首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
描述了防火墙在网络安全中的作用和重要性,介绍Linux防火墙的Netfilter/iptables防火墙框架,并对通过iptables使用防火墙这一方法列出了实例配置和分析。  相似文献   

2.
Linux操作系统是一个成熟于网络的非常优秀的网络操作系统,其防火墙框架也在不断发展、体系结构趋向合理、功能强大,且与系统内核结合的完美紧密,已成为Linux平台下进行网络服务的强大工具。Netfilter/iptables IP信息包过滤系统将自己集成到系统内核中,其速度快、稳定性强。本文剖析Linux防火墙的原理,提出在园区网络中的一种应用方案。  相似文献   

3.
从Linux2.0的ipfw框架、ipfwadm工具到Linux2.2的ipchains框架、ipchains工具,再到目前Linux2.6的Netfilter/iptables框架,Linux防火墙的体系结构框架趋向合理完美。特别是Linux2.4内核的发布更是一个里程碑,在网络功能方面,Linux2.4内核相对于Linux2.2内核在IP协议栈部分有很大的变化,在防火墙方面,Netfilter/iptables框架结构的引入更是革命性的变化,这一框架结构已经成为Linux2.6内核防火墙的最重要的特色,本文对Netfilter的结构进行了剖析。  相似文献   

4.
该设计以Fedora Core 9为开发平台.利用Linux内核内置的iptables机制,实现了一个适用于小型企业,并具有IP共享器功能的防火墙。  相似文献   

5.
该设计以Fedora Core 9为开发平台,利用Linux内核内置的iptables机制,实现了一个适用于小型企业,并具有IP共享器功能的防火墙.  相似文献   

6.
本文针对Linux本身所具有的良好安全机制,从不同角度阐述了如何设置才能更好地提高系统安全性。接着重点介绍了与Linux内核集成的iptables包过滤系统,在此基础上实现了一个简单的linux防火墙系统,经实际测试能够达到对外网防御内网保护的目的。  相似文献   

7.
《内江科技》2016,(2):60-61
目前Internet上的主机都必须使用唯一的IP地址,因此常会面临IP地址不足的窘况。除此之外,它也会产生安全性问题,因为直接暴露在Internet的主机都将遭受来自外界的攻击。有鉴于此,本文将尝试使用NAT的方式来提供解决方案,同时也介绍Linux下iptables软件的使用和防火墙的基本概念。  相似文献   

8.
本文创新地设计与实现了基于Linux主机的IPv6分布式防火墙。本文首先阐述了分布式防火墙的概念和原理;接着分析基于Linux主机的IPV6分布式防火墙系统总体设计,然后,论述基于Linux主机的IPV6主机防火墙的设计与实现,并详述其具体实现的各个模块,最后对本系统进行了性能测试。  相似文献   

9.
文章就Linux在代理服务器、防火墙上的强大功能,并结合校园网应用的特点,提出切实可行的网络安全策略和保护措施。  相似文献   

10.
文章就Linux在代理服务器、防火墙上的强大功能,并结合校园网应用的特点,提出切实可行的网络安全策略和保护措施.  相似文献   

11.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

14.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

15.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

16.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

17.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

18.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

19.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

20.
Prof. SUN Changpu from the CAS Institute of Theoretical Physics and coworkers from University of Basel in Switzerland have worked out a way --at least in theory --to split a beam of molecules according to their chirality. The technique involves passing the molecules through three different laser beams and is similar to the famous Stern-Gerlach effect, whereby a beam of atoms passing through a magnetic field is split in two according to the atoms' spin states (Phys. Rev. Lett. 99 130403).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号