Password is a common thing that we know as our account lock or ID tool in Network, we should not underestimate about this password if we have various accounts in cyberspace. Eg for IDs on social networks like Facebook, Tweeter, Google Plus etc. We have to lock them up with PASSWORD because they represent us when we live in cyberspace.
If our passwords fall into the hands of irresponsible people, then like a body that is possessed by the evil spirit of our ID in cyberspace behave outside our habits, right? For example, we do not want not if suddenly arrived in our wall or facebook page full of images indecent images? We ourselves can not possibly do anything out of morality, but password slackers may have some kind of intentions against our IDs. What can they do if they for example can master our ID because the key to enter them has taken over ?.
They can change the password, they are free to post pictures, status, change password so that we can not login again to our account. They can peek at our private conversations in the inbox that may contain very personal things, then pass it on to the public. This applies not only to Facebook accounts, the effect can be the same to tweeters, google plus, BBM, WhatApp etc.
So what if the password is related to Cloud? Suppose we already have a paid OneDrivenya Microsoft account, Apple iCloudnya containing sensitive data data and secret secret that menyangku money and the number of important transactions, not imagine deh we can be sure are in serious trouble!
So We should note this: Password must be on guard.
In the present time almost everyone has Android and iOS smart phones, mobile phones are also sometimes must be in the "key". Well different from locking web applications such as Facebook and Cloud Store, sometimes phones, tablets and even laptops can be locked with fingerprint, face and voice recognition camera and of course with Password ..
On the fingerprint lock "home" button the phone can recognize the owner's fingerprint after being scanned several times as an identifier then the phone will not accept anyone's finger other than the finger of the phone owner as its opening. It seems to be quite safe considering that even though nearly 7 billion people live on earth, none of them have the same fingerprint patterns. So your phone is safe?
Wait! Your phone is unsafe because a 5-year-old boy is trying to unlock his father's locked cellphone and he does not lose his mind when his father falls asleep he grabs his father's hand then he touches his father's thumb to the iPhone home button and the phone is open! In a more sophisticated case, a hacker can steal fingerprint data in government databases via online passport data and print them 3 dimensions then touch the fingerprint pattern prints to stolen iPhone homes, and it works. If so the fingerprint lock is not 100% safe.
Then what about face recognition keys? Whether on a phone, tablet or laptop and PC this app relies on the camera as a reader and facial identifier, a locked device can only be opened with the face of the owner or user of the device, if the camera does not recognize the face of a person the device will remain locked. But once again hackers never lose the mind looking for loopholes and weaknesses of this lock. In a very simple way, taking pictures of the device owner's face from afar and making it paspoto and then closing it to the camera device, the device immediately opens because the camera knows the face of the image as the face of the device owner!
DROUGHT OF PASSWORD DROPPING FOR INGREDIENTS
If you can change the password it is scheduled and has a separate secret record that only you know for security, especially for IOS devices. Although for now some types of Android devices like Xiomi follow-up to emulate Apple's security system on their devices.
Then what about the pattern? In android phone pattern is commonly used as a lock and unlock device, but by looking at your hand gestures and remembering a hacker easily remember the movement of your hand. Moreover, regular regularity on the screen can leave a trail. Likewise when we use voice recognition passwords when opening the device, someone can record your voice with other pnsel and keep it silent, and one day can use "command" to open our phone.
Of course, the type of lock alternative above is very simple and easy to use with the reason not to need to forget if you forget the password, yet you just touch or stay turned on the device and camera to recognize our face, but once the device is open password
OPENING EXPERIENCE OF LOCKED iPAD
Reviewed by Musicku cover project
on
June 17, 2018
Rating:
Reviewed by Musicku cover project
on
June 17, 2018
Rating:

No comments: