All articles| All Pictures| All Softwares| All Video| Go home page| Write articles| Upload pictures

Reading number is top 10 articles
Insider: “Facebook opened a Twitter account“ is false,
股票还得买苹果,看好苹果公司的9大理由 - 苹果股票,股票,苹果公司,IBM,iPhone
中国用户购买手机大调查,结果有些意外 - 智能手机,国产手机,互联网手机
In addition to Burley, Huawei, ZTE and Lenovo may sue Apple
全球最富62人:财富等于半数穷人总和 - 世界首富,富豪排行榜
NET about how difficult rights? Drops of 10 months for passenger rights awarded 5500,
2015美国最佳雇主榜出炉:Airbnb第一,微软未上榜 - Airbnb,微软,Twitter
如果坐地铁没带手机你一定会干这些事 - 地铁,手机
Dong mingzhu: millet is not an Internet company, cooperative selected the horse cloud,
Uber宣布收购微软必应地图部分业务 - Uber,必应地图,微软
Reading number is top 10 pictures
壮丽的云彩2
这只猪到底犯了什么错?
Sora aoi possession photo2
NeedWallpaper5
美洲杯宝贝的雨中风情1
NeedWallpaper13
有种屌丝级别的好妹子
美丽的风景--让你目瞪口呆
乳娘帕梅拉安德森4
中国处女图鉴1
Download software ranking
Boxer vs Yellow2
C#COM编程指南
ASP.NET.2.0.XML.高级编程(第3版)
Tram sex maniac 2 (H) rar bag2
C语言教程TXT
尖东毒玫瑰B
天龙八部十二宫服务端
小黑猫大战两米大花蛇
VeryCD电驴(EasyMule) V1.1.9 Build09081
美女写真1
aaa published in(发表于) 2014/8/24 8:18:25 Edit(编辑)
Real-life watchdog, the hacker invasion signals

Real-life watchdog, the hacker invasion signals

Real-life watchdog, the hacker invasion lights-watch-dog, hacker, Watch Dogs-IT information
Real-life watchdog, the hacker invasion lights

Earlier this year, a hacker called the watchdog theme game log game platforms such as PC, PS3 and Xbox 360. The core concept of this game is that ordinary people can use technology to manipulate the computer system weaknesses. Noteworthy is that the game also portrays the protagonist Aidan's invasion and changed the scene Chicago City traffic lights.

This scene of seemingly Sci-Fi is not far away from our real life. In this year's hacker Conference in Las Vegas, a group consisting of European hackers hackers "DefCon" is not completely copied this scene in the game. They pointed out that the current system of urban traffic signal control when sending information without encryption or recompile. If such a loophole exists, then anyone can just use some knowledge transfer equipment and some software you can have full control over the infrastructure like lights in the city. If this technology was using malicious words, for all the world would be a very terrible thing.

But one of the members of the hacking group, IOActive Lab's Chief Technology Officer, Cesar said they just wanted to point out the problem, rather than create this problem. They did not continue to try to break through the Las Vegas traffic control system instead of notifying in Las Vegas that's related to city administration, in order to fix the defect as soon as possible. Worth noting is that Cesar has also published their findings and related technical information. Maybe they are using these behaviors, and promoted all over the world can find out and solve this problem as soon as possible.

DefCon hacker organizations believe that defects in the system and before the vulnerability could be exploited by malicious people to expose the lets systems around the world become more secure. Their seemingly some loud behavior is not to show off their strength, but in this "white hat hackers" to tell Las Vegas and much more in the way of city managers to strengthen systems security throughout the city, particularly in infrastructure like traffic lights. (via:Neowin




添加到del.icio.us 添加到新浪ViVi 添加到百度搜藏 添加到POCO网摘 添加到天天网摘365Key 添加到和讯网摘 添加到天极网摘 添加到黑米书签 添加到QQ书签 添加到雅虎收藏 添加到奇客发现 diigo it 添加到饭否 添加到飞豆订阅 添加到抓虾收藏 添加到鲜果订阅 digg it 貼到funP 添加到有道阅读 Live Favorites 添加到Newsvine 打印本页 用Email发送本页 在Facebook上分享


Disclaimer Privacy Policy About us Site Map

If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)
Copyright ©2011-
uuhomepage.com, Inc. All rights reserved.