Joke Collection Website - Public benefit messages - Will the police care if they are bombarded by other people's text messages and always brush the verification code to call the police?

Will the police care if they are bombarded by other people's text messages and always brush the verification code to call the police?

Generally speaking, I don't care.

Yesterday, the reporter searched for the keyword "SMS Bombing" on the Internet and found that there are indeed a large number of "SMS Bombing" software on the Internet, including the web version and the mobile version. As long as you enter the mobile phone number, the registration verification information of each website will be sent to the mobile phone number in a short time.

Take one of the short message bombing software based on network as an example. Enter the number to bomb in the Bombing Console, and click "Start Bombing Thread" to stop bombing when closing or refreshing the page.

In view of the fact that few messages were actually received after the bombing, the software explained that "the SMS sending interface, operators and other factors may cause information to be delayed or unable to be sent." As for how to solve the problem of "harassment" of bombing victims, the software said that "it can't be solved, and only the owner can be advised to turn off the phone".

Precautions for Internet operation:

1. Do not arbitrarily add strangers as QQ friends or WeChat friends, and do not casually accept their video or voice chat requests to avoid port attacks or personal privacy disclosure;

2. Don't open links to unknown websites at will, especially links to bad websites. When strangers send links to themselves through QQ, try not to open them;

3. Don't open emails and attachments of unknown origin casually, so as to avoid the equipment being infected with viruses, which will make the equipment unusable or the hard disk formatted;

4. Don't click on suspicious websites or pop up advertisements casually to prevent the browser from being unusable due to malicious attacks, and may also disclose sensitive files on personal terminals;

5. Try to set the file extension to open, and confirm the file attributes before opening, so as to prevent malicious files from forging icons and causing the computer to be infected with malicious viruses;

6. Don't make inappropriate comments on public platforms such as Weibo and BBS, and surf the Internet in a civilized way.