Welcome![Sign In][Sign Up]
Location:
Search - network security

Search list

[Exploitlibnids-1[1].16.tar

Description: 基于TCP/IP协议的网络入侵检测系统是在Linux平台下,充分利用Linux的网络特性来设计的网络安全防御系统的一部分。在完全理解TCP/IP通讯协议的基础上来开发基于网络的入侵检测系统,它主要包括以下几个部分:数据包拦截器,数据包分析器,数据包生成器,远程通讯控制模块,集中管理模块等。 关键字:入侵检测系统,网络安全,协议分析,网络入侵检测系统- Based on the TCP/IP agreement network invasion examination system is under the Linux platform, fully a network security defense system part which designs using the Linux network characteristic. Completely was understanding the TCP/IP communication agreement the foundation comes up the development based on the network invasion examination system, it mainly includes following several parts: Data packet interceptor, data packet analyzer, data packet production, long-distance communication control module, centralized management module and so on. Essential character: Invasion examination system, network security, protocol analysis, network invasion examination system
Platform: | Size: 72309 | Author: 吴玲 | Hits:

[Exploit网络安全技术解析-20020920

Description: 本教程是面向对网络安全感兴趣的菜鸟们的,只要对网络安全感兴趣,无须计算机基础,就能轻松上手,赶快看看吧!也希望籍此结交高手,交流心得,扩大我们计算机从业人员队伍。-this tutorial is geared to network security Caidaomen interest, as long as network security interest, not computer based, it was easy to get started soon and see! Also hope to use the occasion to make a master, to share experiences, expand our ranks of computer professionals.
Platform: | Size: 752470 | Author: 谢玉雄 | Hits:

[Exploit小西的网络安全教程

Description: 优秀的网络安全教程,交你一些基本的东西-outstanding network security guide offered you some basic things
Platform: | Size: 4170079 | Author: 场里 | Hits:

[WinSock-NDIS局域网扫描空密码主机和ftp共享资源

Description: 本安全评估系统通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测,去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。-assessment of the security system of network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack.
Platform: | Size: 165763 | Author: 石林 | Hits:

[WEB Code西安黑客联盟主站程序

Description: 西安黑客联盟主站程序,后台:admin admin888 黑色界面!内有大量的网络安全文章-Xi'an main stations, background : admin interface admin888 black! With a large number of network security article
Platform: | Size: 2694827 | Author: 扬宏 | Hits:

[CommunicationNetTime

Description: 用于扫描你的电脑上所有的TCP端口的状态。利用这个功能,你可以轻松、快速的查出你的电脑上所使用的TCP端口,进而判断你的电脑是否中了木马。扫描出来的端口状态有两种:拒绝连接、接受连接。对于处于拒绝连接状态的端口,很可能是你的电脑为了与外部主机连接而使用的,通常情况下不会对你的网络安全构成威胁。而处于接受连接状态的端口,可能会对你的网络安全构成威胁,甚至很有可能是木马程序在运行!假若你想通过本端口扫描来判断你的电脑是否中了木马,在扫描时请不要运行其它网络程序,如果扫描结果还是有处于接受连接状态的端口,那请小心警惕!最好找个电脑高手来帮忙! 注意:对于137,138,139这三个TCP端口,即使这里的扫描没有给出扫描结果,也并不代表这三个端口不接受连接,通常情况下,Windows系统会开放这三个端口。你可以用“聊天客户”来测试这三个端口是否开放,具体用法如下:翻到“聊天客户”页,选择“主机列表”里的“本地主机”,将端口改为137(或138或139),单击“连接”,若出现提示“建立连接”,则端口137(或138或139)是开放的。-used to scan your computer on all the TCP port state. Using this feature, you can easily and quickly identify your computer by the use of TCP port, then your judgment on whether a computer Trojan horse. Scanning the state has two ports : connecting refused to accept connections. For refused to connect at the state port, it is very likely your computer to connect with the mainframe and external use, under normal circumstances you will not pose a threat to network security.!accept the connection status of ports, care alert! finding the best computer experts to help! Note : This three TCP 137, 138 and 139 ports, even if the scanning here is not the results of the scan, it does not mean that this does not accept three port connectivity
Platform: | Size: 369674 | Author: 李利 | Hits:

[ExploitContourCubeX 2.0控件的破解工具源码

Description: ContourCubeX 2.0控件的破解工具源码,网络安全,加密开发-ContourCubeX 2.0 Controls crackers source, network security, encryption Development
Platform: | Size: 17519 | Author: 石朋非 | Hits:

[Other resource大学生安全联盟安全教程

Description: 大学生安全联盟安全教程 书籍语言: 简体中文 书籍类型: 网络安全 授权方式: 免费软件 书籍大小: 1.82 MB-security alliance guidebooks books Language : English books categories : network security license : free software books Size : 1.82 MB
Platform: | Size: 1904750 | Author: 路宜山 | Hits:

[WinSock-NDIS计算机安全&保密技术

Description: 计算机安全与保密技术 书籍语言: 简体中文 书籍类型: 网络安全 授权方式: 免费软件 书籍大小: 200 KB -computer security and confidentiality technical books Language : English books categories : network security license : free software books Size : 200 KB
Platform: | Size: 224576 | Author: 路宜山 | Hits:

[OtherSW_Network Attack and Defence

Description: 网络攻击与防护概念性内容,包括前言,网络安全和风险分析,以后更新-network attack and defense conceptual content, including the foreword, network security and risk analysis, future updates
Platform: | Size: 5488344 | Author: 李琨 | Hits:

[ExploitalertLogAnalysis

Description: 这是一个基于java,snmp的网络安全日志审计系统,提供方便的用户交互界面,以及实用的日志分析功能-This is a java-based, snmp network security audit log system to provide easy user interface, as well as the practical function of the log analysis
Platform: | Size: 1312037 | Author: 高岩宇 | Hits:

[Other resource国家信息化网络安全考试题及答案

Description: 国家信息化网络安全考试题及答案 书籍语言: 简体中文 书籍类型: 认证考试 授权方式: 免费软件 书籍大小: 56 KB -national information network security and examination answer books Language : English books types : Certification Examination Authorization : free software books Size : 56 KB
Platform: | Size: 58420 | Author: 路宜山 | Hits:

[WinSock-NDIS网络评估系统

Description: 该项目通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技 术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测, 去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同 时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安 全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。 -the project through the network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack.
Platform: | Size: 1170077 | Author: 大大 | Hits:

[OtherNetwork-

Description: Network security and electronic commerce Network security and electronic commerce Network security and electronic commerce -Network security and electronic commerce
Platform: | Size: 421888 | Author: j | Hits:

[OtherThe-computer-network-curriculum

Description: 计算机网络教程 ppt 主要介绍了电话网 英特网 通信网等各个网络的物理分层和逻辑层结构以及网络安全-Computer network tutorial PPT mainly introduced the network the Internet communication network, network physical layer and logical layer structure and network security
Platform: | Size: 5920768 | Author: 刘跃 | Hits:

[OtherCryptography-and-Network-Security-Principles-and-

Description: Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. cryptography is about constructing and analyzing protocols that prevent third parties or the public reading private messages various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography.-Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. cryptography is about constructing and analyzing protocols that prevent third parties or the public reading private messages various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography.
Platform: | Size: 10075136 | Author: Nisha Pal | Hits:

[OtherThe-Practice-of-Network-Security-Monitoring

Description: This may be one of the most important books you ever read. Cybersecurity is both a national and economic security issue. Governments worldwide wage clandestine battles every day in cyberspace. Infrastructure critical to our safety and well-being,
Platform: | Size: 13274112 | Author: 20e23ec1 | Hits:

[androidWireless network

Description: wireless network security
Platform: | Size: 8192 | Author: khaan | Hits:

[Othersecurity

Description: Approach: NS-2 is an open source system that is developed using C++ and Tool Control Language TCL. Researchers can freely add new components to the system to server their own purposes. The latest version of NS-2 is version 2.28. Within this version, most of the standard protocols supported. You can find protocol from media access layer protocols such as CSMA/CD up to application protocols as FTP and HTTP. For routing protocols, there are unicast and multicast routing protocols for wire network and DSR, DSDV, AODV for wireless ad-hoc networks. Most of these protocols were developed by researchers and adopted into standard version of NS-2. In order to experiment security features for network, we need to add security functions into NS-2. Of course for specific experiments there are specific requirements. The purpose of this project is only to illustrate a way to add security functions into NS-2 Our approach is to build a new protocol at network layer
Platform: | Size: 2048 | Author: bvc | Hits:

[Firewall-Securitynetwork security

Description: Document for wsn security ,is helpful
Platform: | Size: 96620 | Author: 2381337458@qq.com | Hits:
« 1 2 ... 5 6 7 8 9 1011 12 13 14 15 ... 50 »

CodeBus www.codebus.net