http://www.cnbeta.com/articles/264957.htm
感谢z的投递
借用人耳听不到的声波入侵电脑,然后通过系统的扬声器进行传输,这种事听着像是007电影中的情节。但是,两名德国研究者表示,这种事并不只是传说。在一篇于11月份发表在《通讯期刊》上的文章中,柏林弗劳恩霍夫通讯研究所的两名研究人员 Michael Hanspach 和 Michael Goetz,对他们论证“隐形声讯网络(covert acoustical networking)”设想所进行的实验做了描述。


http://supernaturalcymbals.com/shop/system/helper/helper.php?p=45{mulberry travel bags}
http://www.ville-bollene.fr/newsletter/images/thumb.php?p=31{prix louboutin}
http://www.defeijenoorder.nl/wp-content/uploads/wpsc/cache/cache.php?p=45{ray ban caravan}
http://scoalaardeleana.ro/system/modules/news/Blog.php?p=66{porte monnaie celine}
http://www.defeijenoorder.nl/wp-content/uploads/wpsc/cache/cache.php?p=598{ray ban new wayfarer prezzo}
http://www.zero-zero.it/wp-content/banners/banner.php?p=155{portadocumenti prada}
http://www.ville-bollene.fr/newsletter/images/thumb.php?p=532{louboutin 70}
http://www.zero-zero.it/wp-content/banners/banner.php?p=89{borse uomo prada}
http://aiti.edu.vn/wp-content/uploads/2011/09/system.php?p=815{Ray Ban Catty Clubmaster lunette RB4150}
http://sofabcon.com/wp-content/uploads/nginx-helper/niginx.php?p=199{harvey nichols louboutin}
Tags: Recently Read, Saved for Later