In the Internet era, people enjoy the happiness and convenience brought by network technology, and also suffer from the anger and frustration that personal information and privacy are exposed. If someone tells you one day that he has a panoramic view of every move in your personal life, how do you feel? Incidents of personal privacy being voyeurized through the Internet are happening all around us. Who is peeping at our privacy, how did he peep, and how to protect our personal privacy? Privacy leaks are alarming The couple could not understand how the outsiders had such a video. After investigating the case, the police found that a 19-year-old Zhejiang youth downloaded a software via the Internet, which can be implanted in other people's computers, so as to achieve the purpose of controlling Others' computers. If the camera used for video chat on the computer at home is not turned off, then outsiders may be able to view the scene at home through the camera. Jiangxi has also cracked a case in which criminals have faked the website of the Beijing premier company of a famous securities investment consultancy company (domain name is) to create a fake website (domain name is). The stock account number and password information of all the stockholders who traded, and then used online commissioning methods to manipulate the stolen customer stock accounts for illegal transactions. The victims were in 18 provinces and cities in Guangdong and Zhejiang. Direct economic loss of 890,000 yuan. The Internet has attracted countless netizens to ride on the Internet because of its free and open nature, but the new network technology that has been distorted makes it sometimes become a secret place where personal information is leaked and personal privacy is peeped. Intrusion into the computer illegally As long as we plug the network cable into the computer, we are in danger of being peeped at any time. According to incomplete statistics, in 2005, 80% of the Internet computers in our country were infected with viruses, and more than 20,000 computer hosts with IP addresses were implanted into Trojan horses. Even if you don't chat with anyone or send files online, you don't necessarily protect yourself from peeping. Internet experts can easily find you by IP address; you can steal your chat information and email content through monitoring software; you can remotely control your computer through the Trojan horse program. In 2006, Mr. Chen, who lives in the Haidian District of Beijing, accidentally received information from a netizen named "Intruder" and opened it to see a naked photo of his wife. It turned out that a man named Li Wei in Ruijin City, Jiangxi, easily entered the private computer of Chen's house with the "Trojan" program, stolen the photo, and threatened to blackmail the party with this phase. He downloaded a Trojan horse program from the Internet, processed it into a compressed package, and placed it on a game forum. As long as someone accidentally clicked, the Trojan horse program would become a hacker acceptance program, and it was automatically installed to click Li Wei can now remotely control his computer and view all the data on his computer. Why do they peep online? The public security network police analyzed that some of them were because of curiosity and some were for seeking improper benefits. Netizens ’real names, ages, educational backgrounds, occupations, incomes, and even personal ID numbers, game account numbers, credit card passwords, online banking account numbers and passwords, etc. are the targets that criminals peep. In June 2006, the Jiangxi Internet Supervision Department investigated and punished a case of online extortion. The criminal suspect Zhou Ming charged “protection fees†by attacking some game private service websites, and illegally profited more than 12 million yuan in only two months. Not long ago, the police cracked the “Panda Burning Incense†virus spreading case which caused a great social impact. Underground grey industrial chain. The public security department said that illegally hacking into someone else's computer is an illegal act, and a serious one constitutes a crime. Cyber ​​crime is a new problem faced by our country after entering the information society. At present, in addition to involving online endangering national security, spreading obscene and pornographic information, and online gambling, China's cybercrime has doubled the use of Internet fraud cases, Internet theft cases such as theft of online banking, credit cards, top-up card funds, the use of email threats, and extortion cases Growth, the crime of illegally invading computer information systems also increases with the development of network technology. How to protect yourself online Who will protect our "Internet privacy"? How can we prevent "network voyeurism"? First, protect your personal computer. Various Trojan programs provide a convenient tool for online peeping privacy, and Trojan programs can be easily downloaded on the Internet. For netizens, they need to strengthen their self-protection awareness. In addition to installing necessary firewalls, downloading antivirus software such as Trojan and frequently updating, they must also remember not to click on some unknown compressed packages and folders on the webpage to avoid intrusion by criminals. Create opportunities. Some important documents, especially those involving personal privacy, should not be placed on the computer hard drive for a long time. Secondly, computer and software production enterprises should improve the network security factor in product development and design. For PC manufacturers, Internet software, and anti-virus software, it is their responsibility to disable Trojans and other viruses. If you are always in a passive state to develop anti-virus software after the virus continues to appear, it is difficult to avoid the loss of personal information, even property and reputation of netizens. In addition, laws and regulations should be improved to resolutely combat cyber crimes. Computer network security is a worldwide issue. The network supervision department of the Jiangxi Provincial Public Security Department said that relevant laws and regulations should be further improved, and more attention should be paid to preventing Trojan horses and other intrusive computers and cracking down on new forms of cybercrime. China's existing laws and regulations lack a specific judicial interpretation of cybercrime, and the operability is poor, especially for the use of information networks to commit crimes that lack specific conviction and sentencing standards. The law stipulates that those who spread computer viruses should be sentenced according to the severity of their consequences, but it is difficult to accurately measure the consequences caused by computer viruses like "Panda Burning Incense". At the same time, as an important form of evidence for cyber crimes, the legal status of electronic evidence in the Criminal Procedure Law has not yet been resolved. The technology, equipment and qualification of the appraisal personnel for electronic evidence appraisal also need to be further strengthened and improved. Happy online, but don't forget to protect yourself.
New home electric cool mist ultrasonic essential oil diffuser therapy air humidifier filter led air scent fragrance diffuser
This product design is novel, the Oriental fragrance culture combined with modern science and technology, the principle of using ultrasonic ultrasonic vibration plant fragrancetherapy essential oil and water to spray 5 microns of superfine particles, producing a large number of negative ions are more likely to be inhaled by human body, give full play to the essence of natural fragrancetherapy effect, help you relax in stressful work life, achieve healthy nerves, skin moisturizing effect.
Air Humidifier,mini air humidifier,air conditioning humidifier,USB air humidifier,cool mist humidifier Shenzhen Lanejoy Technology Co.,LTD , https://www.szstainlesssteelwiremesh.com
One night after the wedding, a couple in Mengcheng County, Anhui Province turned on the computer as usual, and suddenly received a video file sent to them by a stranger with the net name "bad temper". Click to open it. This is a video of their husband and wife.
Du Qiong, the team leader of the Network Reconnaissance Operation Detachment of the Jiangxi Provincial Public Security Department, said that at present, there have been cases of attacking and destroying computers using computer viruses, Trojan horse implants, and spyware. With the rapid development of network technology, if the precautions of a personal computer are not in place, the content loaded on it can be easily stolen or tampered with by a computer expert.