Tài liệu miễn phí An ninh - Bảo mật

Download Tài liệu học tập miễn phí An ninh - Bảo mật

Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP) TCP is a connection-oriented transport mechanism that resides at Layer 4 of the OSI model.

8/29/2018 5:54:36 PM +00:00

Trend Micro's PC-cillin Firewall Feature

One of many third-party antivirus/Internet security suites, Trend Micro's PC-cillin includes a personal firewall that you can use to protect the system

8/29/2018 5:54:36 PM +00:00

Troubleshooting Example

This through a simple example of troubleshooting a firewall configuration. Troubleshooting starts with the basic connectivity troubleshooting and escalates upward to more complex issues until the specific problem is identified

8/29/2018 5:54:36 PM +00:00

User Datagram Protocol (UDP)

User Datagram Protocol (UDP) UDP is the polar opposite of TCP. Whereas TCP is connection oriented, reliable, and relatively complex, UDP is a connectionless, unreliable

8/29/2018 5:54:36 PM +00:00

Using Firewalls to Segment Internal Resources

Using Firewalls to Segment Internal Resources Perhaps the most overlooked implementation of a firewall is on the internal network.

8/29/2018 5:54:36 PM +00:00

Virtual Private Networks

Virtual private networks (VPNs) are another feature that firewalls have quickly adopted. Firewalls, by the very nature of their placement in the network design, represent a natural device to provide termination for LAN-to-LAN and in some cases remote-access VPNs.

8/29/2018 5:54:36 PM +00:00

What Are the Motives?

There is no shortage of motives behind the threats that attackers come up with. Perhaps the most dangerous motive is the conscious decision to break the law, typically in an effort to gain some financial or monetary gain.

8/29/2018 5:54:36 PM +00:00

What Are the Threats?

One of my favorite quotes is from Sun Tzu's The Art of War: If you know the enemy and know yourself, you need not fear the result of a hundred battles.

8/29/2018 5:54:36 PM +00:00

Where Application Firewalls Fit in a Network

The closer you come to the resource that needs to be protected, the more intelligent and specific you can get in filtering traffic directed at that resource.

8/29/2018 5:54:36 PM +00:00

Where Personal/Desktop Firewalls Fit in a Network

Personal and desktop firewalls are frequently overlooked as security devices that should be implemented on a network.

8/29/2018 5:54:36 PM +00:00

Windows Firewall and Windows XP

The ICF, now dubbed Windows Firewall, is a simple stateful firewall that is part of the Windows XP operating system. In essence

8/29/2018 5:54:36 PM +00:00

Written Security Policies

Written security policies exist to provide a high-level roadmap of what needs to be done to ensure that the organization has a well-defined and thought-out security strategy

8/29/2018 5:54:36 PM +00:00

Microsofts ISA Server 2004 Firewall phần 5

Configuring the Web Proxy Client The web proxy client is any system that has been configured to use a proxy for Winsock applications. This is typically done in the client web browser settings

8/29/2018 5:54:36 PM +00:00

Bảo vệ dữ liêu khi bị mất Laptop Laptop

Laptop ngày càng phổ biến và trở thành nơi lưu trữ dữ liệu quan trọng, riêng tư của người dùng. Nếu chẳng may laptop bị đánh cắp, thì hậu quả thật khó lường. LaptopLock sẽ giúp bạn bảo vệ dữ liệu trong hoàn cảnh đó.

8/29/2018 5:51:15 PM +00:00

A Basic UNIX Overview

A Basic UNIX Overview Asriel UNIX FOR DOS ADDICTED WaReZ PuPPieZ AND THEIR PETS Introduction

8/29/2018 5:51:11 PM +00:00

Anonymity complete GUIDE

Anonymity complete GUIDE By Theraider & Dangerous R. Anonymity on the web

8/29/2018 5:51:11 PM +00:00

DDOS - Distributed Denial Of Service 2

DDOS - Distributed Denial Of Service. • 1998 Chương trình Trinoo Distributed Denial of Service (DDoS) được viết bởi Phifli

8/29/2018 5:51:11 PM +00:00

Demosearch

End-User Experience Office SharePoint Server 2007 provides an enhanced search end-user experience by making it easier to find information through a consistent interface, with improved relevancy of the results that are returned.

8/29/2018 5:51:11 PM +00:00

Denial of Service I

Denial of Service I/. Giới thiệu khái quát về DoS

8/29/2018 5:51:11 PM +00:00

DISTRIBUTED DENIAL OF SERVICE (DDOS)

DISTRIBUTED DENIAL OF SERVICE (DDOS) GIỚI THIỆU Distributed Denial Of Service (DDoS)

8/29/2018 5:51:11 PM +00:00

Firewall protection how to?

What is a Firewall? A firewall is a tool that monitors communication to and from your computer. It sits between your computer and the rest of the network, and according to some criteria, it decides which communication to allow, and which communication to block.

8/29/2018 5:51:11 PM +00:00

Guide to Hacking with sub7

Guide to Hacking with sub7 By Ølîprõ Customising your trojan: 1. Well first you need a victim so ICQ would be a brilliant place to start, considering you can get a program that’ll give you that victim’s I.P if you can’t get the scanner on sub7 to work.

8/29/2018 5:51:11 PM +00:00

Hacking and phreaking

When i began hacking and started reading all of the beginner files, I still had many un-answered questions. my questions were eventually answered, but only through LOTS of reading and practice.

8/29/2018 5:51:11 PM +00:00

Hacking for Dummies Contents of Volume 2

Hacking for Dummies

8/29/2018 5:51:11 PM +00:00

Hacking for newbies

Introduction - OK, this file is intended solely for people who know very little about hacking, and when I say very little I mean very little.

8/29/2018 5:51:11 PM +00:00

Hacking in telnet ftp

[I Want to Start at the Start] [I Want to Go Straight to Hacking] INTRODUCTION: A little background is needed before we get into hacking techniques. When we talk about ‘Hacking’

8/29/2018 5:51:11 PM +00:00

Hacking on telnet explained

Telnet: the Number One Hacker Tool In this Guide you will learn: • What is telnet? • How to telnet • How to get telnet accounts • Why you might not want to telnet

8/29/2018 5:51:11 PM +00:00

Hacking on xp part 1

Part I: The Magic of DOS In this guide you will learn how to telnet

8/29/2018 5:51:11 PM +00:00

Hacking on xp part 2

How to Telnet with Windows XP The queen of hacker commands is telnet. To get Windows help for telnet, in the cmd.exe window give the command

8/29/2018 5:51:11 PM +00:00

Hacking on xp part 3

How to Forge Email with Windows XP Telnet Want a computer you can telnet into and mess around with, and not get into trouble no matter what you do to it?

8/29/2018 5:51:11 PM +00:00