Do you know your partner in front, computer will expose to your privacy? You might say, “I do not mind, since I have no important information can be stolen.” But will you say that forever? The answer is no.
When the need come in, you will have the so-called secrets need to deal with the computer. Over time, your e-mail password, web password, facebook, forum, msn, blog, photo album. Further more, files, documents, photo you have placed in the storage devices. (Remember the Edison Chen incident?) Further, any related cash, credit card information account and the company’s high-confidential documents.
At that time, your fellow device meet expert, what do you think this fat fellow will do for you secret? Sum up, there are two situations to occur. First, The things that you do not want others to know will be reveal by the computer. Second is that this fat fellow was gripping to identify someone else than you, it let others do something with your identity, the person will have the right to use your name to do things.
身份被盗=鬼上身 Identity Theft
In fact, 80% of you had the passwords stolen, but do not know. A mess of the most reckless or msn password. A friend sent you a link to your msn account then those ask for your account and password sites. These tender little trick to deceive or no less than half of the people. Please do know who is on your friends’ msn.He may not him, his identity has been stolen, he do not know what he has done ~ If you believe him, be the follower.
电子网络侦探 Cyber Forensics
Let someone else using your computer, portable hard disk, thumb drive and so on. How dangerous? In this regard, I has more in-depth researches during my degree, because I was responsible to this topic (cyber forensics). Li Li Peng told me last time. When looking into computer security issues then you will find many hackers’ tools and methods,It is more than you take the initiative to google how to be a hacker. My research topic is likely a electronic detective to find out electronic evidence and present to the court for a legal permit, then finally I found the most was how to recover the data from your media storage devices and they should had already been deleted.
As a cyber forensics, we have to search for evidence, it is necessary to start from the computer log. Perhaps you never not know how powerful is the log in your computer and www. (Google in the snigger at this time). You try on Google for some words. The word with your computer idenity, OS platform, browser information, IP, IP into the location, time zone time, and then page from and page to, on your Google account. It is recorded in the Log of Google. This is just an example of Google, he got critism because he is powerful and own the most users, but please be aware of others little application. even a common forum will have a complete logging system. Do not think that no body know what you have done.
Google just an examples, but I want you to think about, if you are using a lovely PC, and Trojan(virus) in PC after that? What is a Trojan horse? Trojans have two, when you got it. One in your computer and another one in the hacker’s computer. Trojan in your computer will try to retrieve whatever information hacker want then will sent to his server side Trojan. What do you think that your computer can do with your privacy? That’s why I’ll feel very irritating when seeing all my friends’ computer kena virus. Then every time I said don’t use the PC! As I really hate those virus creator.
密码恢复数据还原术 Password and Data Recovery
Assuming that today you put your computer to me. Do you know what I can do with it? As the title, Recover the password and data from your computer which including deleted files. (This is the assumption that, first of all, I am not hacker level in these technology, Furthermore, I do not have this kind of peeping personality. whoever friends send me his or her computer for repair, I will never do this. ) Here just to let you know, When you delete a file in your computer, What Microsoft do is just flag a little “deleted” marking in the harddisk sector, then it is not displayed on your computer system, but the data is still exists. For example, you use the XP, an XP world, XP, XP said you have been deleted, so I don’t show you up. Then let’s say, I put you on another system, called Underworld, Underworld say, I am a detective, I have to see whatever happened, you come out and show me everything. That’s all.
你可以用尽全力删除，之后再用乱码写入同一个磁段覆盖三次，能者还是有办法把数据恢复回来的。更何况你已个Ctrl + Del 就以为了事的，更不在他们话下。
Actually, need not so hard to restore data, unless you are professional. Non-professional has non-professional approach, you would like to try it? Google “EasyRecovery”, this is what I used in the presentation for the Cyber Forensics magic shows. You can take a look at these services too.
You can delete your files as your best, and then over write with garbled character for three times. Those Cyber Forensics Expert will have the ability to restore all them. Moreover, you just hit a Ctrl + Del.
Beside this, your browser or software, IE, FF, Chrome, MSN, Skype, Outlook … they keep the password in computer with some encryption so that you cannot identify them. Try this MsgPassword should be able to reveal something. There are those you can slowly try out http://www.nirsoft.net/.
I am not expert in info tech. Which these are very outdated technology and information. but I just think that everyone should be given some basic information that to know and aware all these. to avoid irreparable mistake cause by ignorance. Hopefully you can aware and do not look down this fat guy in front of you. Only trust who you can trust to use your computer. Use private suft when using public computer. For those expert who has some tiny knowledges please respect others’ privacy to respect yourself. That’s all. All the best.