Joke Collection Website - Public benefit messages - Check whether the phone is being monitored.
Check whether the phone is being monitored.
1, SMS peek: After you send a message or make a phone call, check the communication record (communication list) of your number to see if there are any other suspicious communication records. Generally, people who steal information steal private information through text messages.
2. Monitoring software: It is generally necessary to install a monitoring software to monitor a mobile phone, but this kind of software is hidden and difficult to be detected. If you suspect that your mobile phone is being monitored, you can back up the necessary software and data on your mobile phone, and then restore your mobile phone to the factory settings, so that some unknown or potentially threatening software will be disposed of.
3. Hardware judgment: If the phone gets stuck occasionally, the key response will be slower. If the mobile phone is implanted with a chip, when the eavesdropper is listening, you will press the first key while picking up the mobile phone, and there will be a delay of 1~2 seconds, whether playing games or making calls. If the software is implanted, this will not happen.
4. Antivirus software: The system security of Android phones is very low, but you can prevent viruses by installing security guards. If your root phone doesn't install other strange software, it won't be monitored by others. After iphone jailbreak, installing plug-ins has the risk of being monitored.
Counter-monitoring countermeasures
1. Use process monitoring to prevent illegal processes of various monitoring software, such as background automatic recording, three-way call dialing and background SMS sending.
2. Use network monitoring to prevent monitoring data from leaking.
3. Use a black-and-white telephone list to prevent illegal incoming calls and outgoing calls.
4. Black and white list of short messages is adopted to prevent the sending and receiving of illegal short messages.
5. Use peripheral control to prevent the monitoring software from automatically turning on audio devices such as microphones for recording.
6. Hook API functions that may be used by monitoring software, and call the police once these functions are found to be illegally called.
7. Other safety reinforcement measures.
- Previous article:How to identify a simple recruitment scam?
- Next article:Inexplicably, I received an order cancellation message from JD.COM.
- Related articles
- How to make a satellite call and hang up without any hint? Can I answer the satellite phone if I owe money?
- 1 10 Can I report the case by SMS?
- Copywriting about the cold dew solar term
- What warm-hearted behaviors did you encounter during the anti-epidemic period?
- What's the story of play online in 33 and 34 episodes on sunny nights in midsummer?
- Good morning, beautiful friends, short autumn morning, good morning greetings, animated flowers and words?
- Does Chongqing SMS platform company have a good recommendation? Our company needs to use it.
- What will the weather be like in Qinghai in the next few days?
- Send a text message to a secret admirer, but don't reply.
- There are often those harassing calls on mobile phones, what they do and what their purpose is.