Computer problems caused by electromagnetic radiation leaks in various countries attach great importance to prevent the spread of this information in the air, must be taken to suppress electromagnetic radiation leakage protection and special technical measures, technical measures in this regard: Tempest Technology, interference and shielding. cell phone jammer applies the self-protection technology. TEMPEST technology, also known as computer security technology, information leakage, transient electromagnetic radiation is to take the standard English Transient Electromagnetic Pulse Emanation Standard abbreviations; TEMPEST originated in the United States, a top-secret National Security Agency program, it is to control the emission of electronic equipment leaks Code. The plan includes: information disclosure in electronic equipment (electromagnetic, acoustic) signal detection; information leakage suppression. TEMPEST technology research include the following: technical standards and specifications of; test methods and test equipment research; protection and manufacturing technology; services, consulting and management methods. TEMPEST technology used in the main measures include: filtering, shielding, interference, grounding and isolation measures, and these measures can also be used in combination.
Computer technology-based electronics and communications technology and the rapid development and wide application, for our production and living with a great convenience, a variety of electronic products, reaching out to every corner of society, to people's lives always provide real-time information. cell phone jammer will act on the cell phone replacing with other electronic equipments. At the same time, a variety of electrical and electronic products generated by the electromagnetic radiation is also troubled us. For its part, the electromagnetic radiation is normal and consistent routine, but for other instruments, equipment, especially high precision equipment, its impact is very harmful, and is called electromagnetic interference and . cell phone jammer will act on the cell phone but not the human body. Also in the computer network system, these radiation carry computer data being processed, the use of specialized receiving equipment to receive electromagnetic radiation of these down, after treatment, restore the original information can be restored, so the resulting radiation is the most likely to cause leaks. According to reports, some countries have now developed in a kilometer away to restore your computer to receive information on the electromagnetic radiation device, disclosure of this information means that adversaries can be timely, accurate, extensive, continuous and hidden access to information. cell phone jammer is with high precision. Computer applications in the U.S. and Europe earlier, computer equipment, radiation has long been studied, in the 1967 annual meeting of the U.S. computer scientists Dr. Wei Er published a set of papers vulnerability of computer systems, summarizes the four aspects of the vulnerability of computer , namely: communication lines of the radiation; processor radiation; conversion equipment of radiation; radiation output device.
The short circuit may happen for cellular phone jammer if the self-protection doesn’t work. Currently, the prevention of computer information systems for the TEMPEST technology, the main means of electromagnetic shielding and electromagnetic interference, while in reality they are mainly used in electromagnetic shielding. The main purpose of electromagnetic shielding is used to prevent high-frequency electromagnetic fields, so as to effectively control the electromagnetic waves from one area to another area of radiation propagation.
No comments:
Post a Comment