A large number of user feedback QQ The number was stolen , Tencent responded and apologized ,“ The user has scanned the game login QR code forged by criminals and Authorized login , The login behavior was hijacked and recorded by the gangs , Then it was used by criminals to send bad picture advertisements .” What network security problems have been exposed ?
当前位置:网站首页>What network security problems are exposed when a large-scale QQ number theft event occurs?
What network security problems are exposed when a large-scale QQ number theft event occurs?
2022-06-30 13:42:00 【Zhengzhou Evan Technology】
Take the answer 1:
You have to have a biological code , It's not realistic to have a password for every website
Take the answer 2:
Reference from “ I like eating big meat buns ” The comments
You have to have a biological code , It's not realistic to have a password for every website
How unrealistic I just don't have a website and a password
Fixed string AAAA+ The websites + Fixed number 1234, such as
shuaiTencent2000
shuaiNetease8159
shuaiBattle8159
shuaiDouyin8159
This is not on each site a password on the line , In the face of small websites that may store plaintext passwords , Just use another solution Fixed string BBBB+ The websites + Fixed number 1234, In this way, there is no need to worry about the disclosure of plaintext passwords , Others see the law and guess the password of my big website
Take the answer 3:
The biggest problem exposed is that most people have no sense of safety , such as , How many people have passwords 12345678, 8888888
The passwords set by different websites are the same , Is it safe
边栏推荐
- Golang foundation -- slicing several declaration methods
- [kali] Kali system, software update (with image source)
- Jetpack Compose 实现完美屏幕适配
- WTM major updates, multi tenancy and single sign on
- Simple understanding of the difference between get request and post submission
- Lucky hash quiz system development (source code deployment) fun investment hash game play development (case requirements)
- How does MySQL merge columns?
- [the path of system analyst] Chapter V software engineering (software process improvement)
- numpy 创建空数组 data = np.empty(shape=[1, 64,64,3])
- 【刷题篇】供暖器
猜你喜欢

Embedded development: five C features that may no longer be prohibited

嵌入式开发:5个可能不再被禁止的C特征

【C】 In depth understanding of pointers and callback functions (Introduction to simulating qsort)

Read all the knowledge points about enterprise im in one article

What is erdma as illustrated by Coptic cartoon?
![[Title brushing] coco, who likes bananas](/img/66/5646ac7e644025ccaee7c17f62ce17.png)
[Title brushing] coco, who likes bananas

Multi terminal collaboration of Huawei accounts to create a better internet life

In line with the trend of media integration, Zhongke Wenge and Meishe jointly create digital intelligence media publicity

ABAP toolbox v1.0 (with implementation ideas)

可观测,才可靠:云上自动化运维CloudOps系列沙龙 第一弹
随机推荐
【刷题篇】爱吃香蕉的珂珂
[Title brushing] heater
How to take the first step in digital transformation
More than 20 years after Hong Kong's return, Tupu digital twin Hong Kong Zhuhai Macao Bridge has shocked
第四批入围企业公示——年度TOP100智能网联供应商评选
一次 Keepalived 高可用的事故,让我重学了一遍它!
[Title brushing] coco, who likes bananas
Product manager professional knowledge 50 (7) - how to establish a complete set of user growth system?
正则系列之断言Assertions
Directory related commands
Basic syntax of unity script (2) -record time in unity
【科研数据处理】[基础]类别变量频数分析图表、数值变量分布图表与正态性检验(包含对数正态)
[Title brushing] avoid flooding
Pytorch查看模型参数量和计算量
Golang foundation -- slicing several declaration methods
WTM major updates, multi tenancy and single sign on
为基础性语言摇旗呐喊
[deep anatomy of C language] storage principle of float variable in memory & comparison between pointer variable and "zero value"
With the development of industrial Internet, the landing and application of the Internet has become wider
JS converts an array to a two-dimensional array based on the same value
