- 1、本文档共10页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
A Speech About Internet Security of Password and WiFi Network
IanXia
It’s my great honor to stand here and make a speech to you guys.
As the start, let’s share a story. A man downloaded an APP on his smartphone one day called WiFi master key. I believe that many people have used such kind of software before or are using it now, to save his mobile phone bill with less mobile traffic by stealing other people’s WiFi network outside. He saved hundreds of dollars of his mobile phone bill by using this APP. But on a peaceful morning, everything looked great except his debit card, which had countless records of consumption and let him lost thousands of dollars. What happened to that? The answer was affirmatory that his smartphone had been hacked by someone, who used the information that stored in his smartphone to transfer the money out. He called the police and the police felt confused about it. He hadnt sent any auth code out or lost any devices with personal information, how could it happen?
Police find a key point, it’s becuase the APP he installed before. Many people will think it’s done by the developer of the APP, he is the criminal. But when the police find the developer and find it isn’t done by her. Guess what? Finally, with the help of a professor of network security, they find the criminal, his neighbor. But how it could be? The answer is the lost WiFi password, with a WiFi Key, a hacker can easily enter your network and hack devices with vulnerability, then get any information that they want, including messages with auth code, photos, screen captures with credit, or debit card number and password notes. His neighbor gets the password that the APP shared out and connects to his home network, and then uses vulnerability to get the debit card number, auto code, and bank password.
Is it sounds frightening? Yes but there’s no need to worry about a famous smart device produced by a huge corporation, since they usually have state of the art security s
您可能关注的文档
- 高中英语教学课件:【溯恩英语】M4U1Reading.ppt
- 高中英语教学课件:1_10大语境读后续写举例.ppt
- 高中英语教学课件:2-10 读后续写 The Last Delivery- Lyx改.ppt
- 高中英语教学课件:2-Foreshadowing-After 20 years.ppt
- 高中英语教学课件:2-knowledge-of-poetry.ppt
- 高中英语教学课件:4群文阅读教学专题讲座-黄大兆.ppt
- 高中英语教学课件:8 词形变化.ppt
- 高中英语教学课件:84Reading1.ppt
- 高中英语教学课件:2023暨阳联考读后续写险遇鲸鱼.ppt
- 高中英语教学课件:3500词汇语法填空.ppt
- 重庆新速达物业服务集团股份凯里公司招聘笔试题库2024.pdf
- 浙江杭州千岛湖泰众肉类食品有限公司招聘笔试题库2024.pdf
- 陕西新华出版传媒集团新华书店分公司招聘笔试题库2024.pdf
- 宁夏海原县肉牛产业发展集团有限公司招聘笔试题库2024.pdf
- 浙江温岭市化工轻工建筑材料有限公司招聘笔试题库2024.pdf
- 中航飞机汉中航空零组件制造有限公司招聘笔试题库2024.pdf
- 山东海阳市海昇矿产资源开发有限公司招聘笔试题库2024.pdf
- 山东潍坊寿光市公共交通运输有限公司招聘笔试题库2024.pdf
- 内蒙古察右前旗农业投资开发有限公司招聘笔试题库2024.pdf
- 线上清明祭英烈活动策划.pptx
文档评论(0)