| Back to logs list
53523 2006 年 02 月 07 日 15:47 Reading (loading. ..) Comments (0) Category: Personal Diary
MSN full name of MSN Messenger, Microsoft launched a real-time communication software. MSN Messenger With its excellent performance and ease of operation, has ranked as the world's most widely used IM software (instant messaging), in the country also has a large number of users, is the only one can contend with the IM software QQ. MSN in addition to Internet communication now also widely used outside the local area network, such as schools, companies, government agencies and other internal personnel exchange. As a tool for exchange of information, the transmission process of information security is particularly important. However, the safety of information transmission MSN somewhat unsatisfactory, an attacker can get the same LAN with sniffing software in use MSN all accounts, more dangerous, all transmitted in the LAN MSN message content will have a record to be complete, If the content has an important message that the consequences would be disastrous. Of course,
ugg australia 激安, there are anti-attack, we can make use of third party software on the MSN information during transmission is encrypted,
UGG ムートンブーツ, so you can prevent an attacker to obtain information to improve the security of information transmission MSN.
the transfer of information for the MSN software is called cast iron wall SimpLite-MSN, MSN is a transmission of information can be encrypted software, in its encrypted, all the chat logs will become a bunch of gibberish, so you can hide through the eyes of the attacker, despite its how sniffing, received only a \set
SimpLite-MSN
After installation run the software, as opposed to MSN Chat Monitor & Sniffer settings, SimpLite-MSN set to a little bit complicated, but in order to improve security, or carefully setting as well. First there is run SimpLite-MSN setup wizard, we click \software will automatically configure) → \The next program will pop up key
Setup Wizard (the role of key information will be sent encrypted key is different from the effect of encryption is different.) Type in the key, we set to \Point \Key part of the set.
MSN chat messages encrypted
after this two-step setup,
UGG ニットブーツ, we have succeeded more than half, this time in the system task bar will have a red icon in MSN Messenger, then double click the icon to open the SimpLite-MSN's main interface, the interface above window shows the current key, the bottom green, blue and red colors of the arrows, representing the Authenticated / Encrypted (both have passed key authentication), Encrypted (encrypted) and Unencrypted (without encryption) account. But this does not MSN message can be encrypted, encrypted with the MSN chat on condition that both parties need to install a SimpLite-MSN, so SimpLite-MSN encryption to work.
us SimpLite-MSN encryption on the effects of this test, run SimpLite-MSN, enter the set when we installed a good login password, open the main interface, find the blue arrows at the bottom of the display has a MSN account, which indicates that the chatters are also equipped with SimpLite-MSN, we landed MSN, to find who chatters, when we open and the chatters in the chat window,
ムートンブーツ 通販, there will be progress of a message encryption box, suggesting that SimpLite-MSN is close key encryption, such as the progress bar completed,
Happy Farm leaders to steal the serious consequences of food ... - Qzone log, the encryption will be successful. At this point, and information issued by the chatters will be encrypted, an attacker sniffing software encrypted information in the display would be garbled.
MSN
addition to the information is to prevent sniffing, we can also use the MSN Web Messenger, or Java MSN Messenger, the former approach is the use of landing pages MSN, the login address
When the attacker access to a host of privileges, to continue to penetrate to the internal network, the information collected will be very important, so the attacker is likely to start from the IM software, access to sensitive information. Therefore, information security within the LAN can not be ignored, especially in vulnerable IM software should be worthy of attention. There of attack against the so-called \In the continuous development of anything is not absolute,
What is there inside the outside what a long illne, the encryption algorithm is not impossible to crack, the most important thing is we have to improve their safety awareness, focusing on information security, it can also improve the security level of this.
with: SimpLite-MSN 2.2 Download
Backgrounder: Keep the company was monitoring online chat MSN if you are worried about you
----------------------------------------------- ---------------------------------
Source: Morning News
technology department of a bank to monitor the conversations of each employee's MSN, female staff members Lisa and her boyfriend in private houses on MSN, then become a catchphrase among my colleagues, which makes Lisa angry. Unsuccessful negotiations with the technology sector, she angrily resigned from the monthly salary of 30,000 yuan of work. In fact, the topic of surveillance and counter-surveillance has been in constant discussion.
you worry about yourself and, like Lisa, suffered the embarrassment of MSN is monitoring it? Monitoring the implementation of such persons have the right to monitor it?
remarks upon their own bottom line
32-year-old Little Miss
staff
the original MSN, I will be cynical, but also had friends in MSN talk about job-hopping going on, and now think that some scared, if reached the ears of the boss, the impact was not good enough. However, monitoring the content so much, maybe did not even noticed, while the last right, but then also have to be careful about the content or not should not speak.
I thought about the future with MSN say that it must have his own bottom line. Confidential talk about the work, the personnel changes aside, the leaders of the gossip aside, out of the scope of the topic, even if monitored, is the sun appear, do not worry openly that there would be any serious consequences.
units to monitor the implementation of office facilities, the final analysis, we can not control, do not have the same options as the resignation of Ms. Lisa leave. That being the case,
Pregnancy Basics - Qzone log, we can only learn to adapt, do not do it stands out.
frankly afraid of being monitored
27-year-old accounting
Miss Gao
have done before I heard a network of friends said that their mission is to always look at each case of the use of computer networks. Purpose is not to pry into the privacy of individuals, but to prevent network viruses and reveal company secrets. Of course, at that time he also made use of the responsibilities they often catch some chat record their view. However, he assured me, for them to see this record also caught talking to someone else is the work of desertion, what if they released the peek out, it was tantamount to telling people their own calling. And a company has so many computers, they do not waste time constantly monitoring the movements of each computer, and sometimes catch some of the data under the point of view, basically is to see you a snippet of dialogue with others, webmasters have to be drawn particularly interesting piece, its probability is very low.
listened to my friends, although I know that my computer may have to be monitored, but never for this reason the online chat as a cautious thing. On the one hand, after all, is the company's computers, people are the company, should never have been as at home, say anything like that, it should be necessary to avoid certain food. On the one hand, our company has clearly posted, and tell us in order to prevent information leakage within the company, they will check the employee's Email attachments, and any chat function does not have the outgoing file, with the double insurance, transfer trade secrets the possibility of a lot less. Check the MSN conversation this cumbersome and inefficient method, it is estimated only as a supplementary means. I was peering into the conversation the possibility of not smaller. So, I am not afraid.
by monitoring the performance of their
Nic k24-year-old bank employee
I read the morning newspaper
very mixed feelings, immediately express their feelings a bit, changed the name of the MSN \Just hang my new name, my colleagues have kindly reminded me,
UGG オーストラリア, and you know people are likely to monitor your MSN, also changed his name so prominently, if network see, for you have an idea, you are not knocked Well. I immediately put the name removed. Had read the news first reaction was to remind those who did not know about MSN Monitor this friend, but added forget themselves may become the object being monitored.
we were still with the network department Bijiao Shu, chat at noon that day, several colleagues and I deliberately put out of the news, you made me one, that is, to the Ministry of the population from the network point of the message stuck , the result of the man silent. All of a sudden, I and several colleagues suspected index rose to 90%, have cast doubt on the reaction network of our company
MSN also be monitored by. We decided to be careful from this MSN chat, one can not disclose company information, and second, do not say bad things about network management, three advantages can be monitored, multi-display themselves as busy, multi-manufacturing company that reflects your dedication responsible service conversation. Although I think this monitor is not reasonable and infringement of personal privacy and moral risks. But in no way change the status quo situation, since the most likely to be monitored, as well make use of monitoring, can be considered a \
I have something to say
privacy in the boudoir, then said, how can I say, when at work? Even without the monitor, at least Lisha no basic professional ethics. Our company all have MSN, but are written on the employee handbook - working hours shall not use the Internet chat private matter. We comply with most of the time very well, on the one hand I was busy, on the one hand fear of being discovered will take stringent measures to gradually work to develop a businesslike atmosphere. - Su Qi
Email
I encountered a private record of being watched is look what QQ is a leader is, I was also fought with the plane, and later he apologized to me, I no longer care about.