Recently, a female college student is facing the invasion of the internet. A 19-year-old college girl in Dalian sent her computer to a computer shop for repair, but what she didn't expect was that the repaired computer was implanted with sneak shot software and the camera was remotely controlled.
Camera intrusion (not related to graphics)
Computer failure, sent to the repair shop for repair.
Xiao Ting, a newly grown Dalian girl, is studying in a university in other places. During the National Day in 2007, Xiao Ting returned to Dalian to reunite with his family. Because there were some problems with her notebook while studying abroad, Xiao Ting took advantage of her opportunity to send it to her hometown computer repair shop for repair. A few days later, Xiao Ting took back the repaired notebook, and the computer was troubleshooting. Everything is fine. Xiao Ting doesn't care about repairing the computer.
The police contacted and the computer actually monitored it.
Laptop camera
Xiao Ting has been using her computer normally since the computer trouble shooting. Until February 6, 65438, Xiao Ting, who was not at home, suddenly received a phone call from the Dalian police. The police told Xiao Ting that her computer was equipped with candid camera software, which can remotely control the computer camera! At first, Xiao Ting thought she met a liar, but after verification, she found that what the police said was true.
The maintenance personnel tampered with the monitoring software.
Network monitoring platform (independent of graphics)
After investigation, it was found that it was the maintenance engineer of the after-sales service station who implanted the peeping software. The maintenance engineer said that after the computer was implanted with sneak shot software, every move of female college students in the female dormitory was photographed and broadcast live. What is even more exaggerated is that the dressing of girls in the whole dormitory has been broadcast live.
How do ordinary people prevent network intrusion?
1. Use genuine operating system.
Although the genuine operating system also has the risk of being invaded by the network, it is much smaller than the pirated operating system. Many consumers are used to installing pirated operating systems in computer specialty stores, with prices ranging from around 20 yuan, or downloading cracked operating systems online. In fact, these operating systems themselves have even been implanted with Trojans and viruses. , it is easy to become a hacker's monitoring object.
2. Watch out for webcams
Webcam (picture-text independent)
Many families are using webcams for home monitoring, and its function of viewing monitoring information anytime and anywhere is deeply loved by consumers. However, these webcams are still at risk of being attacked by hackers. Consumers should buy products from big companies and change the passwords of monitoring accounts regularly. When installing the camera, avoid pointing the camera at private places such as the bathroom.
3. Use genuine anti-virus software
If the computer cannot avoid being used for virus risk, it is necessary to install genuine anti-virus software to scan the computer regularly.