Nowadays, as mobile terminal arisen the ceaseless progress with Internet technology, those old theft, bilk, annoyed a method to also be changed new colour. Do not know everybody realizes, the WiFi that everybody uses everyday, actually not safe.
Yes, you were not misreaded, when use WiFi gets online, our individual information safety is facing huge risk probably.
For instance, him hacker builds " mountain fastness WiFi " , take an as similar as around WiFi name, do not establish entry code revulsive people join. When using, transmission data is met by hacker monitoring, the information such as name of number of individual privacy, Zhang and password, OK also easily by purloin. Actually, it is loiter WiFi not only, many people still like to opening a mobile phone at any time wireless net joins automatically function, such risks are bigger.
Do not believe? Look below these a few caricature, these dangerous setting, probably you once place oneself among them.
■ free WiFi is received
[dangerous]
Illegal element is built as identical as commonly used WiFi or the WiFi of close, same perhaps code attracts setting empty password public join, be in next WiFi road by implement on hijack DNS (domain name system) , introduce the user fishing website to get Zhang name code, perhaps be in road by implement on discharge of listening mobile phone, get password of proclaimed in writing.
[clew]
◆ affirms good WiFi name with the businessman please when WiFi of communal circumstance join
The communal WiFi that ◆ does not have a password careful with
◆ is used when paying APP, use the 4G network of operation business as far as possible
■ illicit take WiFi heat
[dangerous]
Wireless road by implement have more safe hidden trouble, for instance, the WEP attestation before can very defeat solution easily. Individual erect does not have circuit by implement, if deploy undeserved meeting to bring about loiter net or individual data to divulge, in the company use likelihood is brought about inside the net is inbreaked, data of company secret, client is divulged, consequence is unimaginable.
[clew]
◆ does not have circuit in office network erect by implement must approve hand-in-hand travel safety install through the company
◆ attestation means uses safe WPA2
◆ suggests to conceal SSID (service market marks) , bind the MAC address that receives facility surely
◆ WiFi password must 8 digit above, include big the ordinary form of a Chinese numeral, number and punctuation mark, amend a code regularly
■ WiFi joins automatically
[dangerous]
A few mobile phones arrive in the search is not same a WiFi heat but when the WiFi with same title, also can use saved password connection automatically, this gives a hacker with an opportunity given by.
[clew]
◆ need not shut the function of wireless local area network of mobile phone and notebook computer when WiFi daily, join automatically in case baleful WiFi
◆ hooks up when mobile phone and jotter after WiFi, connect received WiFi heat title alertly
■ WiFi safety is summed up
> of <WiFi safe a pithy formula
Communal circumstance receives WiFi, the name has affirmed certainly;
Do not want to connect without close WiFi, safety pays with 4G;
Illicit take a route by want to examine and approve, safe setting not forgets;
WiFi need not want to shut, twirl is asked evasive.
[adscript]
Times of interconnection of everythings on earth, loiter WiFi became it seems that basic " live skill " , but enjoying while WiFi brings advantage, because people lacks WiFi generally,online safety is on guard consciousness, became the heavy disaster area of bilk of all sorts of network trap, fishing gradually. WiFi risk basically has two kinds of forms: It is normal WiFi is inbreaked by illegal element, 2 it is illegal element builds sham and authentic heat.
To be on guard these safe problems, wireless net needs to add basic safety attestation and add close function. Include:
1, user identity attestation, prevent to visit network resource without accredit;
2, data is added occupy transmission illicit close sex in order to protect data integrality and number closely;
3, use at ordinary times should notice firmware upgrades, leaky does not have circuit by implement must hit a patch in time;
4, mobile phone end, computer end should install safe software.