Welcome to中国防火墙网
Add to Favorites | Chinese
Primary technology summarizes the hacker
From;    Author:Stand originally
Network safety is told from its substantially is the information safety on the network. From broad sense for, the confidential sex that always involves the information on the network, integrality, usability, authenticity and the relevant technology that can charge a sex and the research domain that are network safety theoretically. Ensure the information safety of network system is the target of network safety, information safety includes two fields: The transmission of the memory safety of information and information is safe. The memory safety of information is the safety that shows information deposits condition to fall in the static state, if whether be met,be called to wait by blame accredit. The transmission safety of information is the safety in showing information transmits a process in trends. To ensure the transmission of network news is safe, have the following problems:

(1 ) to the information on the network monitor
(2) risk to the copy of user identity
(3) to the information on the network distort
(4) give to the information that issue deny
(5) undertake weighing sending to information

To general commonly used inbreak the method basically has

1. Countersign inbreaks

Alleged countersign inbreaks, show with a few software unlock has gotten namely but be added close countersign documentation, it is OK that nevertheless a lot of hackers already used a kind in great quantities steer clear of or the program that screen countersign protects will complete this work. OK to those unlock or the program that screen countersign protects are called normally “Crack” . As a result of these software wide to circulate, make inbreak computer network system becomes quite simple sometimes, do not need to understand internal composition of the system deep very much commonly, it is the good method of abecedarian.

2. Trojan horse art

Respecting Trojan horse, want to know the person of this story is not fathomless only, its most typical method may be one can help a hacker finish some the program of specific action depends on in some in the normal procedure of lawful user, at this moment the program code of lawful user already was changed by this. Once the user sparks this program, so the hacker instruction code that depends on inside is activationed at the same time, these code often can finish the job that the hacker assigns. Because this kind inbreaks,law need hacker has very good process designing experience, and should change the competence with want code, certain, master harder so. But the complexity because of it, general systematic manager discovers very hard.

3. Listening law

This is one very practical but the hacker with very big also risk inbreaks method, but still a lot of inbreak systematic hacker uses this kind of method, alleged art tall person is audacious.

The communication between network node or workstation is pass iformation flow transmit be able to come true, and collect line should be done not have in implement in the network, the transmission of data does not have the direction with specific demonstrate, at this moment each network node or workstation are an interface. This is just like some node to say: “ hey! Who there is in you is the workstation that I want to send message. ”
Previous12 3 4 5 6 7 8 9 10 11 Next

About us | Legal Notices | Sitemap | Links | Partner