Your camera may be the "eye" of someone peeping

More and more people use webcam video chat, and hackers post that they can easily "take over" the remote camera and use it for sneak shots.

The camera, a product of this online chat era, has almost become the standard configuration for home computers. Through the images from the camera, our communication with relatives, friends, and loved ones seems to be within reach. But when you laugh and scold in front of the camera, you may think that the camera may be connected to the other party you don't know. On that side, there are a pair of unwilling eyes ...

Girl undresses in front of the camera

Recently, more and more "cool" and "hot" candid photos appear on various websites. Some people start to wonder, how did voyeurs get these photos? Just when people were wondering, someone posted a post on the Internet called "Girl, please be careful with your camera", pointing directly at the camera in your own home. The author of the post, "Wish for Summer", as a member of the hacker organization technical discussion group, described how a hacker could easily control a girl's computer remotely. When the hacker began to "take over" the girl's camera, the girl was still unaware, and even once undressed in front of the camera. At the end of the post, the author reminded us in good faith: "Summer is coming, girls in cool clothes or often in pajamas sitting in front of the computer should pay more attention to it. Because, maybe there are a pair of eyes looking at you." Get a warm response from netizens. In the long reply, some "enthusiasts" asked how to obtain the "remote control technology", and some netizens questioned its authenticity, but more was the desperate voice of "sorrow everywhere". Some netizens suggested that those with high skills can control the switch of the machine, and even "after the computer is turned off, the camera can still be turned on to take pictures."

It's "easy" to control the camera. A technician pointed out that most of the original posts in "Wish for Summer" are feasible, and even "the threshold for entry is very low." "After controlling the host, I want to do anything on your machine, let alone control a small camera." He said that most of the hacker sites have introduced methods to invade other hosts. "Trojan horse" is One of the most commonly used methods, and the difficulty is very low. He cited the popular "Gray Pigeon" and "Bee Thief" some time ago as an example: "In fact, as long as someone who knows a little computer, download these two Trojan programs online, follow the steps written on the Internet. , You can easily control our puppet machine commonly known as 'meat machine'. Naturally at the same time control the camera. "He also said that" Trojan "penetration methods are diverse, the more popular is now through the chat emoticons of chat software "Trojan horse". These emoticons are almost forcibly transmitted, and are very deceptive.

When the camera is not used, the power should be turned off. "The hacker can freely control the computer's switch." Mr. Zhuang, who is now a technical director of a communications company, said that this is an excessive concern. He said that remote control of computer shutdown is very easy to do, but it is more troublesome to restart, and it can be turned on remotely after power is turned off, "it is simply nonsense." He said that the Trojan horse technology is quite mature, some Trojan horses are very difficult to kill, and now there are people who order high-priced "Trojan horse" business, which is even more unpredictable. Moreover, video chat is very popular, and cameras are highly popular. It is estimated that similar candid photos will happen from time to time. He suggested that to prevent being photographed, individual users should start from the following points: do not log in to unknown websites casually, and do not accept pictures or chat expressions sent by strangers; apply the latest patches to their systems as soon as possible to block possible intrusion Port; install anti-virus software and firewall, and update it in time; if the machine runs abnormally, you should check it in time; pay attention to the work light of the camera. If it is not turned on by yourself, you should disconnect the Internet connection and check it. He also reminded that girls who are afraid of being photographed should pay more attention to the position of the camera. When they are not in use, they can turn off the power or adjust the position of the lens to prevent them from being taken advantage of.

High Speed Stacking Door

The quick stacking door has many functions such as heat preservation and cold preservation, insect and wind prevention, dust insulation and sound insulation. Widely used in underground parking lots, industrial plants, food, textiles, electronics, printing and packaging, automotive assembly, precision machinery, logistics and warehousing and other places.

Automatic Stacking Doors,High Speed Security Door,Rapid Stacking Folding Door,Automatic Stacking PVC Door

Shenzhen Hongfa Automatic Door Co., Ltd. , https://www.highspeedshutterdoor.com