-
Very unsafe.
1. WiFi harm.
1. Eavesdropping. Unauthorized people eavesdrop on radio signals transmitted between wireless sites and APs (access points, wireless base stations), which is a passive attack and wireless LAN.
It's easier than a wired LAN and it's not easy to detect.
2. Unauthorized access. Unauthorized access can be done in two ways: an intruder can enter the wireless network by pretending to be an authorized user.
Second, an intruder can set up a fake AP to spoof the wireless site, and the fake AP is usually the first step in the attack, which is usually followed by the following attack: man-in-the-middle attack.
Obtain users' Internet information and data, steal login passwords and hide information;
3. Human interference. Attackers use high-powered transmitters, or DDoS attacks.
As a result, the user's bandwidth is severely reduced. These various attack methods make Wi-Fi not safe, and we must pay attention to improving security awareness in the process of daily use.
4. Harm to the body. Leaving the wifi device on for a long time directly affects your health, and you will feel dizzy in the morning.
Brain swelling, body more uncomfortable.
Second, the harm of Bluetooth.
1. Replay the attack.
An attacker can record all 79 channels during Bluetooth transmission, calculate the frequency hopping timing in some way, and forge a duplicate request to repeat the authorized command to carry out a replay attack.
2. Location attack: Bluetooth devices have a unique identification sequence, which makes it possible to determine the location of Bluetooth users. An attacker can identify and determine the geographic location of the compromised device.
When the attacked device is in the discovery mode, or even when the attacked device has established communication with other devices, the attacker can obtain the user's whereabouts through the network communication content.
3. A network can be established through Wi-Fi and Bluetooth, although it is very convenient to use, but it will also face many threats, specific types of viruses and so on may also spread through this wireless network, we can not always open the connection in the process of use, they are not as safe as we think, we must improve security awareness.
-
1. Power consumption; 2. If you connect to the network through WiFi, you may be remotely controlled.
-
It's quite power-hungry, and it's recommended to turn it off when not in use.
-
WPA2 should be safe.
WPA uses an authentication server to assign a different key to each user. But it's less secure"Pre-Shared Key (PSK)."It also works in mode. PSK is used in home and small office networks, where every user has the same password.
WPA-PSK is also known as WPA-PersonalWPA-PSK uses TKIP or AES encryption to link Brother wireless devices to access points.
TKIP stands for Temporal Key Integrity Protocol and is a method of encryption. TKIP provides a combination of information integrity checking and rekey mechanisms.
AES stands for Advanced Encryption Standard, which is a Wi-Fi-authorized and efficient encryption standard.
WPA-PSK and TKIP or AES use a pre-shared key (PSK) with a character length greater than 7 and less than hail delay 64
WPA2 is more secure. WPA has the same encryption mechanism as WPA2, but the encryption algorithm is different. Both are theoretically unhackable.
The -spk suffix represents persional authentication, i.e., it does not have to go through the authentication server. Summary: Neither is unbreakable.
Cracking the ten-digit code requires the combined computing power of all computers on Earth to run together for a thousand ......
-
The public wifi outside is very insecure, once connected to the fake public wifi, it will steal your personal information, and even your bank card pickpocket information will be leaked, and the money may be stolen.
One is that it is safer to scan *** password-free login, and the second is to have the most accurate scratch net identification device, which can easily prevent rubbing the net in the first time. The third is that the security protection function can be turned on to block malicious intrusion and intercept Trojan fraud.
The security of the computer lies in itself, if the firewall is opened, do not plug and unplug the USB flash drive with the virus, the optical disk, do not browse the dangerous **, it is generally poisoned, it is best to install a protection software and anti-virus software, which can be effectively reminded; If you use it personally, there is no need to pay for software, the market is free software.
Control, the highlight of Regal is control! Safety performance, do American cars have low safety standards? The answer is no! >>>More
To be honest, I hate to see the xenon headlights on the road, and the city doesn't need to turn on the headlights at all, and it's cool for you to turn on the lights, but it's not good for safety, just like why turn on the fog lights on a rainy and foggy day? >>>More
First of all, no matter where the charging column is installed, you must get the installation qualification of the charging column, if it can be installed, you need to pay attention to the following issues when installing: >>>More
You are on the right side, in fact already victorious, unless your IQ is too low, it is impossible to fail! A mainstream scientific community has already made up its mind, and the opposition will not be allowed to overturn it. >>>More