Real-time communication danger secrets online chat Five major security crisis response

Source: Internet
Author: User
Tags email account

"How is the friend account information on my MSN being made public?" I do not remember what I have opened a friend circle function ah, how to close it? "Reader Mr. Ma was born in Tuesday to send an email to consult the road. And he's just one of the dozens of readers who consulted on the same issue after the publication of the contact information on MSN "leaks".

For a long time, instant messaging (IM) users have a lot of concerns about their privacy security. And this MSN "leaks" the occurrence of the storm, but also triggered the IM users are extremely vulnerable to the privacy of the security nerves. With the rapid development of IM applications, the destructive power of security attacks in this area has also increased.

Recent Developments

Reporter from Microsoft MSN Related Public relations responsible person to understand, about the MSN8.1 version will two degrees leakage contact (Friends) List of the wrong. Is "exposure" is actually in the MSN Space (blog) built a friend circle of users. To turn off this feature, simply log on to the Windows Live Spaces Web page and have a custom feature in the Web page that you can cancel. And according to the reader, Ms. Jiao actually tried to modify the MSN login password, this problem has been resolved.

System encounters attack

What can the instant Messaging IM system do if it encounters an attack? First, it is the infrastructure for instant messaging, such as storing all the servers that transmit data and communications records, and once breached, thousands of users ' records will be exposed to attackers. While all instant messaging providers warn their users not to use instant Messaging to transmit sensitive information, these records still contain a large number of passwords and important information. In addition to server services, the user's personal computer also stores a large amount of this type of information.

Countermeasures: Must not be in QQ, MSN and other IM tools through the text input mode transmission: NET bank account and password, private email account number and password, personal privacy information.

Network Management Third Eye

A Shanghai female white-collar, has been in MSN with her boyfriend's private language by the company network management monitoring, and leaked to the whole company colleagues and angrily left. The network administrator who does not know his own behavior has violated the criminal law is using a kind of internet monitoring software which is used in many enterprises. This kind of monitoring software is thus dubbed by the industry as the third Eye of network management.

Software is installed on the LAN server, is the desktop monitoring, which is divided into the following two kinds, one is real-time desktop monitoring. Network management as long as open the monitor screen can see the enterprise inside any computer desktop running what software, chat software upload pictures, dialogues, etc. are at a glance. Second, the Internet records monitoring. Network management does not need real-time monitoring, but periodically to save the intranet machine to browse the operation records, all you have done on the computer online operations are not spared, which includes the IM chat software records.

However, a business administrator Liu told reporters that such monitoring software (more commonly known as LANDesk) can be used on the Internet, LAN monitoring other computer screen operations, control of other computers. However, the Enterprise network management use its biggest use should be, monitor whether there is abnormal large data flow operation in LAN, including: Network attack, BT download and so on. At the same time, when computers inside the company are broken, they can use Remote Assistance software to help them repair their computers without having to go to a colleague's location.

Countermeasures: For the monitoring of network management, there is no way to evade the countermeasures. You can only ask yourself not to violate the rules. And for installing some kind of software can evade supervision, said Mr Liu said, in the computer monitored regardless of what software is installed, can be found. This is also confirmed by a man in the industry who works with network traffic monitoring equipment.

Total 2 page: previous 1 [2] Next page



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.