2010年12月13日星期一

Network hacker attacks present three characteristics

Recently, many people have received a message, say in your own mobile phone number in the input of others, and then you can arbitrary eavesdropping on his calling, see all his message, determination of his precise location. China mobile, China unicom and China telecom operators our representitives are very positively said that at present average person can do this sim card copy technology. Reporter investigations telltale cheater bunco process.

Widely nets Beijing on December 13, 2007 (reporter ChenZhenXi practice reporter XiaoYuan) according to the sound of China "news rectilinear" report, in your mobile phone number in the input of others, and then you can arbitrary eavesdropping on his calling, see all his message, determination of his precise location. Such powerful mobile phone, do you believe? On the Internet baidu: eavesdroping mobile phone, can obtain related web more than 11 million. Many mysterious company put their mobile phones have fantastic eavesdropping technology boast. Recently, the reporter is the sound of China to this telecom fraud means investigations, revelation cheater bunco process.

"If you provide a number can let you might hear each other all calls and text messages content, is you're lucky, bazaar of good assistant." Recently, the reporter's cell phone suddenly received this message. How someone has blatantly do such a business? This kind of eavesdropping mobile means really exist? Journalists decided to try authenticity, dialed messages left in cell phone number.

Reporter: hello, hello. Are you soar electronic technology is?

King manager: rightness.

Reporter: I received a message MLB Hats say before you can monitor others telephone, about it?

King manager: rightness.

Reporter: is that any phone can?

King manager: rightness. Unicom, mobile, PHS all could.

When the reporter asked specific monitoring techniques, the phone manager wang very ShunLiu put a process is introduced to come out.

没有评论:

发表评论