fertieg58 |
Informatyk |
|
|
Dołączył: 23 Wrz 2010 |
Posty: 399 |
Przeczytał: 0 tematów
Ostrzeżeń: 0/6
|
Skąd: England |
|
|
|
|
|
|
1, Twitter is to allow users to modify the ID's, ID modified the relationship between the user and other users will not produce change.
2, hacking will own account @ f ***** hu540701 @ f ***** hu with the victim's account reversed.
3,[link widoczny dla zalogowanych], swap ID must have a temporary ID for the transfer, the temporary ID is @ f ***** hu540705.
4, hacking actions were discovered, hacking is prepared to once again reversed, that is, restitution.
5, but reversed course in the second, hacking's original account @ f ***** hu540701 the ID by another user (@ pu ***** an) registered by the.
6, the last victim of ID is restored to @ f ***** hu, but only with Daohao temporary ID @ f ***** hu540705 as the account.
7, was suspected @ pu ***** an up for a new account, and @ f ***** hu540701 given to the ID on.
offer users the \Figure / Jason Ng
hacking came to light in the act, said: \I want black black,[link widoczny dla zalogowanych], the next one is *** (name). \Give you notice, the at 19:07 on July 7, 2010, on-time black ***. \
users screen shots. Figure / Jason Ng
security crisis for this, users should provide some temporary recommendations. For example:
not used before do not use the client, unless there are other prior to \
proposed personal home page space users can build their own Twitter client. At most one or two parameters need to be configured, and then uploaded to the space can be used.
Twitter Oauth provide a more secure login program. Third parties using this approach will not be able to get your Twitter password. Fly in the ointment is that Oauth verification need to open twitter.com, that there may be more difficult for domestic users.
Twitter to e-mail address and user name as login credentials, but the user name can be freely modified, which in fact is rare Web2.0 services. Before the attacker to access Twitter account password,[link widoczny dla zalogowanych], viruses usually send messages or other forms of \.
cnBeta comprehensive report |
|