!


This article is from the "Wing Fire Snake Security" blog, please be sure to keep this source http://kernelsec.blog.51cto.com/11110277/1758335

Hackers say: N ways to get your computer down in my 104 keys

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.