Product Consultation
Your email address will not be published. Required fields are marked *
The Importance of a Single Monitor Arm for Ergonomic Workspaces
Nov 20,2024Enhancing Productivity and Comfort with LCD Monitor Arms
Nov 13,2024The Future of Ergonomics: Transforming Workspaces with LCD Monitor Arms
Nov 06,2024Choosing the Right Adjustable CPU Holder for Your Needs
Oct 28,2024The Benefits of Adjustable CPU Holders in Modern Workspaces
Oct 23,2024How to Choose the Right Laptop Tray
Oct 16,2024Some companies and government agencies will ensure that confidential computers are completely isolated from the outside world and that the Internet is not connected. But now someone has found a way to get the data out.
Researchers at the University of Ben Gurion in Israel recently found a new way to steal data using noise, DiskFiltration.Cpu Holder Manufacturers
It works by infecting a computer isolated from the Internet with malware that can generate specific audio by controlling the motion of the drive arm on the hard disk.
The confidential digital information in the computer is transmitted to nearby receivers such as smartphones or computers through these specific sound signals. After receiving the noise information, the program converts it into binary information of 0 and 1.
Using this method, they can also steal networked computers protected by a tight security system.
The technology currently has a working range of only 6 feet, a transmission rate of 180 bits per minute, and the ability to steal 4096-bit keys in 25 minutes.
Mordechai Guri, head of the university's Cyber Security Lab, said that although the air gap-isolated computer is completely isolated from the Internet, it is not without flaws. With DiskFiltration they can transfer confidential data from one computer to a nearby mobile phone.
There are a lot of similar technologies at the moment, and researchers at the lab have developed a method of acquiring data from such computers using computer cooling and built-in thermal sensors last year, BitWhisper.
However, these technologies also have very large limitations. For example, if a computer is replaced with a non-mechanical SSD, hackers cannot use DiskFiltration to steal data.
In addition, whether using noise or using thermal sensors to transmit data, the target computer must be infected with malware.
This is very difficult for a computer that completely isolates the Internet, but it is not impossible. Earlier reports said that there were intelligence agencies in the restaurant near the Pentagon deliberately "drop" the U disk, expecting US military staff to insert into the work computer during the meal.
Your email address will not be published. Required fields are marked *
A Home Office Foldable Laptop Notebook Computer Tr...
See DetailsOne of the key features of this monitor arm is its...
See DetailsRevolutionize your work setup with the Aluminum &a...
See DetailsThis sleek and sturdy arm is designed to securely ...
See DetailsAddress: No 3098 Shuanglong Rd, Daqiao Town 314006, Nanhu Area,Jiaxing city, Zhejiang Pro, China
Tel: +86-0573-83222192/+86-18757337928
Fax: +86-0573-83225688
URL: www.jxjmly.com
Email: [email protected]
Copyright © JIAXING JINMAO ALUMINUM INDUSTRY CO., LTD.All Rights Reserved. Monitor Arms Desk Mount Manufacturers Wholesale Monitor Brackets Suppliers