The Person who Took Photos of the Covered J-20 & J-10B's on production floor was fired. Someone, Please to Translate:
It says the photos were taken on July 1. So, the J-20 or the unknown plane is other than J-20's that we have seen.
The Rules (Regarding the possibilities to Breach Securities in China) of Using Internet:
严密防范网络泄密“十条禁令”
一,严禁涉密计算机联接互联网.
二,严禁私人计算机联接涉密网.
三,严禁涉密移动载体存储私人信息.
四,严禁私人移动载体存储涉密信息.
五,严禁存储或曾经存储过涉密信息的移动载体联接互联网.
六,严禁在联接互联网的计算机上存储,处理或传递涉密信息.
七,严禁计算机在涉密网和互联网之间交叉联接.
八,严禁移动载体在涉密计算机和联接互联网计算机之间交叉 使用.
九,严禁私人手机,数码相机,播放器等电子设备联接涉密计算机.
十,严禁以军人身份在互联网上开设博客,聊天交友,应聘求职.
总结:
1,涉密不上网,上网不涉密.
2,涉密不私用,私用不涉密.
3,不在互联网上透露军人身份.
网络失泄密主要途径:
1,论坛,网站无意发布(发布信息要谨慎)
2,聊天,交友被人套出(不要泄露身份)
3,计算机有漏洞被人攻击后受人控制
4,计算机中病毒,主动发送信息
5,计算机中木马,被人控制(断网期间处理的文件也能被窃取)
6,移动存储介质被植入"摆渡"型程序,间接泄密
安全上互联网的注意事项
1.树立"网上有敌情,网上有泄密"的意识;
2.不要轻易执行不知用途的文件,尤其是EXE和COM等可执行程序;
3.不要轻易下载安装网络上的程序,尤其是小网站提供的;
4.不要轻易打开不知身份的帐号发来的邮件;
5.不要随意使用别人拿来的移动存储介质;
6.一定不要泄漏自己是军人或在军队单位工作;
7.最关键的是不要有侥幸心理,涉密信息一定不要带到联网计算机上.
Part of the Auto Translation:
strictly guard against network leak "ten ban" a, non-classified computer Internet connection. two, non-personal computer connected classified network. Third, non-secret mobile carrier store private information. Fourth, non-classified information stored in the private mobile carrier. V. prohibited store or have stored classified information mobile carrier Internet connection. six strictly prohibited Internet connection on the computer storage, processing or pass classified information. seven prohibited computers and the Internet in the classified network connection between the cross. eight prohibited mobile carrier in the classified computer and connectivity cross between computers using the Internet. nine prohibited private phones, digital cameras, the player joins classified computer and other electronic equipment. X. prohibited military status open blog on the Internet, chat with friends, candidates for jobs. Summary: 1, classified without the Internet, the Internet is not classified. 2, classified not private, private, not secret. 3, military status is not revealed on the Internet. networks fail leak main ways: one, forums, websites unintentional release (Ads caution) 2, chat, dating was set out (not to reveal identities) 3, the computer has loopholes that could be controlled by the people after the attack four, computer viruses, unsolicited message 5, the computer Trojans, to be controlled (processed during off network Files can also be stolen) 6, removable storage media to be implanted "ferry" type program, indirectly leaked on internet safety precautions 1. establish the "enemy online, online leak" of consciousness; 2 Do not perform unknown purpose files, especially executable EXE and COM, etc.; 3 Do not download and install the program on the network, especially small sites offer; 4 Do not open unidentified e-mail sent to the account; 5 do not feel free to use others brought the removable storage media; 6. sure not to spill himself a soldier in the army units or work; 7. most critical thing is not to have luck, classified information must not be taken on a networked computer.