Inbreak testing system principle and practice (1)
IDS:THEORY&PRACTICE
Inbreak testing system: Theory and practice
Since the computer be joined begin with network means, network safety becomes a major problem, as the development of INTERNET, the requirement of safe system also grows day and day, one of its requirements inbreak namely testing system.
The article aims to introduce a few kinds to inbreak commonly testing system and its theory and practice, what need points out is, the article is a literary works that introduces a gender merely, although I recommended a lot of likely systems, before you believe its dependability, still had better be thorough research them. (NND, irritated dead I, want to knock 4 words, I was gotten with respect to abbreviation ID after. Inbreak testing system is IDS: - ) )
One, what is to inbreak detect.
Inbreak detecting is to show surveillance perhaps is below probable condition, prevent the system that inbreak or tries to control you or the sort of effort of network resource.
In short, its working way is such: You have station machine, be gotten on to the network by join, perhaps was gone to repeatedly namely on INTERNET, stem from understandable reason, you also are willing to visit the license of your system from the network to be installed by the authorized person. For instance, you have the WEB server that goes up to INTERNET with stage join, the page that is willing to make employee and client, potential client OK visit memory to go up in WEB server.
However, you are not willing those employees without accredit, client is other perhaps visit a system without the tripartite of accredit. For instance, you are not willing to design the personnel beyond personnel to be able to be revised besides the webpage of company service store the page on the machine. One of typical methods use firewall namely or system of some kind of attestation will prevent the visit without accredit.
But, below a few circumstances, simple use firewall or attestation system is OK also by breach. Inbreak detect even if such in order to plant technology, it will be right attempt to make response without the join of accredit, can resist even inbreak possibly with the part.
So,
2, why should use ID?
Gave out to use the argument of ID below:
(1) the data security that you need to protect your and system, and the fact is to be below present INTERNET environment, if you use common password and file protection means merely, you assure the security of your data and system impossibly forever.
(2) to protective data, the safety that compares a system without what is more important, want so hook up your machine INTETNET and do not make any defending, do not establish even administrator code even, with respect to the hope this machine is met uneventful, that is simply close to covet of Yu Chi heart. Same, the system is right core file or accredit database (for instance the SAM of NT is mixed of UNIX / ETC/PASSWORD or / ETC/SHADOW) protection also is very important.
Previous12 Next
Hot Concern
- Windows2000 system flaw is sol
- Inbreak detect term is contact
- Be aimed at ACCESS flaw anothe
- SQL infuse flaw is contacted c
- SQL infuse flaw is contacted c
- Inbreak testing system princip
- Inbreak testing system princip
- SQL infuse flaw is contacted c
- Analyse IDS to inbreak testing
- Inbreak detect term is contact
- Dynamical article uploads this
- New virus code treats the defe
- Pry " super bodyguard " fatal
- PHP collects fees small leak o
- Hacker of new SP2 flaw switchs
Random Recommendation
- Inbreak detect term is contact
- Dynamical article uploads this
- New virus code treats the defe
- Inbreak testing system princip
- Inbreak testing system princip
- Hacker of new SP2 flaw switchs
- Inbreak testing system princip
- SQL infuse flaw is contacted c
- Be aimed at ACCESS flaw anothe
- Analyse IDS to inbreak testing
Position:中国防火墙网>Vulnerability patch>
Inbreak testing system principle and practice (1)
From; Author:Stand originally