?? 550.txt
字號:
Rule:--Sid:550--Summary:This event is generated when network traffic that indicates Napster is being used. This is a Peer-to-Peer (P2P) application.--Impact:Possible policy violation. The use of Napster may be prohibited by corporate policy in some network environments. --Detailed Information:This event indicates that the Napster is being used on the protected network.Peer-to-Peer applications may also be used as a vector to transfer worms and viruses past Anti-Virus defenses onto a protected network.--Affected Systems:All systems using Napster--Attack Scenarios:This is a possible policy violation, it may be that Napster has been installated on a client host.Peer-to-Peer clients can be used to transmit confidential corporate information out of the protected network.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Disallow the use of Napster on the protected network and enforce or implement an organization wide policy on the use of Napster.--Contributors:Sourcefire Vulnerability Research Team--Additional References:--
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -