As smartphones become more and more widespread, our privacy seems to be gradually being invaded

Source: Internet
Author: User
Keywords QQ member chat record
Tags android anti- anti-theft anti-virus software apple chat record chat records computer

Absrtact: Recently, IPhone5 global sale. In just a few days, the mobile anti-theft monitoring software, which has caused great panic among Apple users, has implicitly said that it will support the latest IOS6 system. Yesterday, a number of people in the industry to Chongqing Evening News

Recently, IPhone5 global sale. In just a few days, the mobile anti-theft monitoring software, which has caused great panic among Apple users, has implicitly said that it will support the latest IOS6 system. Yesterday, several industry insiders to Chongqing Evening News reporter confirmed that android (Android) system smartphone-related monitoring software is a wide variety.

With the smartphone more and more widely, our privacy seems to be gradually invaded, how anti-theft? Yesterday, we consulted the relevant experts, to help you see the Recruit.

Be a member of a person

Chat record full exposure

Tianya Chongqing Forum, netizens "three Eyes" post help: "Wife recently often late at night chatting QQ, every time I close, will close the window." I'm afraid she has other ideas, but it's hard to prove. Is there any way to know the content of the chat?

Soon have a netizen thread put forward the solution: spend 10 yuan a month, help the wife Open QQ member on the line. Since the opening of QQ members, chat records can be realized roaming, if you know the other side of the QQ number, then open all the chat records can be queried.

Yesterday, Chongqing Evening News reporter with their own QQ to try to open a member of a computer on the landing chat, and then try to change another computer, easily in the chat record extracted all the previous content.

Coping: Encrypting Chat Records

Computer newspaper Digital Publishing Center, Deputy director of the app (mobile software) project leader Xianghanqiu said, open members easy to operate, easily implemented. But this way first to know the other side QQ password, but also know the other side password hint problem. However, many loved ones have no secrets, and it is easy to steal a chat record.

First of all, to avoid their QQ password is known by others, but also set only their own to know the secret security problems and answers. In addition, the 2012 version of QQ has been able to roam the chat record encryption, so for the chat record with a dedicated password, can be guaranteed security.

And these are the ways to prevent peeping.

Update software at present some special cracking software can be used without landing QQ, the premise of extracting QQ chat records. However, this software only for part of the old version of QQ effective. Therefore, the installation of the latest version of the QQ software, and QQ system settings for the chat record encryption can be basically guaranteed security.

In time to quit your computer landing QQ, others use mobile phone at the same time landing QQ, you can synchronously receive all your QQ information. If you log on to the QQ before others early landing, you can not receive "another device is also landing" warning, more easily stolen chat records.

The new version of QQ support more than one device (computer, mobile phone, tablet computer) at the same time landing, but more than one device at the same time landing, the computer in the lower right corner of the taskbar icon will appear landing information. When using QQ, you should observe the relevant tips in particular. On the mobile phone and tablet computer after landing, it is recommended to exit the landing, do not let QQ run the background.

God knows nothing.

Record everything.

Ms. Wang, who lives in Jiangbei District, said her husband stayed at home for some time last year. She wanted to master her husband's movements, and bought a web-cam, "it does not need to connect to the computer, just use a network cable connected to a router, and keep the router open, you can remotely control the camera work and record images." Ms. Wang said she had been watching for about one weeks without being found by her husband.

Coping: Viewing router connections

New female network operation and maintenance of the Department of Technical director Cao Jiao said, using a camera to take photos is not new, a computer and a camera, you can easily record up to dozens of hours of video information. However, if you are using a computer camera, then it is necessary to use a computer as a storage medium, relatively easy to be found, attention to the system in the lower right corner of the status bar icon, there is no relevant video software in operation can be known.

For the webcam bought by Ms. Wang, the answer is to check the router to see if there are any suspicious devices in addition to the computer network cable.

And these are the ways to prevent candid cameras.

Careful link with webcam chat also have the risk, with mandatory video software, can be remote control, without knowledge, was forced to open the camera peeping.

In this respect, experts say, to use mandatory video software to open your camera, often need to send you a picture file or Web site, so do not open the images and URLs of unknown origin. At the same time, it is best to install professional anti-virus software, the other side implanted virus files, there is a great chance of anti-virus software to prevent.

Played for 1 minutes.

All tracks are monitored.

Ms. Chen, who lives in Nanan District, claims to have found a "good way" to monitor her boyfriend's whereabouts: very simply, using his mobile phone, a mobile-phone operator called a mobile navigation service.

After customization, the operator will send a confirmation message to the "monitored" target to confirm that the service is carried out on a voluntary basis by the number holder, "pretending to be playing with a boyfriend to help him confirm, and then delete this confirmation message, the future of his movements at any time control." ”

Response: Regular Query services

Cao Jiao, chief technical officer of the New Women's network, said that the positioning method was based on the mobile phone network operators ' base station, and the service itself was legal. If a cell phone is taken by someone else, it is likely to be customized in a very short time, and it is hard to find.

To avoid this, it is a good idea to break into the operator's consulting phone regularly to view your customized services.

And these are the ways to prevent surveillance.

System reset Apple iOS system and Android system, there are some software under the banner of Anti-Theft, doing stealing SMS, call records, monitoring location and other activities. More frightening is that some software can be automatically hidden, even require administrator privileges to delete.

The general monitoring software needs to install the client in this machine, therefore avoids the handset to be others long time to play is the most effective prevention method. If you find that you are eavesdropping but can not find the client, it is recommended to use a brush machine or restore the system factory set the way to reset the system.

Change SIM card online spread a saying, mobile phone card can be copied, copy, two cards can simultaneously receive the same number of information to dial, and can use a number account costs. If the phone card is copied, not only the phone, text messages are stolen, but also will bear the cost of using the phone card.

Computer newspaper Digital Publishing Center, Deputy director of the app (mobile software) project leader Xianghanqiu said, this is not groundless, using "burning card" can be part of the mobile phone SIM card replication. This copy was not originally used for stealing cards, but for the purpose of burning the information of two mobile cards into the same card to achieve the so-called dual sim. However, the civilian-grade equipment can only be part of the old SIM card replication, 32K capacity above the big mobile phone card helpless. With a large-capacity SIM card, the chances of being replicated are much smaller.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.