May 09, 2024

Privacy danger! Router into pornographic photos?

Privacy danger! Router into pornographic photos?

Recently, the National Internet Emergency Response Center issued an early warning. “D-LINK, Cisco, Linksys, Netgear, Tenda and many other vendors’ router products have backdoors. Hackers can directly control routers, further initiating DNS hijacking, stealing information, and phishing. Attacks directly threaten users' online transactions and data storage security, making related products a safe 'landmine' that can be detonated at any time."

Shortly after the warning was issued, there were already "inquisitive" netizens who started the experiment. A netizen sunk through the WeChat public number and succeeded in cracking the WiFi password of the “goddess” next door. The netizen also hacked into the "Goddess" computer and mobile phone and controlled the "Goddess" microblog and other personal social accounts. And all of this is less than 5 minutes! This also gave birth to a classic saying: easy to use routers, set the password is not easy, routers and use and beware!

Obviously, the router has played a very "fragile and embarrassing" role throughout the entire process. In order to reduce the cost of using broadband and increase the actual use of broadband, many friends have chosen to use routers. As in the past, the situation of one network cable and one computer dominated is long gone. Instead, several people or several devices in the home use one network; in the company dozens of people or hundreds of people share a broadband. Easy access to the Internet and simple connectivity have also become an important reason for the popularity of routers.

Although everyone is using routers, little is known about the principles and settings of the routers, let alone security measures. The news of the latest "Router Backdoor Vulnerabilities" and "Netizens Second Breaking Route Passwords" has caused everyone to pay more attention. Especially those who like to put some small movies on their computers and mobile phones. The goddesses who like to take pictures of their beauty and love are more in need of close understanding and attention. So, what can be done as an ordinary user to prevent the router from being the initiator of the next round of pornography?

The author uses his own habits and experiences to provide the following suggestions for everyone. Please consult with otaku and goddesses.

1, for the router's own backdoor and vulnerability issues, the best way is to upgrade the firmware. This is exactly the same principle as installing a patch for a computer system. Because any product is not the most complete, even a mature product such as Windows, will be launched every year N system patch, most of these patches can help improve security and stability. Therefore, the same is true for routers. It is necessary to check the model of your router and choose the corresponding patch or firmware upgrade.

2. The more complicated the password, the better. The combination of simple numbers and letters can not completely resist the hackers' superb techniques and scan code software attacks. Previously, there were articles that had conducted detailed studies on setting up passwords. The author's suggestion was to make full use of each key on the keyboard when circumstances allowed. For example, if the password is set to "123asd", it is not as safe as setting "123*_$asd". So, everyone can strengthen and complex router's password according to their own password setting habits.

Although it is a good idea to strengthen passwords, I think this method is always a temporary solution. Because "the magic is high and the road is high." Strong passwords can hardly escape the momentary calculations of the scanning code, but only delay the cracking time of the hackers. Since encrypting this positive strategy is not enough, try this non-encryption countermeasure. You may ask, strengthening the password is still unstoppable, does not mean not to be streaking without encryption? Of course, since there is no encryption, there is definitely a better way. That is to bind the MAC address! No matter the computer, the mobile phone or the iPad, any device has its own unique MAC address. Now most routers provide the function of binding MAC addresses. Users only need to fill in the MAC address of the device they are approved to the router, which can play a "only protection role." In short, the allowed MAC address can be connected to the router and then go online. All MAC addresses (devices) that are not in the allowed list will be ignored or the message "Cannot connect" will be displayed. This action has a great effect on preventing hacking and hacking.

4. In the router, "Prohibit Broadcasting" is set. Corresponding to the above binding MAC address is this "Prohibit Broadcasting". After many routers are set up, the name of the wireless network will be automatically generated. This is the name of the long list of wireless networks that people see when they turn on the wireless WiFi switch. Now, what we need to do is to keep our wireless network from appearing on this large list of public lists. Use the "Forbid broadcast" feature in the router to hide your wireless network name. This means that other than yourself, others cannot know the existence of your wireless network.

5, try not to modify the DNS, use the standard DNS provided by the operator. Sometimes because of the reason of the network, if the user modifies the DNS, it can increase the speed of opening a web page and reduce the time for network identification. And so the price you may have to pay is sacrificing security. Therefore, try not to modify the router's initial DNS at an unnecessary time. Even if it needs to be modified, use the trusted and network operator-supplied DNS addresses as much as possible. As a result, router security issues due to DNS attacks are reduced.

Having said so much is actually just "throwing bricks," and I believe many masters have their own way of "citing jade." In addition to the above mentioned, such as the fixed intranet IP address, reasonable to simplify the internal functions of the router, etc., will help to improve the speed of the wireless network and enhance security. If a friend encounters a problem while updating the firmware, or does not view and bind the MAC address, forget how to set the prohibition of broadcasting, etc., or problems related to the router, everyone is welcome to pay attention to WeChat: ksms2046 for mutual exchange and discussion.

To protect privacy, there you have me. Don't let the router be the initiator of the next Pornographic Door!

Fog Light Wire Harness are most used in automotive,motocycle,bus,bike,truck,LVDs,medical equipment.

Yacenter has experienced QC to check the products in each process, from developing samples to bulk, to make sure the best quality of goods. Timely communication with customers is so important during our cooperation.

If you can't find the exact product you need in the pictures,please don't go away.Just contact me freely or send your sample and drawing to us.We will reply you as soon as possible.

Fog Light Harness

Fog Light Harness,Fog Light Wiring Kit,Universal Fog Light Wiring Harness,Fog Light Wiring Harness

Dongguan YAC Electric Co,. LTD. , https://www.yacenter-cn.com