In ancient times, hackers cut corners and today there are neighbors.

Source: Internet
Author: User

"Primary Network Card", each set of 300 yuan underground hot selling expert indicates that the victim's network is prone to Trojan horse theft and privacy

In the Han Dynasty, Kuang Heng's story of "cutting the wall and stealing the Light" went viral, but the modern version of "neighborhood Network" was disturbing! A few days ago, our reporter received a promotion text message "high-power wireless network adapter can be permanently accessed anytime, anywhere, the illegal wireless network card, which is known by the IT industry as the "ENI", is selling well in the "underground market" in Guangzhou. The principle is to crack the password of a wireless network router encrypted by others and forcibly access the vro to steal the network traffic of others to achieve their own free Internet access.

Insiders directly refer to the "primary network card", which is far more harmful than simply stealing network traffic. Some hackers can also use hacking tools to penetrate, Mount Trojans, and steal privacy (such as online games and online banking accounts ).

Last weekend, the reporter received a text message: "high-power wireless network card, can achieve permanent free Internet access anytime, anywhere ."

According to the phone number, a young man said that as long as someone uses a wireless network card within one kilometer, "using our products will share its network ". The price is 300 yuan and 400 yuan respectively. "a year can save at least 1 thousand yuan of network fee, three or four months can be returned, and hundreds of sets can be sold in a month ."

According to Chen qinghui, an IT expert, the "ENI" should have been listed for more than a year. I have heard of such a thing before. Some sellers in the computer market in Guangzhou also have transactions in private.

He said that this type of ENI may still be "Invincible" to ordinary home users, but the current LAN encryption capability of the Organization is very strong, it is estimated that it is basically powerless. In addition, the network is not as convenient, fast, and secure as the exclusive network.

Three methods to prevent Network Attacks

According to Chen qinghui, if wireless Internet users feel that the download speed is obviously slowed down, and "Network neighbors" find that some unfamiliar users are online, they can basically determine that someone is on the Internet. In case of network access, you can use WPA encryption, Disable SSID broadcast, and bind a MAC address to prevent network access.

1. WPA Encryption

Ordinary home users set the wireless key is very simple, even do not have a password, which opened the door to the network; but if the use of WPA-PSK or WPA2-PSK encryption, the network is much more difficult. The setting method is also very simple, as long as you enter the wireless settings, the encryption mode to the WPA-PSK, and then enter the key on OK.

2. Disable SSID Broadcast

If you do not want your wireless network to be searched by someone else using the SSID name, you 'd better "Disable SSID broadcast ". Your Wireless Network will not appear in the list of available networks found by others.

3. Added MAC address filtering.

The network card of each computer has a unique MAC address. We only need to allow access from our computer, but not from other computers, to prevent network attacks.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.