SlideShare una empresa de Scribd logo
1 de 74
Descargar para leer sin conexión
Information Security
                              資 安全                                   (Dec 18, 2012)

                            Potato Hwang @ Taipei Taiwan 2012
                            http://www.slideshare.net/potato888
                            FB:   芋頭 http://www.facebook.com/potato888




                                                                                      Updated 2012/12/18




                                           Potato @ Taipei Taiwan 2012                                     1

Tuesday, December 18, 12
網路版6步驟,查詢最關心自己的人是誰,是誰?

         臉書解碼:批                          爬牆-曝光

                                                            秘技版本, 三步驟即可.

                                                         步驟1), 開啟FB, View Page Source




                           Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
簡單6步驟,查詢最關心自己的人是誰,是誰?

         臉書解碼:批                                      爬牆-曝光
 步驟2), Ctrl+F, 尋找 InitialChatFriendsList




     第一名                   第二名   第三名




 步驟3), 置換網址後方數字 http://www.facebook.com/554547567




                                       Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
See Your Best Friends on FB




                           Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Overview
              2012資安發展趨勢

              資            安全-Basic Knowledge

              如何保護自己的資料




                                        Potato @ Taipei Taiwan 2012   5

Tuesday, December 18, 12
2012/11,第11屆台北國際資安展


                    3

                                                                      1

           2




               資安人,2012-11-22第11屆台北國際安全展
http://www.informationsecurity.com.tw/article/article_detail.aspx?aid=7219   Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Ref: 2012 Future of Cloud Computing http://www.slideshare.net/mjskok/2012-future-of-cloud-computing-2nd-annual-survey-results
                                                               Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Ref: 2012 Future of Cloud Computing http://www.slideshare.net/mjskok/2012-future-of-cloud-computing-2nd-annual-survey-results
                                                               Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
iCloud, PhotoString, Kindle



                                文茜的世界財經週報 2009年12月13日 Part 1/4
                                http://www.youtube.com/watch?feature=player_embedded&v=KuZnBVm9MJE



                           Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
CSA-Cloud Security alliance http://www.trendmicro.com.tw/micro/cloudsec/event/slides/KS_K2.pdf
                                                      Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
CSA-Cloud Security alliance http://www.trendmicro.com.tw/micro/cloudsec/event/slides/KS_K2.pdf
                                                      Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
CSA-Cloud Security alliance http://www.trendmicro.com.tw/micro/cloudsec/event/slides/KS_K2.pdf
                                                      Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
認識APT-進階持續性滲透攻擊
                           (Advanced Persistent Threat, APT)




                                      Trend- Potato @ Taipei Taiwan 2012 http://domynews.blog.ithome.com.tw/post/1252/119745
                                             雲端運算安全趨勢網站:
Tuesday, December 18, 12
Ref:趨勢科技CloudSec 2012.面對APT企業應當採取的縱深防禦防護策略
http://www.youtube.com/watch?feature=player_embedded&v=tTmhrorVDvM
                                                                 Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012   Ref: Business Next 數位時代 Mag
Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012   Ref: Business Next 數位時代 Mag
Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012   Ref: Business Next 數位時代 Mag
Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012   Ref: Business Next 數位時代 Mag
Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
(1/5)




                                 Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
(2/5)




                                 Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
(3/5)




                                 Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
(4/5)




                                 Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
DOS & DDOS 阻斷式攻擊 (5/5)




                           http://www.radware.com/Solutions/Enterprise/Security/DoSProtection.aspx




                                                    Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
密碼學簡介



                           Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
電子信用卡交易



                           Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
網路安全傳輸機制



                           Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
釣魚網站與信件



                           Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012
                           彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

Tuesday, December 18, 12
資安事件 & 資安防護



                           Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012   Ref: Business Next 數位時代 Mag
Tuesday, December 18, 12
資安防護小寶典(1/3)
              密碼
                    不告訴任何人密碼

                    不寫下密碼

                    增加密碼複雜度

                    密碼定期更換

              軟體更新
                    隨時注意作業系統更新

                    不使用盜版軟體

              病毒
                    安裝防毒軟體並定期更新病毒碼
                                 Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
資安防護小寶典(2/3)
              電子郵件
                    不要開啟附   名.exe, .com, bat等        案

                    非公務郵件儘量別開啟

              網路釣魚與網路詐
                    仔細辨識網址列上的網址. (詐          網頁常使用一些混淆字母)

                    不直接使用email所提供超連結,以輸入網址方式取代

                    不要因為好奇心任意點擊情色,聳動等標題的網址連結.

                    凡事求證後才行動,可減少被          機會.



                                         Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
資安防護小寶典(3/3)

              間諜軟體
                    下載免費或共享軟體前,需仔細閱讀和有關的                         息.

                    避免透過P2P程式或其他管道下載來路不明軟體.

              即時通          軟體
                    不隨意接受透過即時通所傳遞來的              案.

                    不透過即時通傳遞個人資料,或重要的公司機密資料.

                    安裝防毒軟體, 防火牆.




                                   Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Reference
              數位時代 http://www.bnext.com.tw/

              彰化師範大學,丁德榮教授-資               與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt

              Guard Against Dos and DDos Attacks http://www.radware.com/Solutions/Enterprise/Security/
              DoSProtection.aspx
              CSA-Cloud Security alliance http://www.trendmicro.com.tw/micro/cloudsec/event/slides/KS_K2.pdf

              簡單程式一按破解iPhone密碼, 取得聯絡人、相片、 息等資料 http://www.appappapps.com/blog/11748-
              %E7%B0%A1%E5%96%AE%E7%A8%8B%E5%BC%8F%E4%B8%80%E6%8C
              %89%E7%A0%B4%E8%A7%A3iphone%E5%AF%86%E7%A2%BC-%E5%8F%96%E5%BE
              %97%E8%81%AF%E7%B5%A1%E4%BA%BA%E3%80%81%E7%9B
              %B8%E7%89%87%E3%80%81%E8%A8%8A%E6%81%AF.html
              T客邦 -Facebook 隱私保護、防毒、防詐自保11招, http://www.techbang.com/posts/6407-facebook-to-
              protect-themselves-against-fraud-11-strokes-zhengxiang-wen
              Facebook 術有那些?歹徒入侵臉書,Facebook 防駭自保13招, http://www.techbang.com/posts/11580-
              hacker-login-face-book-facebook-and-terrible-captive-insurance-13-tips-pchome-201-science-and-
              technology-special-planning-2

              2012 Future of Cloud Computing http://www.slideshare.net/mjskok/2012-future-of-cloud-computing-2nd-
              annual-survey-results




                                                       Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
數位應用



                           Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Potato @ Taipei Taiwan 2012

Tuesday, December 18, 12
Thanks !



        1    2     3       Potato @ Taipei Taiwan 2012   74

Tuesday, December 18, 12

Más contenido relacionado

Último

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Último (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Destacado

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destacado (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Information security

  • 1. Information Security 資 安全 (Dec 18, 2012) Potato Hwang @ Taipei Taiwan 2012 http://www.slideshare.net/potato888 FB: 芋頭 http://www.facebook.com/potato888 Updated 2012/12/18 Potato @ Taipei Taiwan 2012 1 Tuesday, December 18, 12
  • 2. 網路版6步驟,查詢最關心自己的人是誰,是誰? 臉書解碼:批 爬牆-曝光 秘技版本, 三步驟即可. 步驟1), 開啟FB, View Page Source Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 3. 簡單6步驟,查詢最關心自己的人是誰,是誰? 臉書解碼:批 爬牆-曝光 步驟2), Ctrl+F, 尋找 InitialChatFriendsList 第一名 第二名 第三名 步驟3), 置換網址後方數字 http://www.facebook.com/554547567 Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 4. See Your Best Friends on FB Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 5. Overview 2012資安發展趨勢 資 安全-Basic Knowledge 如何保護自己的資料 Potato @ Taipei Taiwan 2012 5 Tuesday, December 18, 12
  • 6. 2012/11,第11屆台北國際資安展 3 1 2 資安人,2012-11-22第11屆台北國際安全展 http://www.informationsecurity.com.tw/article/article_detail.aspx?aid=7219 Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 7. Ref: 2012 Future of Cloud Computing http://www.slideshare.net/mjskok/2012-future-of-cloud-computing-2nd-annual-survey-results Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 8. Ref: 2012 Future of Cloud Computing http://www.slideshare.net/mjskok/2012-future-of-cloud-computing-2nd-annual-survey-results Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 9. iCloud, PhotoString, Kindle 文茜的世界財經週報 2009年12月13日 Part 1/4 http://www.youtube.com/watch?feature=player_embedded&v=KuZnBVm9MJE Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 10. Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 11. CSA-Cloud Security alliance http://www.trendmicro.com.tw/micro/cloudsec/event/slides/KS_K2.pdf Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 12. CSA-Cloud Security alliance http://www.trendmicro.com.tw/micro/cloudsec/event/slides/KS_K2.pdf Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 13. CSA-Cloud Security alliance http://www.trendmicro.com.tw/micro/cloudsec/event/slides/KS_K2.pdf Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 14. 認識APT-進階持續性滲透攻擊 (Advanced Persistent Threat, APT) Trend- Potato @ Taipei Taiwan 2012 http://domynews.blog.ithome.com.tw/post/1252/119745 雲端運算安全趨勢網站: Tuesday, December 18, 12
  • 16. Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 17. Potato @ Taipei Taiwan 2012 Ref: Business Next 數位時代 Mag Tuesday, December 18, 12
  • 18. Potato @ Taipei Taiwan 2012 Ref: Business Next 數位時代 Mag Tuesday, December 18, 12
  • 19. Potato @ Taipei Taiwan 2012 Ref: Business Next 數位時代 Mag Tuesday, December 18, 12
  • 20. Potato @ Taipei Taiwan 2012 Ref: Business Next 數位時代 Mag Tuesday, December 18, 12
  • 21. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 22. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 23. (1/5) Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 24. (2/5) Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 25. (3/5) Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 26. (4/5) Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 27. DOS & DDOS 阻斷式攻擊 (5/5) http://www.radware.com/Solutions/Enterprise/Security/DoSProtection.aspx Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 28. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 29. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 30. 密碼學簡介 Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 31. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 32. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 33. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 34. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 35. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 36. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 37. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 38. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 39. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 40. 電子信用卡交易 Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 41. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 42. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 43. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 44. 網路安全傳輸機制 Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 45. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 46. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 47. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 48. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 49. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 50. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 51. 釣魚網站與信件 Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 52. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 53. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 54. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 55. Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 56. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 57. Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 58. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 59. Potato @ Taipei Taiwan 2012 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Tuesday, December 18, 12
  • 60. 資安事件 & 資安防護 Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 61. Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 62. Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 63. Potato @ Taipei Taiwan 2012 Ref: Business Next 數位時代 Mag Tuesday, December 18, 12
  • 64. 資安防護小寶典(1/3) 密碼 不告訴任何人密碼 不寫下密碼 增加密碼複雜度 密碼定期更換 軟體更新 隨時注意作業系統更新 不使用盜版軟體 病毒 安裝防毒軟體並定期更新病毒碼 Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 65. 資安防護小寶典(2/3) 電子郵件 不要開啟附 名.exe, .com, bat等 案 非公務郵件儘量別開啟 網路釣魚與網路詐 仔細辨識網址列上的網址. (詐 網頁常使用一些混淆字母) 不直接使用email所提供超連結,以輸入網址方式取代 不要因為好奇心任意點擊情色,聳動等標題的網址連結. 凡事求證後才行動,可減少被 機會. Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 66. 資安防護小寶典(3/3) 間諜軟體 下載免費或共享軟體前,需仔細閱讀和有關的 息. 避免透過P2P程式或其他管道下載來路不明軟體. 即時通 軟體 不隨意接受透過即時通所傳遞來的 案. 不透過即時通傳遞個人資料,或重要的公司機密資料. 安裝防毒軟體, 防火牆. Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 67. Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 68. Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 69. Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 70. Reference 數位時代 http://www.bnext.com.tw/ 彰化師範大學,丁德榮教授-資 與網路安全 http://web.ncue.edu.tw/~ccource/data/20120518.ppt Guard Against Dos and DDos Attacks http://www.radware.com/Solutions/Enterprise/Security/ DoSProtection.aspx CSA-Cloud Security alliance http://www.trendmicro.com.tw/micro/cloudsec/event/slides/KS_K2.pdf 簡單程式一按破解iPhone密碼, 取得聯絡人、相片、 息等資料 http://www.appappapps.com/blog/11748- %E7%B0%A1%E5%96%AE%E7%A8%8B%E5%BC%8F%E4%B8%80%E6%8C %89%E7%A0%B4%E8%A7%A3iphone%E5%AF%86%E7%A2%BC-%E5%8F%96%E5%BE %97%E8%81%AF%E7%B5%A1%E4%BA%BA%E3%80%81%E7%9B %B8%E7%89%87%E3%80%81%E8%A8%8A%E6%81%AF.html T客邦 -Facebook 隱私保護、防毒、防詐自保11招, http://www.techbang.com/posts/6407-facebook-to- protect-themselves-against-fraud-11-strokes-zhengxiang-wen Facebook 術有那些?歹徒入侵臉書,Facebook 防駭自保13招, http://www.techbang.com/posts/11580- hacker-login-face-book-facebook-and-terrible-captive-insurance-13-tips-pchome-201-science-and- technology-special-planning-2 2012 Future of Cloud Computing http://www.slideshare.net/mjskok/2012-future-of-cloud-computing-2nd- annual-survey-results Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 71. 數位應用 Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 72. Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 73. Potato @ Taipei Taiwan 2012 Tuesday, December 18, 12
  • 74. Thanks ! 1 2 3 Potato @ Taipei Taiwan 2012 74 Tuesday, December 18, 12