亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? ch19.htm

?? this explains the working of intranets.
?? HTM
?? 第 1 頁 / 共 2 頁
字號(hào):
wipe the virus from your hard disk. Since viruses pose such adanger to intranets, it is also best to protect against virusesby putting a virus scanner on a server inside a firewall, wherethat scanner can check every file coming into the intranet forknown viruses. This does not eliminate the need for client softwareto cover such cases as a virus that may travel in a diskette froman external source.<P>Such a scanner typically doesn't check every single packet comingin, since many types of packets won't be able to have virusesin them. Instead, the scanner checks only those packets sent withcertain Internet protocols, such as for e-mail, FTP, and the Web,that may indicate that a binary file is being transferred intothe intranet. It looks at only those files, using packet filteringtechnology similar to that used by filtering routers. It thenscans those files for viruses, letting in those files that arevirus-free, and stopping any infected files from entering theintranet.<H2><A NAME="HowIntranetVirusScanningSoftwareWorks"><FONT SIZE=5 COLOR=#FF0000>How Intranet Virus Scanning Software Works</FONT></A></H2><P>Viruses are a major security risk for intranets. They can damagedata, occupy and consume resources, and disrupt operations. Programfiles were the major source of trouble in the past, but new &quot;macro&quot;viruses can hide in data files and launch, for example, when amacro in a word processing program is run. Server-based and client-basedvirus-scanning software both have roles that help protect theintranet.<OL><LI>A virus hides inside a legitimate program. Until you run theinfected program, the virus remains dormant. When you run theinfected program, the virus springs into action. Sometimes, thefirst thing it will do is infect other programs on your hard diskby copying itself into them.<LI>Some viruses place messages called <I>v-markers</I> or <I>virusmarkers</I> inside programs that they infect, and they help managethe viruses' activities. Each virus has a specific virus markerassociated with it. If a virus encounters one of these markersin another program, it knows that the program is already infected,and so doesn't replicate itself there. When a virus cannot findany more unmarked files on a computer, that can signal to thevirus that there are no more files to be infected. At this point,the virus may begin to damage the computer and its data. Virusescan corrupt program or data files so that they work oddly, notat all, or cause damage when they run. They can destroy all thefiles on your computer, change the system files that your computerneeds when it is turned on, and cause other types of damage.<LI>Intranet virus scanning software runs on a server in an intranetfirewall. The software doesn't check every packet that comes intothe intranet for viruses, since that would not be feasible. Instead,it checks only those packets sent with the kinds of Internet servicesand protocols that indicate that a file may be in the processof being transferred from the Internet to the intranet-commonly,e-mail (which is sent via SMTP, Simple Mail Transfer Protocol),the File Transfer Protocol (FTP), and the World Wide Web (HTTP,Hypertext Transfer Protocol). The software uses packet filteringtechnology to determine which packets are being sent with theseprotocols.<LI>When the software finds packets that are sent with SMTP, FTP,or HTTP, it knows it must examine them further, to see if theyhave viruses in them. Virus scanning software works in many ways.One method of detection is to check files for tell-tale virusmarkers that indicate the presence of a virus.<LI>Packets not using SMTP, FTP, or HTTP (such as NNTP) are passedthrough, and the software does not perform any action on them.<LI>If the file is found to be virus-free, it is allowed to pass.If it is found to have a virus, it won't be allowed to pass intothe intranet.<LI>Antivirus software should also be run on individual computersinside the intranet because it's possible that a virus can bebrought into the intranet by diskettes, for example. In additionto protection against viruses, it can detect viruses, and eradicateany virus that it finds.</OL><H2><A NAME="HowaquotHostilequotJavaAppletCanAttackanIntranet"><FONT SIZE=5 COLOR=#FF0000>How a &quot;Hostile&quot; Java Applet Can Attack an Intranet</FONT></A></H2><P>The Java programming language can create interactive, multimediaapplications (called applets) that can greatly extend the powerof the World Wide Web on intranets and the Internet. However,some people believe that it can theoretically be used to attackan intranet. Here is an example of such an attack, which computerscientists at Princeton University discovered was possible dueto holes in the Java protection scheme. Since then, this particularhole was covered up, but only if people use specific versionsof Netscape which contain the fix. Many computer scientists saythat other security holes still exist in Java.<OL><LI>The cracker begins by targeting a specific pair of computerson an intranet, stooge.victim.com, and target.victim.com. Oneof the computers will be used by the cracker as a jumping offpoint to attack the other. The cracker knows their IP addresses,123.123.122.1 for stooge.victim.com, and 123.123.122.2 for target.victim.com.<LI>The cracker's computer's name is www.hackit.com, and its IPaddress is 114.12.12.12. There is also a &quot;bogus&quot; machinename-a computer that does not exist, but looks to the rest ofthe Internet as if it does. The bogus machine is called bogus.hackit.com.The cracker creates a DNS mapping from this bogus machine to apair of IP addresses: the cracker's, 114.12.12.12; and the machinetargeted for attack, 123.123.122.2. When a DNS server looks upthe bogus machine name to see its IP address, it will see thesetwo IP addresses. Note that the cracker hasn't yet used Java;what has been done so far has commonly been done by crackers onthe Internet since well before Java was released.<LI>The intranet that the cracker has targeted is protected bya firewall. Normally, he or she would not be able to break throughthe firewall to attack the computer with the IP address 123.122.122.2.With a hole the cracker discovered in Java, however, now it canbe done.<LI>The cracker creates a &quot;hostile&quot; Java applet andposts it on a page on the World Wide Web. The applet looks asif it's a news ticker, but it in fact is designed to attack theintranet. The cracker sends out an e-mail note to the target intranet,disguised as a press release, inviting people to visit a freenews site on the Internet. Stooge.victim.com browses the Internetto the site and comes across the Java applet on www.hackit.com.The applet will download.<LI>The applet appears to be a news ticker, so stooge.victim.comreads the news ticker. In fact, the applet has begun to attackthe computer and the intranet.<LI>The applet tries to make a connection to the &quot;bogus&quot;computer created by the cracker, bogus.hackit.com. In order tomake the connection, Java uses the DNS mapping created by thecracker. It finds the mapping of 123.123.122.2 and 114.12.12.12for<B> </B>the<B> </B>name bogus.hackit.com. As a security measure,Java only lets applets contact the server on which they were launched,and no other server. In this case, that server is 114.12.12.12,so Java allows the connection since it sees it in the entry. However,since the first number in the entry is 123.123.122.2, it actuallymakes the connection to that computer, not to 114.12.12.12.<LI>The Java applet is now connected to the target computer, target.victim.com(123.123.122.2), and can make full use of the intranet's resources,as if it were a trusted computer inside the intranet. That's because<FONT COLOR=#000000>the connection was made from inside the intranet,directly from another intranet computer-the attack was made fromwithin the firewall. Using the applet, the cracker can now makea direct connection to 123.123.122.2, as if inside the intranet.A cracker can then probe the intranet's security weaknesses byusing a security-probing program like the particularly powerfulone called SATAN, and then attack not just the target computer,but the entire intranet.</FONT></OL><HR><CENTER><P><A HREF="ch18.htm"><IMG SRC="PC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="#CONTENTS"><IMG SRC="CC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="contents.htm"><IMG SRC="HB.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="ch20.htm"><IMG SRC="NC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><HR WIDTH="100%"></P></CENTER></BODY></HTML>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品一区二区在线看| 99精品视频在线观看| 91精品久久久久久蜜臀| 亚洲女性喷水在线观看一区| 成人av免费观看| 日韩在线a电影| 成人免费在线视频观看| 一区二区三区高清不卡| 欧美图区在线视频| 美女mm1313爽爽久久久蜜臀| 精品国产亚洲在线| 国产·精品毛片| 午夜成人免费电影| 国产午夜三级一区二区三| 国产91精品一区二区麻豆网站 | 日本一区二区在线不卡| 91麻豆精品国产自产在线 | 国产欧美一区二区精品婷婷| 欧美日韩成人综合在线一区二区| 91在线观看免费视频| 国产乱人伦偷精品视频不卡| 国产亚洲一区二区三区在线观看| caoporm超碰国产精品| 亚洲午夜精品久久久久久久久| 日韩亚洲欧美一区| 日本乱人伦aⅴ精品| 国产一区三区三区| 亚洲特级片在线| 91麻豆精品在线观看| 国内精品伊人久久久久av一坑| 日本在线不卡视频| 日本91福利区| 91精品国产综合久久久久久久久久 | 精品久久久久av影院| 91视频你懂的| 国产激情视频一区二区在线观看 | 在线视频国产一区| 国产一区在线观看视频| 亚洲va欧美va天堂v国产综合| 国产欧美综合色| 久久综合色之久久综合| 欧美一区日韩一区| 欧美福利视频一区| 在线观看91视频| 色婷婷精品久久二区二区蜜臂av| 国产91对白在线观看九色| 久久精品国产秦先生| 日本特黄久久久高潮| 五月婷婷久久综合| 免费人成网站在线观看欧美高清| 亚洲一区免费观看| 亚洲成av人片在www色猫咪| 中文字幕欧美一区| 一区二区三区欧美激情| 一区二区三区在线影院| 亚洲视频一区二区在线| 亚洲精品国产第一综合99久久| 亚洲欧洲精品一区二区精品久久久| 国产精品你懂的在线| 亚洲女性喷水在线观看一区| 亚洲一区二区av电影| 久久99精品国产麻豆婷婷| 国产成人精品免费在线| 成人精品电影在线观看| 欧美三级视频在线| 精品粉嫩超白一线天av| 中文字幕日韩精品一区| 天天影视涩香欲综合网| 激情小说欧美图片| 91色婷婷久久久久合中文| 91精品国产综合久久精品app| 国产亚洲综合在线| 欧美激情在线免费观看| 久久精品国产一区二区三区免费看| 亚洲第一精品在线| 亚洲视频1区2区| 亚洲另类在线制服丝袜| 亚洲九九爱视频| 亚洲欧美日韩一区二区三区在线观看| 久久久久国产精品麻豆ai换脸 | 五月综合激情网| 久久久久久久电影| 7878成人国产在线观看| 国产精品一区二区无线| av电影在线不卡| 欧美亚日韩国产aⅴ精品中极品| 欧美中文字幕不卡| 99久久综合狠狠综合久久| 在线观看www91| 国产三级一区二区三区| 一区在线中文字幕| 亚洲精品中文字幕乱码三区| 亚洲欧美日韩国产手机在线| 狠狠色丁香婷婷综合久久片| 欧美日韩电影一区| 亚洲欧美另类综合偷拍| 国产综合久久久久影院| 欧美一级高清片在线观看| 亚洲一级电影视频| 国产乱码精品一区二区三区av | 老汉av免费一区二区三区| av不卡在线播放| 国产精品沙发午睡系列990531| 韩国毛片一区二区三区| 久久精品在线观看| 国产精品一区二区果冻传媒| 亚洲免费在线观看视频| 国产91高潮流白浆在线麻豆| 欧美经典一区二区三区| 99视频精品全部免费在线| 国产欧美一区视频| 欧美一区二区播放| 色综合 综合色| 成人性色生活片| 日韩视频一区二区三区在线播放 | 日韩一区二区三区在线观看| 蜜臀a∨国产成人精品| 国产日产欧美一区| 在线观看91精品国产入口| 青青草97国产精品免费观看 | 91精品国产乱码| 国产成a人亚洲精| 亚洲h动漫在线| 国产日韩欧美制服另类| 欧美日韩一区高清| 国产精品一区二区在线播放| 亚洲成人av在线电影| 久久九九影视网| 制服丝袜国产精品| 欧洲精品一区二区| 国产传媒欧美日韩成人| 午夜成人免费电影| 一区二区在线观看免费| 国产欧美va欧美不卡在线| 91精品久久久久久久91蜜桃| 一本大道av伊人久久综合| 精品中文字幕一区二区| 天天操天天综合网| 亚洲狼人国产精品| 中文字幕欧美日本乱码一线二线| 555夜色666亚洲国产免| 91精品1区2区| 91亚洲国产成人精品一区二区三 | 精品久久一区二区| 欧美色手机在线观看| 日本精品视频一区二区三区| www.亚洲人| 91成人免费在线| 欧美午夜精品久久久久久孕妇| 色婷婷精品久久二区二区蜜臂av | 成人欧美一区二区三区黑人麻豆 | 丁香天五香天堂综合| 国产精品亚洲专一区二区三区| 老汉av免费一区二区三区| 精品一区二区三区久久| 国产精品69毛片高清亚洲| 国产成人精品一区二区三区四区 | 欧美在线不卡视频| 欧美美女网站色| 日韩欧美123| 亚洲图片你懂的| 亚洲高清免费观看高清完整版在线观看 | 老汉av免费一区二区三区 | 美脚の诱脚舐め脚责91| 久久99久久久久| 成人免费视频网站在线观看| 91亚洲国产成人精品一区二三 | 国产麻豆视频精品| 在线一区二区三区| 久久男人中文字幕资源站| 中文字幕在线观看不卡视频| 亚洲成av人片在线观看| 盗摄精品av一区二区三区| 欧美二区三区91| 国产精品久久午夜| 奇米888四色在线精品| 91蝌蚪国产九色| 2017欧美狠狠色| 午夜a成v人精品| 91香蕉视频在线| 国产三级三级三级精品8ⅰ区| 亚洲五码中文字幕| jiyouzz国产精品久久| 日韩一级欧美一级| 午夜久久久影院| 色婷婷综合久色| 国产精品久久久久久久浪潮网站| 日本最新不卡在线| 欧美综合在线视频| 亚洲精品欧美在线| 91亚洲精品久久久蜜桃网站 | 蜜臀91精品一区二区三区| 欧美性xxxxx极品少妇| 亚洲黄色av一区| 色婷婷综合久久久久中文| 国产精品成人免费精品自在线观看 | 国产精品久久久久影院色老大| 福利91精品一区二区三区| 久久嫩草精品久久久久| 国产xxx精品视频大全|