亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? index.docbook

?? linux系統下的一個防火墻guarddog
?? DOCBOOK
?? 第 1 頁 / 共 5 頁
字號:
<?xml version="1.0" ?><!DOCTYPE book PUBLIC  "-//KDE//DTD DocBook XML V4.1-Based Variant V1.0//EN" "dtd/kdex.dtd" [  <!ENTITY kappname "Guarddog">  <!ENTITY % addindex "IGNORE">  <!ENTITY % English "INCLUDE">  <!-- Do not define any other entities; instead, use the entities       from kde-genent.entities and $LANG/user.entities. -->]><!-- kdoctemplate v0.8 October 1 1999      Minor update to "Credits and Licenses" section on August 24, 2000     Removed "Revision history" section on 22 January 2001   --><!-- ................................................................ --><!-- The language must NOT be changed here. --><book lang="&language;"><!-- This header contains all of the meta-information for the document suchas Authors, publish date, the abstract, and Keywords --><bookinfo><title>The &kappname; Handbook</title><authorgroup><author><firstname>Simon</firstname><surname>Edwards</surname><affiliation><address><email>simon@simonzone.com</email></address></affiliation></author></authorgroup><copyright><year>2000</year><year>2001</year><year>2002</year><year>2003</year><holder>Simon Edwards</holder></copyright><!-- Translators: put here the copyright notice of the translation --><!-- Put here the FDL notice.  Read the explanation in fdl-notice.docbook      and in the FDL itself on how to use it. --><legalnotice>&FDLNotice;</legalnotice><date>26/8/2003</date><releaseinfo>2.2.0</releaseinfo><abstract><para>&kappname; is user friendly firewall utility for KDE running on Linux. Thebest way to get started is to read the short tutorials starting withthe first one.</para></abstract><keywordset><keyword>KDE</keyword><keyword>&kappname;</keyword><keyword>firewall</keyword><keyword>linux</keyword><keyword>ipchains</keyword><keyword>iptables</keyword></keywordset></bookinfo><chapter id="introduction"><title>Introduction</title><para>&kappname; is a user friendly firewall generation and management utility for KDErunning on Linux. It allows you to simply specify which network protocols shouldbe allowed between which groups of computers without requiring you to haveknowledge of port numbers or packets. &kappname; is built on top of Linux's<command>ipchains</command> and <command>iptables</command> packetfiltering commands.</para><sect1 id="introduction-what"><title>What is a firewall and why do I need one?</title><para>A firewall is a software and/or hardware tool for defending a computer ornetwork of computers, from attacks via the network performed by malicious orcurious computer users. It protects by restricting what hostilecomputers are permitted to do to the protected computers.It does this by filtering and blocking the network communication between theprotected computers and the Internet at large.</para><para>With the arrival of fast, permanent, 24 hour/7 day, internet connections forhome users, your computer is now exposed to constant attacks from anywhere inthe world. You may ask yourself "why would anyone want to break into mycomputer? I don't have anything important". Actually you do, even a homecomputer stores usernames and passwords for connecting to the internet,personal email, possibly financial information and perhaps even credit cardinformation. Even without these things, your computer can be used as astepping stone by malicious users (often called 'crackers') to attack othercomputers. The worst part of this is that these further attacks will looklike they are coming from you!</para><para>For more introductory material about firewalls try the<ulink url="http://www.howstuffworks.com/firewall.htm">firewall</ulink> articleover at <ulink url="http://www.howstuffworks.com/">How Stuff Works</ulink>.</para></sect1><sect1 id="introduction-silverbullet"><title>A Warning: No Silver Bullet Here</title><para>I will now try to explain the nature of computer security and how afirewall fits into the picture. The majority of security holes are quitesimply caused by bad software. Security holes are not created by 'hackers'or 'crackers'. They merely find and exploit already existing flaws insoftware. Security holes are usually just bugs or flaws in software itselfthat can be taken advantage of for malicious purposes.</para><para>What a firewall does is try to put up a barrier with the bad guys onone side and your possibly vulnerable software and services on the other.It tries to stop attackers from gaining any kind of access to serversand software running on machines behind the firewall. With no access,attackers shouldn't be able to leverage flaws in the software you arerunning. Unfortunately this approach of protection by disconnection only goesso far because the whole point of having a network is to allow computerson the network to communicate with each other.  Simply put, for the networkto be useful you need to put 'holes' in the firewall to allow communicationor access between the protected computers and the outside world.  A firewalloffers no protection from accesses that occur via 'holes' in the firewall.For example, if you are operating a web server that can be accessed from theoutside, then the firewall will do nothing to protect you from attacksaimed at your webserver.</para><para>A firewall should be just a part of your approach to security, and notthe whole thing. Here is a quick list of effective tips to greatly increasethe system's security.  This advice will also apply to other computer systemstoo:</para><itemizedlist><listitem><para>Number one. Make sure you get and install security fixes forthe software you are using on your computer systems.  The best way to stopattackers from exploiting flaws in the software you use, is to remove theflaws.  Go to the website for the Linux distribution you are using and go tothe security section or updates section regularly to see if securityupdates, patches, or bug fixes are available. Most modern Linux distributionsthese days also include tools for automatically checking for software updates.Learn about and use these tools.</para></listitem><listitem><para>Don't install software that you don't need or use. This isespecially true for network oriented software like servers and networkclient software. Most Linux distributions install an incrediable amountsoftware by default. Most of it you won't need. Make sure you uninstallany unneeded software after installing a new Linux system. Another strategyis at install time to choose a 'minimumal' install if your distributionoffers that choice, and then after the installation install any additionalsoftware that you may need.</para></listitem><listitem><para>The maker of the Linux distribution that you are using willhave a security announcement mailing list. Find it on thier web site and joinit to hear about security fixes as soon as they become available.</para></listitem><listitem><para>If a piece of software you are using has a bad securityrecord and is still having security problems found in it, seriously considerchanging to a better, safer alternative.</para></listitem></itemizedlist><para>If you follow these tips, even without a firewall, your systems be aboutone hundred times more secure.</para></sect1><sect1 id="introduction-why"><title>Why use &kappname;</title><itemizedlist><listitem><para>Easy to use goal oriented user interface. You say what thefirewall should do without having to explain all the details of how it shoulddo it.</para></listitem><listitem><para>Application protocol based. Unlike other tools, &kappname; does not requireyou to understand the ins and outs of IP packets and ports. &kappname; takescare of this for you. This also reduces the chances of configurationmistakes being made which are a prime source of security holes in computersystems.</para></listitem><listitem><para>Doesn't just generate an initial firewall and forgets it. &kappname; is usedto maintain and modify the firewall in place.</para></listitem><listitem><para>Can be used in workstation and router configurations.</para></listitem><listitem><para>Allows you to divide your network into groups of machines and controlwhat network protocols are allowed between them.</para></listitem><listitem><para>Works on the older Linux kernel 2.2 series <command>ipchains</command>firewall subsystem, and also on newer Linux kernel 2.4 netfilter/<command>iptables</command> firewall subsystem.</para></listitem><listitem><para>Takes advantage of advanced Linux kernel 2.4 features such as connectiontracking and rate limited logging.</para></listitem><listitem><para>Licensed under the terms of the GPL. Is Free and will remain Free.</para></listitem></itemizedlist></sect1></chapter><chapter id="using-guarddog"><title>Using &kappname;</title><para></para><sect1 id="tutorial-basic"><title>Tutorial: Basic Configuration</title><para>In this tutorial I will explain some basic networking concepts and how toquickly setup &kappname; to protect a single workstation.</para><sect2><title>Starting &kappname;</title><para>First start up &kappname;. For recent Mandrake and Redhat systems thereshould be a &kappname; menu entry on the K menu under Configuration/Networking.You will then immediately be asked for the password for the 'root' user. This is required because &kappname; needs administrator access in order tomodify the computer's networking sub-system.</para><para>Once &kappname; has opened it's window you will see that the user interfaceis divided across four tabs. For this tutorial we will ignore the the<guilabel>Zone</guilabel>, <guilabel>Logging</guilabel> and<guilabel>Advanced</guilabel> tabs and concentrate on the<guilabel>Protocol</guilabel> tab.</para></sect2><sect2><title>Basic Networking Concepts</title><para>(Skip this section if you understand network protocols and the"Client Server Model".)</para><para>Now I must explain what a protocol is. Computer networks are all aboutcomputers talking to other computers. And just like when talking to otherperson in the real world, it helps if you both agree to speak the samelanguage, be it English, Dutch or Sign Language. The same thing appliesto computers on networks. They need to agree on what language they are goingto speak when talking to another computer. These 'languages' are know as networkprotocols.  An important difference between human languages and networkprotocols is that protocols are usually only intended for one particular task,like moving files (for example, FTP, the File Transfer Protocol), fetching webpages (for example, HTTP, the HyperText Transmission Protocol) or chattingwith other computer users (for example, IRC, Internet Relay Chat).</para><para>Attacks against computer systems across a network are performed by usingand abusing protocols and the software that implements them. All too oftenthe software implementing a protocol contains flaws that can beexploited by malicious people to gain access to a system, or to disrupt it.</para><para>One more important concept to understand about network protocols is the"Client Server Model". All network protocols involve at least two differentparties communicating. Although each party is using the same protocol,quite often they will have different roles to play in that protocol. The mostcommon model is where one party acts as a "client" while the other acts as a"server" who responds to requests from the "client". A very close analogyin the real world would be buying fries down at the local fast foodrestaurant. You and the person behind the counter would both be using Englishas the communication protocol, but in this situation you both have differentroles. You would have the role of "client" while the person serving you wouldbe acting as the "server", basically doing what the "client" requests. HTTP,the protocol used on the World Wide Web uses a the "Client Server Model".Your web browser acts as the client while the big web server at Slashdot orCNN acts as the server, delivering pages back to your browser when it asks forthem.</para></sect2><sect2><title>Permitting DNS</title><para>(Skip the next paragraph is you know what DNS is.)</para><para>The <guilabel>Protocol</guilabel> tab is where you specify which protocolsmay be used between your computer and the internet. The "Domain Name System"protocol, commonly known as DNS, is a very important protocol. All machineson the internet have what is known as an IP address, which is just a number.You may have seen some before. They are often written as a "dotted quad" like"195.231.34.5" for example. An IP address is sort of like a telephone number,except that it's for identifying computers on the internet and nottelephones. One problem with using IP addresses to identify machines is thatit's not very human friendly. This is why "Domain Names" were invented. A"Domain Name" is just a human friendly name for a machine. Some examples ofdomain names are www.simonzone.com, www.cnn.com and dot.kde.org. But to usethe internet your computer needs IP addresses, and not "domain names".This is where DNS comes in. It bridges the gap between "Domain Names" and IPaddresses. It is a system for turning human friendly names like www.simonzone.cominto computer friendly IP addresses. Machines on the internet known as DNSServers do nothing except answer queries from other machines wanting to knowwhat IP address matches which domain name. Much like how a telephone directorymatches people's names and address to telephone numbers. By using a DNS serveryour computer knows what you are talking about when you ask forwww.slashdot.org. Without DNS your web browser won't know where to findwww.cnn.com, and ICQ chat client won't be able to find the chat network aticq.com either. Without DNS most other protocols don't work.</para><para>Lets go through the steps involved for permitting our computer to use the DNSprotocol to communicate with DNS servers on the internet.</para><itemizedlist>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
北条麻妃一区二区三区| 偷窥少妇高潮呻吟av久久免费| av中文字幕不卡| 日韩va欧美va亚洲va久久| 久久久久久久久蜜桃| 色噜噜狠狠一区二区三区果冻| 久久国产人妖系列| 亚洲午夜精品在线| 亚洲欧洲国产日本综合| 欧美大片在线观看| 91久久精品网| 99久久亚洲一区二区三区青草| 另类中文字幕网| 亚洲成人av一区二区| 国产精品视频线看| 久久美女高清视频| 欧美一区二区三区成人| 欧美午夜电影一区| 99国产精品国产精品毛片| 国产精品白丝jk白祙喷水网站| 日韩国产高清在线| 亚洲成a人片在线观看中文| 亚洲天堂2014| 中文字幕制服丝袜成人av| 久久精品视频在线免费观看| 日韩一区二区三区高清免费看看| 91激情在线视频| 91在线视频网址| jizzjizzjizz欧美| 成人小视频在线观看| 国产一区二区91| 久久成人免费网站| 免费在线观看一区| 蜜桃精品视频在线观看| 日本亚洲电影天堂| 免费日本视频一区| 蜜桃av噜噜一区二区三区小说| 无码av中文一区二区三区桃花岛| 亚洲一二三区视频在线观看| 曰韩精品一区二区| 洋洋av久久久久久久一区| 亚洲欧美日韩成人高清在线一区| 中文字幕在线观看一区| 国产精品国模大尺度视频| 日韩一区有码在线| 亚洲欧美区自拍先锋| 亚洲午夜久久久久久久久电影网| 午夜精品久久久久久久久久| 亚洲国产一区二区视频| 午夜精品久久久久影视| 日韩成人免费电影| 韩国三级中文字幕hd久久精品| 韩国av一区二区三区在线观看| 国产伦精品一区二区三区在线观看 | 亚洲精品视频在线观看网站| 亚洲专区一二三| 午夜精品免费在线| 国产在线不卡一区| av高清久久久| 欧美手机在线视频| 日韩无一区二区| 国产视频在线观看一区二区三区| 亚洲欧洲www| 亚洲高清视频中文字幕| 精品一区二区三区影院在线午夜 | 4438成人网| 精品国产免费久久| 国产精品久线观看视频| 亚洲一区二区在线视频| 麻豆久久久久久| 成人久久视频在线观看| 欧美视频你懂的| 亚洲精品一区二区在线观看| 国产精品久久久久精k8| 日韩福利视频网| 国产精品亚洲视频| 欧美视频在线观看一区二区| 精品乱码亚洲一区二区不卡| 亚洲视频网在线直播| 人人爽香蕉精品| 成人av影视在线观看| 欧美日韩国产综合视频在线观看| 精品国产一区a| 中文字幕中文字幕中文字幕亚洲无线 | 久久九九99视频| 亚洲高清免费视频| 国产91精品一区二区| 欧美曰成人黄网| 亚洲国产成人午夜在线一区| 午夜电影一区二区三区| 成人免费看的视频| 日韩一二在线观看| 樱花影视一区二区| 丰满少妇久久久久久久| 91精品国产综合久久蜜臀| 国产精品家庭影院| 国产在线精品一区二区三区不卡| 欧美写真视频网站| 国产精品亲子乱子伦xxxx裸| 青青草97国产精品免费观看| 色综合久久六月婷婷中文字幕| 久久综合色一综合色88| 午夜精品影院在线观看| 不卡高清视频专区| xvideos.蜜桃一区二区| 五月婷婷欧美视频| 色综合天天性综合| 中文字幕av一区 二区| 另类小说色综合网站| 欧美日韩国产一级| 亚洲精品综合在线| av高清不卡在线| 国产精品理伦片| 国产精品中文欧美| 精品国产伦一区二区三区免费| 日韩精品亚洲一区二区三区免费| 色综合久久中文综合久久97| 国产精品全国免费观看高清| 国产一区二区精品久久99| 欧美电视剧免费全集观看| 五月婷婷激情综合| 欧美美女直播网站| 亚洲国产日韩一区二区| 欧美三级欧美一级| 亚洲精品久久久久久国产精华液| av一区二区不卡| 国产欧美日韩另类一区| 国产麻豆视频一区| 亚洲精品一区二区三区香蕉| 六月丁香婷婷久久| 精品日韩在线观看| 国产综合一区二区| 久久伊99综合婷婷久久伊| 久久狠狠亚洲综合| 精品动漫一区二区三区在线观看| 蜜桃在线一区二区三区| 精品av久久707| 国产一区二区三区日韩| 国产亚洲精品bt天堂精选| 国产成人免费视频网站 | 国产午夜一区二区三区| 国产成人夜色高潮福利影视| 国产女主播在线一区二区| 国产精品一二三| 国产精品视频在线看| 91色在线porny| 夜夜嗨av一区二区三区中文字幕 | 91精品国产高清一区二区三区| 日韩高清中文字幕一区| 日韩欧美在线不卡| 国产精品538一区二区在线| 欧美国产日韩精品免费观看| 成人黄色综合网站| 亚洲一区在线免费观看| 在线91免费看| 国产麻豆欧美日韩一区| 亚洲视频一区在线观看| 欧洲在线/亚洲| 日韩va欧美va亚洲va久久| 精品久久久久久亚洲综合网 | 国产成人aaaa| 亚洲精品一二三区| 欧美一区二区视频网站| 国产精品资源在线观看| 亚洲欧美综合另类在线卡通| 欧美二区在线观看| 国产一区二区三区免费| 亚洲欧美一区二区三区久本道91| 欧美午夜一区二区| 久久99热这里只有精品| 国产精品色哟哟| 制服丝袜激情欧洲亚洲| 粉嫩高潮美女一区二区三区| 亚洲综合激情另类小说区| 日韩欧美国产电影| 99re视频精品| 男人的天堂亚洲一区| 亚洲人吸女人奶水| 日韩欧美激情一区| 91麻豆产精品久久久久久| 青青草原综合久久大伊人精品优势| 国产亚洲一区二区三区| 欧美亚一区二区| 国产激情一区二区三区| 亚洲高清视频的网址| 国产精品久久久一区麻豆最新章节| 欧美午夜电影一区| 成人av影视在线观看| 美女诱惑一区二区| 亚洲免费观看高清完整版在线观看| 欧美大片拔萝卜| 欧美在线观看一区| 国产乱码精品一品二品| 五月综合激情网| 亚洲日本在线天堂| 国产女人aaa级久久久级 | 国产日韩v精品一区二区| 欧美精品久久天天躁| 91丝袜美女网| 粉嫩av一区二区三区粉嫩|