CodePudding user response:
First company have security measures, you shouldn't do this;Secondly, technically, judged according to the quality of your mention the problem, can only tell you what is better to be who tied the bell,
CodePudding user response:
Using a mobile phone photos to the screen,CodePudding user response:
Unanswered ~ in the encryptionCodePudding user response:
Miss zhao said good, camera taking pictures, ha ha!CodePudding user response:
No more but the shield,Also have thorns no broken spear!
CodePudding user response:
I want to say is that this idea can be difficult to achieve, in our company, our company USES is cool bull network IP - guard there are two problems to solve will:1. Cool cattle network IP - guard U disk control function must be breakthrough, system set up an external USB device does not allow access to the computer, whether it's U disk or mobile hard disk are unable to access; Another way is through the mail, but mail attachment content is also cool the cow network IP - guard through the system set up, the bad breakthrough,
2.. Cool cattle network IP - guard inside the transparent encryption system, usually just above the end of the service within the company authorized computer can normal read their corresponding authority file, but a bile from internal network or client end then all files in encrypted state, can't open it,
Think of can break the two points can be fully opened, brother, don't help you, just this train of thought,
CodePudding user response:
Some people say that email, so I tell you, the system detected email function is invoked directly is stopped, let alone a packet filter.Can have a way to do not know the past. Is that your encryption, into one server own transmitting data, send out again. Or the document segmentation. (of course, have to have a file copy permissions)
Or by post to submit data., etc
CodePudding user response:
WatchCodePudding user response:
Screenshot pictures on copy to your computerCodePudding user response:
Such a strong encryption system?CodePudding user response:
Can try the virtual machineCodePudding user response:
Traffic, and the backend data cache storage,CodePudding user response:
First screenshot pictures, and then copied to your computerCodePudding user response:
Encrypted files, you should be your company installed the encryption software or hardware encryption, if are implemented through encryption software, it must need encryption keys, if it is through hard encryption, it must need hardware encryption card, both soft encryption generally easy to implement, is to know to use what encryption software, analyze encryption principle, through violence can be decrypted, so hard encryption, it must be the original encryption, decryption card can only be installed, now that the company can see, the upstairs said directly take pictures, but now that the encrypted file, it must be for the sake of secrecy, whether you are taking pictures, or want to decrypt, are in violation of the provisions of the company and the state secrets law, suggest not to do illegal things, if you want to study, please download a similar online encryption software, research on your computer,CodePudding user response:
This simple ah, if is a word document that is more simple, first you use their phones to take pictures, and then to your computer using character recognition is not to go, but, if you are going to do bad things, so I still advise you to stop early, no paper to cover the fire!CodePudding user response:
Since encryption, you go toward outside kao is illegal