Firewall

Learn about firewall, we have the largest and most updated firewall information on alibabacloud.com

Ebtables 2.0.10.3 Release bridging firewall Filter Tool

Ebtables is a filtering tool for bridging firewalls. This tool is mainly used in the field of link Layer Ethernet frame, besides filtering function, it can change Ethernet MAC address and realize Bridge path. Ebtables 2.0.10.3 This version fixes a counter for an incorrect application. Software information: http://ebtables.sourceforge.net/download address: Http://sourceforge.net/projects/ebtables/fi ...

Gtk-gnutella 0.97.1 Publishing Gnutella Client

Gtk-gnuthttp://www.aliyun.com/zixun/aggregation/39811.html ">ella is a fully functional Gnutella client that uses gtk++. It contains all the features that deploy Gnutella, and supports DHT. It features minimal CPU time and memory, 7x24-hour uptime, fully compliant UPnP and NAT-PMP, and supports firewall port mapping technology. Currently supported operating system: L ...

What industry value does Cloud Security 2.0 bring

The FT reported that an average of 20 seconds of hacking into a computer network has occurred, with more than 1/3 of the Internet firewalls being breached at times! At the rate of growth that the current network threatens, It is expected that by 2015 the global Internet will have 233 million malicious programs, users will have 26,000 new viruses per hour to deal with! streaking, and then NB experts are also difficult to deal with, not to mention ordinary Internet users, and the traditional killing soft firewall software is obviously difficult to cope with this attack. By the Google cloud of the Kai ...

NetworkManager 0.9.0 Release Network quick Switch tool

NetworkManager 0.9.0 This version adds support for Fast User Switching. A new permission model is introduced. Configuration is simplified. Introduce a new network applet more flexible API, allow connection detection, portal site Automatic login, bundled VPN connection, agent and firewall handling as well as more. Increased access to 4G WiMAX networks that support Intel WiMAX devices, optimizing WiFi roaming through wpa_supplicant background scanning and nl80211. GObject self test increased libn ...

Design and implementation of virtual machine flow detection system based on OpenFlow

Design and implementation of virtual machine flow detection system based on OpenFlow Shaolin Chen Xing Shu Yun Xu Zhang Fengwei Cloud Platform under the virtual machine in the physical machine internal interaction flow, and not through the firewall and other security components. In view of the problem that such traffic can not be acquired and detected in the network boundary, the principle of OpenFlow technology is analyzed, and a scheme based on OpenFlow technology to redirect virtual machine traffic to intrusion detection system is proposed. The scheme replaces traditional switches with OpenFlow virtual switches and controllers, and then based on OpenFlow ...

There is growing evidence that 360 is involved in the hardware sector

Summary: 360 company CEO Zhou (Weibo) more and more evidence shows that 360 is involved in the hardware sector. People familiar with the matter to Tencent Technology, 360 is teaming up with the old router manufacturers Shenzhen Lei Research hair router, is expected to be the main network security features, 360 in the router implanted 360 company CEO Zhou (Micro bo) More and more evidence that 360 is involved in the hardware field. People familiar with the technology revealed to Tencent, 360 is teaming up with the old router manufacturers Shenzhen Lei Research hair router, is expected to be the main network security features, 360 in the router ...

"Father of the firewall" Bupt principal Fang said he had resigned due to illness

June 27, the Internet is a summary of some things: Technology blog Theverge reported that Motorola Mobile replaced the logo, with new graphics and fonts. The most obvious change is that the logo is added under the "a Google Company" (a Google companies) words.   The new and old version two is posted at the same time, let you feel. The father of the Great Firewall, Fang, president of Beijing University of Posts and telecommunications, said in his 2013-year graduation ceremony, "due to excessive overdraft of his body", "a big illness let me lose the ability ...

Popular talent show "good voice of China" officially aired in the second quarter

July 12, the popular talent show "good voice of China," the second quarter of the official broadcast, attracted the attention of many netizens. But at the same time, from July 12 to the present, a little more than a week time, rising "cloud security" system to intercept thousands of fake "good voice second season" phishing website. China information Security Report of the first half of 2013, the latest release of the state Information Center, in the first half of this year, hit the talent show has become the focus of hackers, all such programs "out of the lottery" site are phishing scams, users once credulous, can cause thousands of ...

Ubuntu Open Firestarter Firewall settings + boot automatically

Detected device: Ethernet device (ETH1) This one cannot be enabled, and then the modification begins. sudo gedit/etc/firestarter/firestarter.sh Find #--(Extract receptacle information)--# External receptacle data to join them Lang=en_us This is OK, enable success

Ubuntu 10.10 Set Pcmanx login Chinese BBS

From 8.04 onwards, I used Pcmanx Chinese newsmth, someone fork a gemanx, used a bit not too many attractive places. Since the upgrade to 10.10, Pcmanx can not use, but I am not afraid to toss. Here's a toss of the steps to write down. The reason why the firewall can not be connected most firewalls ban Telnet service, so it is recommended to use SSH, more secure (will not be listening to the password) some SSH can not directly connect to the BBS server, it needs to use connect-proxy+s ...

Ubuntu Use Agent Service

Proxy server is an important security feature that works primarily in the http://www.aliyun.com/zixun/aggregation/9214.html "> Open Systems Interconnection (OSI) model's dialog layer, To play a role as a firewall. Proxy servers are mostly used to connect to the Internet and intranet (local area networks). Temporary agent terminal below export http_proxy= ...

Security considerations when using OpenLDAP software

The OpenLDAP software is designed to work in a variety of computing environments, ranging from controllable closed networks to global Internet. So OpenLDAP software supports many different security mechanisms. This chapter describes these mechanisms and discusses security considerations when using OpenLDAP software. Network security Selective http://www.aliyun.com/zixun/aggregation/16742.html ">listening ...

Security firewall prevents Windows blue screen attacks don't be afraid!

The following article is mainly about the security firewall to prevent Windows blue screen attacks in the actual operation process, the Windows family of operating systems in the crash, often displays a blue screen, which is written with some complex symbols and numbers. The blue screen attack actually takes advantage of the kernel flaw of the Windows operating system, or uses a large number of illegal format packets to send to the attacked machine, causing the network layer of the Windows operating system to be damaged, which causes the Bluetooth to panic. At present, the most common attack methods are: L.netbios attack: To ...

Yurun September was exposed to the problem of Master Kang drum noodles and gifts to save "time difference"

Yurun September was exposed to the problems of the brand was questioned consumer Da Guo September 18 9 o'clock in the morning, Sichuan Hejiang County Town Center Primary school students, after eating rain-run ham intestine, the symptoms of abdominal pain. Throughout the day, students were sent to the hospital to prescribe infusion, a total of 38 people. 20th afternoon, call Yurun group sales, a staff member of the "Problem ham sausage" to explain: "This is only an individual phenomenon, the quality of the product is not a problem." Rain run cold fresh pork monopoly Guiyang Golden Road store opened September 8, is the second store in Guiyang (the first camp in the vicinity of the best Silver Garden), is still ...

The bank shares the insurance must set up the firewall

Business News (reporter Triping Chi Qibin) in the future, the deep cooperation between commercial banks and insurance companies will be rule-based.  Yesterday, the CBRC issued the "Commercial Bank investment insurance companies in the pilot Management measures" (hereinafter referred to as the "method"), "measures" for commercial banks to invest in the insurance companies specific details to be stipulated, while the banks to prevent the risk of banking and insurance transfer set up the necessary "firewall." In fact, prior to the introduction of the scheme, the cooperation between banks and insurance companies has begun. As early as January 2008, the CBRC and the CIRC have signed a deep ...

Cloud server: Seven security secrets you don't know

The recent cloud server by the people fired very fire, some people who understand is constantly in the hype, some are not understand people everywhere consulting, this cloud server than the previous server in the end is there? Today's homepage June and you share some of this cloud server 7 Big security secrets.    "Secret one: Starting from the basic, timely installation of system patches" whether it is Windows or Linux, any operating system has vulnerabilities, timely patching to avoid vulnerabilities are deliberately exploited, is one of the most important guarantee of server security. "Secret Two: Installing and setting up firewalls" now has many bases ...

2014 Security: Focus Cloud encryption, network virtualization

The advent of 2014 has not halted the threat of data security. Just happened to pay the treasure inside Ghost events show that this is a war that is impossible to stop, and the latest US National Security Agency (NSA) quantum computer, which can decipher any cipher and encryption algorithm in the world, means that the security challenges we face are increasingly diverse. At the dawn of the New Year, Kindervag, the lead analyst at Forrester, has predicted for us what cyber-security professionals will face in the 2014 ...

Dante 1.3.2 Release Agent communication Solution

Dante is a free agent protocol socks version 4 and SOCKS version 5 (RFC 1928) implementation. It can be used as a firewall between networks to control outgoing traffic. The package consists of two parts: the SOCKS server and the proxy client, supporting the Socks,http agent and UPnP. RFC1961 (GSSAPI) supports SOCKS servers and proxy clients. Dante is a circuit-level SOCKS client/server that can be used to provide convenient, secure http://www ...

Total Pages: 2 1 2 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.