亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ch18.htm

?? this explains the working of intranets.
?? HTM
?? 第 1 頁 / 共 2 頁
字號:
the wire to solve the problem. Furthermore, the table of passwordson the server is not encrypted. What happens is this: When someonetypes in a user name, the server generates a random key and sendsthe key (also in clear text) to the user. The user uses the keyto encrypt his or her password and sends the encrypted passwordback to the server. The server checks the password table for thekey it assigned, and encrypts the password. The server then comparesthe encrypted password from the user with the encrypted passwordit created. If they match, the user is allowed in. <P>CHAP performs an additional check to authenticate the user, thatis, it attempts to verify that the person in an ongoing sessionis the person originally authorized. CHAP continuously sends differentchallenges to the user throughout the session, not just at thebeginning. This authentication process solves problems with unattended-but-logged-inworkstations. This system also solves the problem of passwordtheft by packet sniffing, since the password sent between userand server is encrypted. However, the password file itself isvulnerable, since it's not encrypted. <P>Extensive systems have been devised that combine encryption, passwordtechnology, and authentication to make sure that no unauthorizedperson can gain access to intranets.<P>One particularly secure authentication system is called Kerberos.Kerberos is named after the mythological three-headed dog whoguarded the gates of Hades in Greek mythology. (The dog is alsocalled Cerberus, sometimes spelled Kerberos.) Developed at theMassachusetts Institute of Technology, the Kerberos system requiresthat all computers, servers, and workstations be running the Kerberossoftware. When anyone wants to get onto the network, they haveto type in a password and user name. They are then given an encryptedtoken by the system. In order to use any network resource, thatencrypted token is required. This stops any intruders from accessingany intranet resources unless they first go through password authentication.<H2><A NAME="HowPasswordsWork"><FONT SIZE=5 COLOR=#FF0000>How Passwords Work</FONT></A></H2><P>One of an intranet's first lines of defense is to use passwordprotection. A variety of security techniques, including encryption,helps ensure that passwords are kept secure. It is also necessaryto require that passwords are changed frequently, are not easilyguessed or common dictionary words, and are not simply given out.Authentication is the additional step of verifying that the personproviding the password is the person authorized to do so.<H3><A NAME="PasswordAuthenticationProtocol">Password Authentication Protocol</A></H3><OL><LI>The server encrypts the password it receives from the user,using the same encryption technique used to encrypt the servertable of pass-words. It compares the encrypted password from theuser against the en-crypted password in the table. If the resultsmatch, the user is allowed into the system. If the results don'tmatch, the user isn't allowed in.<LI>People's passwords and user names on an intranet are storedin table form in a file on a server that verifies passwords. Often,the file name is <I>passwd</I> and the directory it is in is <I>/etc</I>.Depending on the password authentication technique to be used,the file may either be encrypted or not encrypted.<LI>One method of authenticating a user is through the PasswordAuthentication Protocol (PAP). PAP doesn't mandate encryption,but the table of passwords on the server is usually encrypted.When someone wants to log into the network or a password-protectednetwork resource, they are asked for a user name and password.The user name and password are then sent to the server.</OL><H3><A NAME="ChallengeHandshakeAuthenticationProtocol">Challenge Handshake Authentication Protocol</A></H3><P>START=4<OL><LI>The Challenge Handshake Authentication Protocol (CHAP) systemis a challenge-response system. CHAP requires an unencrypted tableof passwords. When someone logs into a system with CHAP, a randomkey is generated by the server and sent to the user for encryptinghis or her password.<LI>The user's computer uses this key to encrypt his or her password.The encrypted password is then sent back to the server. The serverrefers to the password table for the random key, and encryptsthe password with the same key that was sent to the user. Theserver then compares the encrypted password from the user withthe encrypted password it created. If they match, the user isallowed in. <LI>The key difference with CHAP is that <I>the<B> </B>servercontinues to challenge the user's computer throughout the session</I>.Additionally, different challenges are sent that must be encryptedand returned by the computer, without human intervention. Thisway CHAP limits your window of vulnerability. A session cannotbe hijacked, since a hijacker would be dropped once his computerfailed to respond correctly to the periodically occurring challenges.<LI>No matter which kind of password system is used-and whetherthe password table is encrypted or not-it's important to protectthe password table. The file must be protected against FTP accessand there should be very restricted access to the file so thatonly the administrator or someone under the administrator's controlcan gain access to it.</OL><H2><A NAME="HowAdditionalAuthenticationSystemsWork"><FONT SIZE=5 COLOR=#FF0000>How Additional Authentication Systems Work</FONT></A></H2><P>Various methods and devices provide additional security barriersto prevent unauthorized access. Devices supplement the &quot;somethingyou know&quot; of login names and passwords with the requirementthat remote users also provide &quot;something you have.&quot;Many intranets allow people from remote locations to dial in tothe intranet and use its resources. In order to get onto the network,a user name and password are required. Authentication systemsare built to make sure that people logging into an intranet reallyare who they claim to be. This is especially important for remoteaccess since none of the physical security necessary to entera company's headquarters is available to screen dial-in users.<UL><LI>A call-back system is one way to ensure that only people whoare supposed to dial in are al-lowed in. In a call-back system,after a user logs in with a user name and password, the systemhangs up and calls back to a predetermined phone number. Thatway, no one can pose as an employee since it will call only specificphone numbers.<FONT FACE="Arial"> </FONT>This works for telecom-muterswho consistently work from their home, but is not practical fora roving sales force who never know the numbers in advance.<LI>Security devices that continuously respond to challenges areuseful tools for roving sales forces. Users need to bring a cardreader device and insert their cards to take care of the authenticationwhen challenged by the server software when they log in. The serversoftware continues to challenge the user's card during the sessionas well.<LI>&quot;Packet sniffing&quot; and replay is one of the dangersthat can be avoided by additional authentication measures. Thenature of Ethernet contributes to packet sniffing and spoofingvulnerability because all of the packets pass through the networkand can be picked up by unauthorized users. Essentially, you caneavesdrop and record legitimate traffic and re-play it to trickthe system into thinking their traffic is from a legitimate source.A variation of this is session hijacking, where rather than simplyinserting traffic into the data stream, legitimate traffic isway-laid and substitute traffic is inserted.</UL><HR><CENTER><P><A HREF="ch17.htm"><IMG SRC="PC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="#CONTENTS"><IMG SRC="CC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="contents.htm"><IMG SRC="HB.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="ch19.htm"><IMG SRC="NC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><HR WIDTH="100%"></P></CENTER></BODY></HTML>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色菇凉天天综合网| 亚洲区小说区图片区qvod| 亚洲成av人片在线观看无码| 欧美最猛黑人xxxxx猛交| 亚洲免费在线观看视频| 日韩一区二区电影在线| 国产一区二区在线视频| 欧美国产国产综合| 91偷拍与自偷拍精品| 亚洲自拍都市欧美小说| 91精品国产全国免费观看| 久久99久国产精品黄毛片色诱| 久久久亚洲高清| 91免费版pro下载短视频| 狠狠狠色丁香婷婷综合激情 | 视频精品一区二区| 精品欧美黑人一区二区三区| 高清国产一区二区三区| 亚洲欧美日韩在线| 国产日韩精品一区二区三区| 在线免费精品视频| 色综合天天综合网天天狠天天| 亚洲综合免费观看高清在线观看| 久久精品亚洲一区二区三区浴池 | 国产欧美一区二区精品性色超碰| 欧美日韩一区视频| 久久国产麻豆精品| 亚洲色欲色欲www| 欧美成人精精品一区二区频| 欧美伦理影视网| 成人一区二区在线观看| 天堂av在线一区| 亚洲精品中文字幕在线观看| 精品国一区二区三区| 99国产欧美久久久精品| 日本美女视频一区二区| 亚洲欧洲在线观看av| 日韩午夜激情电影| 日韩网站在线看片你懂的| 日韩一区二区免费高清| 91精品国产美女浴室洗澡无遮挡| 欧美日韩成人在线| k8久久久一区二区三区| 青青草97国产精品免费观看 | 精品一区二区三区在线观看| 蜜桃一区二区三区在线观看| 亚洲女子a中天字幕| 亚洲欧美国产三级| 亚洲精品中文在线| 亚洲成人你懂的| 午夜日韩在线电影| 亚洲精品国产第一综合99久久| 亚洲丝袜精品丝袜在线| 夜夜嗨av一区二区三区网页| 亚洲国产经典视频| 亚洲色欲色欲www| 亚洲国产精品久久一线不卡| 国产精品短视频| 国产校园另类小说区| 亚洲视频在线一区二区| 亚洲一区二区欧美| 免费成人美女在线观看.| 国产一区二区三区av电影 | 一区二区欧美国产| 日韩av一区二区在线影视| 国内久久精品视频| 99riav久久精品riav| 精品视频全国免费看| 日韩女优毛片在线| 91精品免费在线| 欧美精品在线观看播放| 久久影院午夜片一区| 欧美va天堂va视频va在线| 中文一区二区完整视频在线观看| 亚洲三级在线播放| 日韩电影网1区2区| 成人免费精品视频| 91精品国产综合久久久久久久| 久久影院视频免费| 亚洲黄色在线视频| 国产一区二区伦理| 91久久香蕉国产日韩欧美9色| 欧美一区二区精美| 一区免费观看视频| 久久er99热精品一区二区| 91视频www| 久久伊人中文字幕| 亚洲午夜久久久久久久久电影网| 韩国成人福利片在线播放| 91丨九色丨蝌蚪丨老版| 精品国产一区二区三区av性色| 成人欧美一区二区三区| 国产一区二区三区香蕉| 在线观看国产91| 亚洲国产精品av| 久热成人在线视频| 欧美午夜精品免费| 7777精品伊人久久久大香线蕉 | 成人国产精品免费网站| 91影院在线观看| 69堂国产成人免费视频| 亚洲精品第1页| 成人一区二区三区| 精品乱人伦一区二区三区| 亚洲最色的网站| 成人少妇影院yyyy| 久久人人爽爽爽人久久久| 亚洲不卡在线观看| 99久久精品国产一区| 精品欧美久久久| 日韩电影免费在线看| 欧美天堂一区二区三区| 亚洲欧洲国产专区| 国产99精品在线观看| 精品国产亚洲在线| 轻轻草成人在线| 欧美一区二区在线观看| 亚洲自拍另类综合| 欧洲一区二区三区在线| 中文字幕制服丝袜成人av | 欧美日韩免费高清一区色橹橹 | 亚洲国产成人av网| 91在线免费视频观看| 中文字幕高清一区| 高清成人免费视频| 欧美国产一区二区在线观看| 国产乱人伦精品一区二区在线观看| 99国产精品99久久久久久| 亚洲国产精品激情在线观看| 国产99精品视频| 久久久久国产精品厨房| 国产美女娇喘av呻吟久久| 欧美大肚乱孕交hd孕妇| 另类专区欧美蜜桃臀第一页| 欧美一级夜夜爽| 免费成人美女在线观看.| 欧美r级电影在线观看| 理论电影国产精品| 亚洲精品一区二区三区99| 久久国产精品99精品国产 | 99久久精品99国产精品 | 日韩美女久久久| 色噜噜狠狠色综合欧洲selulu| 一区二区三区免费观看| 欧美日韩日本视频| 男男视频亚洲欧美| 精品国精品国产| 福利91精品一区二区三区| 国产精品女主播在线观看| 另类小说色综合网站| 精品国产免费一区二区三区四区| 国模无码大尺度一区二区三区| 国产三级精品在线| 99久久精品国产一区二区三区| 亚洲一区二区免费视频| 在线电影国产精品| 极品少妇一区二区三区精品视频| 久久久精品免费网站| 99久久精品免费看国产免费软件| 亚洲精品成a人| 91麻豆精品国产91久久久使用方法| 免费xxxx性欧美18vr| 国产欧美一区二区三区沐欲| 91捆绑美女网站| 日韩—二三区免费观看av| 久久奇米777| 色噜噜久久综合| 韩国欧美国产1区| 国产精品久久久久久久久免费相片| 在线观看日韩精品| 久久精品国产精品亚洲精品| 国产精品三级av| 欧美精品久久99久久在免费线| 国产精品123区| 国产女人aaa级久久久级| 91污在线观看| 男女激情视频一区| 最新热久久免费视频| 欧美福利视频导航| 粉嫩av亚洲一区二区图片| 亚洲成人午夜影院| 欧美国产精品一区二区| 欧美精选在线播放| 成人激情小说网站| 日本午夜精品一区二区三区电影| 国产精品国产a| 精品三级av在线| 欧美婷婷六月丁香综合色| 国产成人精品免费网站| 首页国产欧美久久| 亚洲欧洲美洲综合色网| 日韩精品一区二区三区中文精品| 色综合久久99| 亚洲sss视频在线视频| 日本一区二区电影| 日韩欧美一区二区免费| 欧美特级限制片免费在线观看| 国产91露脸合集magnet| 美国三级日本三级久久99 | 亚洲色图在线播放|