传MH370上的IBM工程师发出劫机照片

来源:百度文库 编辑:超级军网 时间:2024/04/28 02:50:44
Freelance journalist: ‘Hijacked flight 370 passenger sent photo from hidden iPhone tracing back to secret U.S. military base Diego Garcia’
March 31, 2014
http://intellihub.com/freelance-journalist-hijacked-flight-370-passenger-sent-photo-hidden-iphone-tracing-back-secret-u-s-military-base-diego-garcia/#.UzpymBBk0BE.facebook

Is passenger Phillip Wood and others still alive after flight 370 was hijacked then taken to a secret U.S. military base located on a remote island in the Indian Ocean?

By Shepard Ambellas

INDIAN OCEAN (INTELLIHUB) — According to freelance journalist Jim Stone, one of the American passengers, Phillip Wood, a technical storage executive at IBM, who was aboard the now missing Malaysian Airlines flight, keystered his iPhone 5 in his anus after the Boeing 777 carrying 239 people was hijacked by military personnel while on route to China.

Amazingly, Stone claims that metadata within the photo yields evidence confirming “100 percent” that Phillip Wood sent the photo, along with a brief voice activated text, from GPS coordinates which put Wood only a few miles away from the U.S. controlled Diego Garcia military base which is located on an island south of the Maldives in the Indian Ocean. In his post Stone claims that the coordinates may be off by a few miles (see update below post), proving that the iPhone actually sent the otherwise blank black picture revealing nothing else. Stone speculates the picture was taken in a dark room or in some position in which Wood’s hands were bound.

As reported by Stone, the picture was posted along with the following text allegedly from Wood:

“I have been held hostage by unknown military personal after my flight was hijacked (blindfolded). I work for IBM and I have managed to hide my cellphone in my ass during the hijack. I have been separated from the rest of the passengers and I am in a cell. My name is Philip Wood. I think I have been drugged as well and cannot think clearly.”

Strangely the blank black image labeled “1395192158752.jpg” contains the following metadata:

1395192158752Dimensions: 240 x 320

Device Make: Apple

Device Model: iPhone 5

Color Space: RGB

Color Profile: sRGB IEC61966-2.1

Focal Length: 4.12

Alpha Channel: No

Red Eye: No

F Number: 2.4

Exposure Program: 2

Exposure Time: 1/15

Stone also points out in detail how the above Exchangeable Image Format (EXIF) image data is the “smoking gun”, writing:

The Exif is intact. Exif data gets embedded in every image by every camera and includes the circumstances under which the photo was taken. It can be viewed by saving the image to your desktop, and then right clicking it and selecting image properties. Hit the details tab. You can see that the image was taken on March 18 with an iPhone 5, with the ISO at 3200 and a shutter of 1/15. The coordinates are included in the exif data because the iPhone knows where it is, and the coordinates are for Diego Garcia. THE FIRST TIME A BLANK PHOTO SAID IT ALL.

Exif can’t be rewritten with common software, it can only be added to in fields such as image credits with some advanced applications. It can be erased as well but NOT CHANGED. Photos with the exif intact will hold up in court. If the Exif is hacked and this is not real, the CIA or a really good hacker did this, which I doubt, I’d say it’s probably real.

Another smoking gun is that the voice recognition software put the word personal instead of personnel. This is completely consistent with a blind software assisted dial out.

Surrounding this story is the fact that the man who managed to get this information to Farganne (forum member Glitch) was harassed and received many threatening voice mails over it, that is another piece of evidence pointing to this as being real. One thing is certain, once it’s posted here on this site the genie is OUT OF THE BOTTLE. I cannot stress how important it is that the GPS coordinates in the photo do not perfectly match what Google says and are not posted anywhere on the web, because it proves that the source of those coordinates did not come from google or Wikipedia, they really did come from the imaging device and it HAD TO be at Diego Garcia when it took the photo.

Interestingly, 7-days ago, on March 24, 2014  at 2:30 AM EDT, it was reported by Intellihub News that flight 370 landed at Diego Garcia, a secret U.S. military base leased from the EU, during the early morning hours of March 8, 2014 after a YouTuber by the name of Montagraph put two-and-two together following other reports.

An excerpt from the article reads:

“[...] MH370 most likely landed at Diego Garcia and the plane may have been ushered into a massive “Faraday cage” style hangar to avoid passengers from communicating with the outside world.”


Surprisingly, this all dovetails with a Malaysian Insider report released on Mar. 18 titled “US military base, South Asian airports in MH370 pilot’s simulator, says paper“, as the pilot of MH370 was found to have had scale simulations of Diego Garcia in his home flight simulator.

An except from the Malaysian Insider reads:

Investigations into the flight simulator taken from the missing pilot’s home showed a software for five practice runways, including one belonging to the United States, Berita Harian reported today.

“Among the software we checked so far is the Male International Airport in Maldives, three airports in India and Sri Lanka, and one belonging to the US military base in Diego Garcia. All have a runway length of 1,000 metres,” a source told the Malay daily.

Police seized the flight simulator from pilot Captain Zaharie Ahmad Shah’s house last Saturday before reassembling it at the federal police headquarters in Bukit Aman, where experts were conducting checks.

If anyone has anymore information on this matter we urge you contact us at Intellihub News right away.

Update 2:49 PM EST

The following information was posted as a tip on Steve Quayle’s website:

Hi Steve,

Re: the black/blank photo from the IBM tech on the lost Malaysian jet. The photo was taken inside a building just off the runways at Diego Garcia. I put the photo into my editing software, grabbed the GPS point and here it is. Try this: go to: itouchmap.com , choose #6, go to the bottom right box and input the info:

-7 18 58.3 LATITUDE

72 25 35.6 LONGITUDE

Click on: SHOW POINT

Zoom in and you will see where the photo originated. Wow. You’ll probably recognize the heavy aircraft parked nearby.

Image Via itouchmap.com:

(SteveQuyale.com)
(Via SteveQuyale.com)

(Featured photo at top of page: Wikimedia Commons)

Intellihub’s exclusive MH370 Coverage:

Rothschild owned Blackstone Group benefits from missing flight 370, becoming primary patent holder of new technology, reports say

Partner of MH370 passenger acuses governments of cover up on BBC

Full manifest: Flight 370 — As released by Malaysian authorities

15 questions about flight MH370 that the media isn’t asking

YouTube Investigator: ‘Flight 370 landed at Diego Garcia military base, plane and passengers then put in a Faraday style hangar’

Malaysia says there is sealed MH370 “evidence” that cannot be made public

Full Transcript: MH370′s radio transmissions before it went dark

Why was the Malaysian MH370 flight not detected by the Diego Garcia US Naval and Intelligence Base in the Indian Ocean?

Failure to find Malaysia Airlines flight MH370 sparks Chinese consideration to surveil the world.
发出消息的人据称是被蒙了眼罩,美国军事人员要蒙住一个人眼睛的时候,一般都是通过头上罩一个不能取下的袋子来完成的,这样这位工程师的手是可以自由活动的。
这也许有可能让他从屁股后面摸出iphone5(通过数据获取的事实),并通过声控功能让手机登录然后发出讯息。这就解释了他发出的只是一张黑的照片,因为他看不见东西,随手拍了照片,把当时的情况发出来而已。
  坐标:通过照片上的数据信息显示的附加地理位置坐标,尚不能确定这张发在网上的照片能与谷歌坐标系或其他坐标系的迭戈加西亚位置相匹配,但仍然是在其区域内,而且可以证明这张照片并非线下制作的图片,由此说明这并非一场骗局,而是明确说明这就是一张由iphone拍摄的发自迭戈加西亚地区的照片。
  原始情况追述:
  被劫持的370客机上的工程师是定期向互联网发送讯息的。
  这张看起来很黑的图片是由被关在一个黑屋的IBM工程师拍的,画面太黑是因为小屋太暗了,但是上面附加有关键的数据-迭戈加西亚的坐标,即照片的拍摄地点。这是真实的,并非骗人。图片的坐标由谷歌官方地图显示是在迭戈加西亚3英里的范围内。目前不太清楚谷歌是怎么注意到的,由于偏离了(迭戈加西亚)数英里远,所以没有人在谷歌上搜索到(这张图片),这也能说明照片的真实性。我不知道岛有多大,但是它有跑道,就比较符合了。
  图片中的短文说明如下:飞机遭劫持后我被一伙不明武装分子作为人质蒙上了眼罩,我来自IBM,在飞机被劫持时我将我的iphone手机藏在了屁股下面,我被单独关在一个小房间里,我叫飞利浦。伍德,我想我可能被下了药,思考不是很清晰。
  如陨石撞击般的消息更新:骗局论者说从没有一个叫飞利浦。伍德的人在IBM工作过,但是他的LINKDIN挫败了此一谎言并证实了以下讯息:
  数据信息暴露大阴谋
  数据信息是不完整的。一般每部相机在拍摄时都会在照片上加入环境类的信息,当把这张存下来的照片通过点击右键选择属性后就能看到这些信息。这张照片通过点击详讯按钮,可知这张照片是用iphone的摄像头拍摄于3月18日,ISO3200,快门1/15,iphone的功能也因此给它附上了地理位置讯息,并且就是迭戈加西亚的地理坐标,这是第一次一张黑图片告诉了我们全部消息。
  普通的软件是无法修改这些数据信息的,要追加现场位置必须要使用功能强大的图片编辑软件,何况讯息只能被删除而不能做修改。即使不完整的图片上的数据信息,都可以作为呈堂证供。这张照片只可能被CIA或黑客高手做修改(意思是他们完全没必要这样做)。
  事实是获取图片的人在把它放到某个论坛上后收了人身威胁电话,这其实从侧面印证了照片的真实性,其实这一张照片已经足以让真想水落石出了,正是因为图片不是完全匹配迭戈加西亚的谷歌坐标,才足以说明这不是谷歌或维基解密有意为之,它是来自于位于迭戈加西亚的某个相机。

-----------------------------------------

  两天前登的,非愚人节消息。
  另外马航说了,4个ELT应急定位发射机,除了便携的一个,另外3个不能人为关闭(2个在紧急门里的滑梯上)。重降过载或沾水即启动。但现在却没收到任何一个ELT信号(军民雷达多频率信号,卫星接收不可能忽略)。黑匣子也没信号。
  4重备份的ELT,都出故障或都摔坏的概率为零。无论如何理解,我只能认为飞机是平稳降落了。绝不可能是油尽坠毁。即便是飞机员技艺超凡,平稳迫降于波涛汹涌的印度洋后来整个飞机完整地沉了(可能性零),ELT触发也是肯定的。

  所以飞机肯定在某处。
  再看整个印度洋,能藏这么大一架飞机的也只有这个迪戈加西亚美军基地了。天然的没有外人能去检查。没有平民能去发现报告,虽然当地有一千居民。
Freelance journalist: ‘Hijacked flight 370 passenger sent photo from hidden iPhone tracing back to secret U.S. military base Diego Garcia’
March 31, 2014
http://intellihub.com/freelance-journalist-hijacked-flight-370-passenger-sent-photo-hidden-iphone-tracing-back-secret-u-s-military-base-diego-garcia/#.UzpymBBk0BE.facebook

Is passenger Phillip Wood and others still alive after flight 370 was hijacked then taken to a secret U.S. military base located on a remote island in the Indian Ocean?

By Shepard Ambellas

INDIAN OCEAN (INTELLIHUB) — According to freelance journalist Jim Stone, one of the American passengers, Phillip Wood, a technical storage executive at IBM, who was aboard the now missing Malaysian Airlines flight, keystered his iPhone 5 in his anus after the Boeing 777 carrying 239 people was hijacked by military personnel while on route to China.

Amazingly, Stone claims that metadata within the photo yields evidence confirming “100 percent” that Phillip Wood sent the photo, along with a brief voice activated text, from GPS coordinates which put Wood only a few miles away from the U.S. controlled Diego Garcia military base which is located on an island south of the Maldives in the Indian Ocean. In his post Stone claims that the coordinates may be off by a few miles (see update below post), proving that the iPhone actually sent the otherwise blank black picture revealing nothing else. Stone speculates the picture was taken in a dark room or in some position in which Wood’s hands were bound.

As reported by Stone, the picture was posted along with the following text allegedly from Wood:

“I have been held hostage by unknown military personal after my flight was hijacked (blindfolded). I work for IBM and I have managed to hide my cellphone in my ass during the hijack. I have been separated from the rest of the passengers and I am in a cell. My name is Philip Wood. I think I have been drugged as well and cannot think clearly.”

Strangely the blank black image labeled “1395192158752.jpg” contains the following metadata:

1395192158752Dimensions: 240 x 320

Device Make: Apple

Device Model: iPhone 5

Color Space: RGB

Color Profile: sRGB IEC61966-2.1

Focal Length: 4.12

Alpha Channel: No

Red Eye: No

F Number: 2.4

Exposure Program: 2

Exposure Time: 1/15

Stone also points out in detail how the above Exchangeable Image Format (EXIF) image data is the “smoking gun”, writing:

The Exif is intact. Exif data gets embedded in every image by every camera and includes the circumstances under which the photo was taken. It can be viewed by saving the image to your desktop, and then right clicking it and selecting image properties. Hit the details tab. You can see that the image was taken on March 18 with an iPhone 5, with the ISO at 3200 and a shutter of 1/15. The coordinates are included in the exif data because the iPhone knows where it is, and the coordinates are for Diego Garcia. THE FIRST TIME A BLANK PHOTO SAID IT ALL.

Exif can’t be rewritten with common software, it can only be added to in fields such as image credits with some advanced applications. It can be erased as well but NOT CHANGED. Photos with the exif intact will hold up in court. If the Exif is hacked and this is not real, the CIA or a really good hacker did this, which I doubt, I’d say it’s probably real.

Another smoking gun is that the voice recognition software put the word personal instead of personnel. This is completely consistent with a blind software assisted dial out.

Surrounding this story is the fact that the man who managed to get this information to Farganne (forum member Glitch) was harassed and received many threatening voice mails over it, that is another piece of evidence pointing to this as being real. One thing is certain, once it’s posted here on this site the genie is OUT OF THE BOTTLE. I cannot stress how important it is that the GPS coordinates in the photo do not perfectly match what Google says and are not posted anywhere on the web, because it proves that the source of those coordinates did not come from google or Wikipedia, they really did come from the imaging device and it HAD TO be at Diego Garcia when it took the photo.

Interestingly, 7-days ago, on March 24, 2014  at 2:30 AM EDT, it was reported by Intellihub News that flight 370 landed at Diego Garcia, a secret U.S. military base leased from the EU, during the early morning hours of March 8, 2014 after a YouTuber by the name of Montagraph put two-and-two together following other reports.

An excerpt from the article reads:

“[...] MH370 most likely landed at Diego Garcia and the plane may have been ushered into a massive “Faraday cage” style hangar to avoid passengers from communicating with the outside world.”


Surprisingly, this all dovetails with a Malaysian Insider report released on Mar. 18 titled “US military base, South Asian airports in MH370 pilot’s simulator, says paper“, as the pilot of MH370 was found to have had scale simulations of Diego Garcia in his home flight simulator.

An except from the Malaysian Insider reads:

Investigations into the flight simulator taken from the missing pilot’s home showed a software for five practice runways, including one belonging to the United States, Berita Harian reported today.

“Among the software we checked so far is the Male International Airport in Maldives, three airports in India and Sri Lanka, and one belonging to the US military base in Diego Garcia. All have a runway length of 1,000 metres,” a source told the Malay daily.

Police seized the flight simulator from pilot Captain Zaharie Ahmad Shah’s house last Saturday before reassembling it at the federal police headquarters in Bukit Aman, where experts were conducting checks.

If anyone has anymore information on this matter we urge you contact us at Intellihub News right away.

Update 2:49 PM EST

The following information was posted as a tip on Steve Quayle’s website:

Hi Steve,

Re: the black/blank photo from the IBM tech on the lost Malaysian jet. The photo was taken inside a building just off the runways at Diego Garcia. I put the photo into my editing software, grabbed the GPS point and here it is. Try this: go to: itouchmap.com , choose #6, go to the bottom right box and input the info:

-7 18 58.3 LATITUDE

72 25 35.6 LONGITUDE

Click on: SHOW POINT

Zoom in and you will see where the photo originated. Wow. You’ll probably recognize the heavy aircraft parked nearby.

Image Via itouchmap.com:

(SteveQuyale.com)
(Via SteveQuyale.com)

(Featured photo at top of page: Wikimedia Commons)

Intellihub’s exclusive MH370 Coverage:

Rothschild owned Blackstone Group benefits from missing flight 370, becoming primary patent holder of new technology, reports say

Partner of MH370 passenger acuses governments of cover up on BBC

Full manifest: Flight 370 — As released by Malaysian authorities

15 questions about flight MH370 that the media isn’t asking

YouTube Investigator: ‘Flight 370 landed at Diego Garcia military base, plane and passengers then put in a Faraday style hangar’

Malaysia says there is sealed MH370 “evidence” that cannot be made public

Full Transcript: MH370′s radio transmissions before it went dark

Why was the Malaysian MH370 flight not detected by the Diego Garcia US Naval and Intelligence Base in the Indian Ocean?

Failure to find Malaysia Airlines flight MH370 sparks Chinese consideration to surveil the world.
发出消息的人据称是被蒙了眼罩,美国军事人员要蒙住一个人眼睛的时候,一般都是通过头上罩一个不能取下的袋子来完成的,这样这位工程师的手是可以自由活动的。
这也许有可能让他从屁股后面摸出iphone5(通过数据获取的事实),并通过声控功能让手机登录然后发出讯息。这就解释了他发出的只是一张黑的照片,因为他看不见东西,随手拍了照片,把当时的情况发出来而已。
  坐标:通过照片上的数据信息显示的附加地理位置坐标,尚不能确定这张发在网上的照片能与谷歌坐标系或其他坐标系的迭戈加西亚位置相匹配,但仍然是在其区域内,而且可以证明这张照片并非线下制作的图片,由此说明这并非一场骗局,而是明确说明这就是一张由iphone拍摄的发自迭戈加西亚地区的照片。
  原始情况追述:
  被劫持的370客机上的工程师是定期向互联网发送讯息的。
  这张看起来很黑的图片是由被关在一个黑屋的IBM工程师拍的,画面太黑是因为小屋太暗了,但是上面附加有关键的数据-迭戈加西亚的坐标,即照片的拍摄地点。这是真实的,并非骗人。图片的坐标由谷歌官方地图显示是在迭戈加西亚3英里的范围内。目前不太清楚谷歌是怎么注意到的,由于偏离了(迭戈加西亚)数英里远,所以没有人在谷歌上搜索到(这张图片),这也能说明照片的真实性。我不知道岛有多大,但是它有跑道,就比较符合了。
  图片中的短文说明如下:飞机遭劫持后我被一伙不明武装分子作为人质蒙上了眼罩,我来自IBM,在飞机被劫持时我将我的iphone手机藏在了屁股下面,我被单独关在一个小房间里,我叫飞利浦。伍德,我想我可能被下了药,思考不是很清晰。
  如陨石撞击般的消息更新:骗局论者说从没有一个叫飞利浦。伍德的人在IBM工作过,但是他的LINKDIN挫败了此一谎言并证实了以下讯息:
  数据信息暴露大阴谋
  数据信息是不完整的。一般每部相机在拍摄时都会在照片上加入环境类的信息,当把这张存下来的照片通过点击右键选择属性后就能看到这些信息。这张照片通过点击详讯按钮,可知这张照片是用iphone的摄像头拍摄于3月18日,ISO3200,快门1/15,iphone的功能也因此给它附上了地理位置讯息,并且就是迭戈加西亚的地理坐标,这是第一次一张黑图片告诉了我们全部消息。
  普通的软件是无法修改这些数据信息的,要追加现场位置必须要使用功能强大的图片编辑软件,何况讯息只能被删除而不能做修改。即使不完整的图片上的数据信息,都可以作为呈堂证供。这张照片只可能被CIA或黑客高手做修改(意思是他们完全没必要这样做)。
  事实是获取图片的人在把它放到某个论坛上后收了人身威胁电话,这其实从侧面印证了照片的真实性,其实这一张照片已经足以让真想水落石出了,正是因为图片不是完全匹配迭戈加西亚的谷歌坐标,才足以说明这不是谷歌或维基解密有意为之,它是来自于位于迭戈加西亚的某个相机。

-----------------------------------------

  两天前登的,非愚人节消息。
  另外马航说了,4个ELT应急定位发射机,除了便携的一个,另外3个不能人为关闭(2个在紧急门里的滑梯上)。重降过载或沾水即启动。但现在却没收到任何一个ELT信号(军民雷达多频率信号,卫星接收不可能忽略)。黑匣子也没信号。
  4重备份的ELT,都出故障或都摔坏的概率为零。无论如何理解,我只能认为飞机是平稳降落了。绝不可能是油尽坠毁。即便是飞机员技艺超凡,平稳迫降于波涛汹涌的印度洋后来整个飞机完整地沉了(可能性零),ELT触发也是肯定的。

  所以飞机肯定在某处。
  再看整个印度洋,能藏这么大一架飞机的也只有这个迪戈加西亚美军基地了。天然的没有外人能去检查。没有平民能去发现报告,虽然当地有一千居民。
居然没人关注这个帖子?MH370仍有可能就在某处啊,真相也许永远不为人知了!
神棍        
丫上哪找基站?
西门吸血 发表于 2014-4-4 13:07
丫上哪找基站?
有一种可能,美军的内部便携式WIFI是有可能的

因为是美军内部WIFI可能监控也没有涉及到这个范围。

也许是烟幕弹
大使说了,事件超乎想象。
有一种可能,美军的内部便携式WIFI是有可能的

因为是美军内部WIFI可能监控也没有涉及到这个范围。
美军的wifi木有密码
美军的wifi木有密码
MD的密码是12345678
jelly1988 发表于 2014-4-4 13:18
美军的wifi木有密码
有种迷你便携WIFI接网线上,可以有线变无线

只要找到有网口的线头就行

太扯了,希望如此

swsky 发表于 2014-4-4 13:11
有一种可能,美军的内部便携式WIFI是有可能的

因为是美军内部WIFI可能监控也没有涉及到这个范围。


Y那里找的WIFI????

美军难道是大无畏的雷锋军队??  免费覆盖全球天空提供WIFI,免费提供密码,然后卫星上架设一个超级大的免费接收天线,就是为了接收苹果的wifi信号???

我的苹果可是隔二堵墙就收不到家里的wifi信号了。。
swsky 发表于 2014-4-4 13:11
有一种可能,美军的内部便携式WIFI是有可能的

因为是美军内部WIFI可能监控也没有涉及到这个范围。


Y那里找的WIFI????

美军难道是大无畏的雷锋军队??  免费覆盖全球天空提供WIFI,免费提供密码,然后卫星上架设一个超级大的免费接收天线,就是为了接收苹果的wifi信号???

我的苹果可是隔二堵墙就收不到家里的wifi信号了。。
好吧,我们必须登岛检查了!
那个,观海,过来一下...



拜托各位去京东找一下,迷你无线路由器,或者无线AP

不到100块钱,直接找个网线线头一插上就能当WIFI用

可以不用密码的
xsty991 发表于 2014-4-4 13:30
Y那里找的WIFI????


拜托各位去京东找一下,迷你无线路由器,或者无线AP

不到100块钱,直接找个网线线头一插上就能当WIFI用

可以不用密码的
美国人会搜身把手机都收缴了吧,不会让他有手机照相的
策划这个行动的人一定是2B,关押点居然连无线屏蔽都不搞
不轻信这种美国人的说法
swsky 发表于 2014-4-4 13:33
拜托各位去京东找一下,迷你无线路由器,或者无线AP

不到100块钱,直接找个网线线头一插上就能当WIF ...
那请问你的无限路由器,无线AP要X个网线接头,又X在美军的那个机器上呢??

这是个无限循环啊。

你会告诉我,随便找个ADSL或者光猫,就有接口啊,是不是啊!

漏洞太多 我都懒得指出了
我就希望,这种MH370的谣言能不能少一点,看了烦
可能是故意放出来的信息
xsty991 发表于 2014-4-4 13:42
那请问你的无限路由器,无线AP要X个网线接头,又X在美军的那个机器上呢??

这是个无限循环啊。
无线AP不用专门接电脑啊,手机 IPAD都可以用,你没用过无线AP吧

快一个月了,毫无头绪,实在蹊跷
张教授上次说最可能去了沙特或索马里
swsky 发表于 2014-4-4 13:33
拜托各位去京东找一下,迷你无线路由器,或者无线AP

不到100块钱,直接找个网线线头一插上就能当WIF ...
吹吧,这种军事基地的网络都是监控的,能上网的机器都登记过的机器ID号,没有匹配的ID连接上网线都登不进网络,给你个便携式WIFI也没用。
有新的消息吗
odinyang 发表于 2014-4-4 13:47
吹吧,这种军事基地的网络都是监控的,能上网的机器都登记过的机器ID号,没有匹配的ID连接上网线都登不进 ...
这个。。。。。。。需要弱电专业人士来解答
@妖道
swsky 发表于 2014-4-4 13:55
这个。。。。。。。需要弱电专业人士来解答
@妖道
不说军事基地,空客的总装厂我就去过,第一步就是签安全协议,登记你的电脑ID,然后发个账户密码给你,不然你电脑连上去也没网用,还会被安保人员查到位置来找你。
odinyang 发表于 2014-4-4 14:04
不说军事基地,空客的总装厂我就去过,第一步就是签安全协议,登记你的电脑ID,然后发个账户密码给你,不 ...
奇怪了我去外高桥INTEL接电信的光纤都没你这个规定

odinyang 发表于 2014-4-4 14:04
不说军事基地,空客的总装厂我就去过,第一步就是签安全协议,登记你的电脑ID,然后发个账户密码给你,不 ...
我知道你说的是什么模式了

这个模式和锦江之星还有7天如家那种上网方式一样

问题在于。。。。。。。前段时间2000万住宿信息是怎么泄露的?

swsky 发表于 2014-4-4 13:45
无线AP不用专门接电脑啊,手机 IPAD都可以用,你没用过无线AP吧


说你傻,你还真傻啊。。。

能用无线AP的话,手机不就直接就能无线上网了,还AP个头!

你不会告诉我,美军本来有光纤宽带,为了安抚人质,特开通wifi人质打发时间,并且免费提供密码吧。。。


swsky 发表于 2014-4-4 13:45
无线AP不用专门接电脑啊,手机 IPAD都可以用,你没用过无线AP吧


说你傻,你还真傻啊。。。

能用无线AP的话,手机不就直接就能无线上网了,还AP个头!

你不会告诉我,美军本来有光纤宽带,为了安抚人质,特开通wifi人质打发时间,并且免费提供密码吧。。。

这个。。。。。。。需要弱电专业人士来解答
@妖道
Id,是mac地址吧,或者固定ip,但现实情况不一样,看保密级别
swsky 发表于 2014-4-4 14:11
我知道你说的是什么模式了

这个模式和锦江之星还有7天如家那种上网方式一样
建议你去看看美剧《绑架危机》,看看人家美帝的专业绑匪是怎么隔离人质的。
这个。。。。。。。需要弱电专业人士来解答
@妖道
俺道理来讲外来设备很难接入到以设定的网段里,我没见过现场,对霉菌也不了解,不知道他们的生活与保密网络是不是分开的,保密的内网是别指望了,没有管理员的分配批准,谁也别想进去,但是俺电影里美帝那个尿性,保不准他们自己搞出来链接intel的娱乐网,另外别说ap密码这玩意,根据习惯不同,有些地方就不设密码,比方说,我单位就不设,老美的信用卡就没密码
swsky 发表于 2014-4-4 13:45
无线AP不用专门接电脑啊,手机 IPAD都可以用,你没用过无线AP吧
是你没用过吧。。你听懂他说神马不?
xsty991 发表于 2014-4-4 14:12
说你傻,你还真傻啊。。。

能用无线AP的话,手机不就直接就能无线上网了,还AP个头!
你到底用过无线AP没有啊

谁告诉你能用无线AP的地方手机直接能无线上网的?
妖道 发表于 2014-4-4 14:31
俺道理来讲外来设备很难接入到以设定的网段里,我没见过现场,对霉菌也不了解,不知道他们的生活与保密网 ...
自己接AP默认是空密码
odinyang 发表于 2014-4-4 14:19
建议你去看看美剧《绑架危机》,看看人家美帝的专业绑匪是怎么隔离人质的。

如果是IBM的技术工程师,我认为这不是难题

只要找一根能够接上外网的网线就可以
如果是IBM的技术工程师,我认为这不是难题

只要找一根能够接上外网的网线就可以
我没去过那个美军基地,不知道他那的线缆敷设情况,但是吧,尼能确保他里面没有生活区?生活区里没wifi?老美对wifi设不设密码我不知道,但是我知道他们的信用卡没密码
妖道 发表于 2014-4-4 14:49
我没去过那个美军基地,不知道他那的线缆敷设情况,但是吧,尼能确保他里面没有生活区?生活区里没wifi? ...
生活区找根网线线头不难撒

swsky 发表于 2014-4-4 14:52
生活区找根网线线头不难撒
连稍微大一点的公司、单位的网络设备接入都是需要许可、再接入了。得事先将接入社会的MAC地址或IPD地址丢到白名单里,才能接入网络了。
你以为是个网络,插个无线路由就可以上网了,还是美军的网络。。。。