当前位置:网站首页>What is the principle of Ping? How does the server disable Ping?
What is the principle of Ping? How does the server disable Ping?
2022-06-24 04:32:00 【User 8715145】
The study found that , Now many attackers can penetrate enterprise content by scanning , Steal information resources by destroying servers , The network system of small and medium-sized enterprises is not perfect , The internal and external networks have not made a perfect layout , This leads to frequent network attacks , that Ping What is the principle of ? How the server prohibits ping?
Ping What is the principle of
Ping Is based on ip Agreement to work , It usually sends a data report to the target host first , Once the host sends the feedback report , That means ping The network of the target host can be interconnected , From this feedback report ,ping Can get the information of the target host ip Address and other controllable information , In this way, data packets can be created , Change program , attack , How can the enterprise server prohibit ping?
How to prohibit ping
How to disable the enterprise server ping? It can be forbidden through the firewall , First you need to get into “ Control panel ”, find “ Management tools ” Back entry “ Advanced security firewall ”, After clicking on “ Inbound rules ”, It is forbidden to ping function , Make the system unable to respond to service requests , The effect of this rule change is , Outside the station ping When you initiate an induction to an enterprise , Internal computers do not send feedback reports , In this way, the resource security of the enterprise is protected .
How the server prohibits ping? The above has been briefly introduced to you , Whatever the size of the enterprise , Are facing the possibility of being attacked , To ensure that the enterprise network is in a secure state , To prevent attacks by external hackers , It is suggested that enterprises prohibit ping, And regularly invite professional network operation and maintenance companies to check and optimize , So as not to lure hackers with expired data such as encoding .
边栏推荐
- Diskpart San policy is not onlineall, which affects automatic disk hanging
- An interface testing software that supports offline document sharing in the Intranet
- 共建欧拉社区 共享欧拉生态|携手麒麟软件 共创数智未来
- Chemical properties and specificity of Worthington Papain
- What is etcd and its application scenarios
- Can the video streams of devices connected to easygbs from the intranet and the public network go through their respective networks?
- High availability architecture design to deal with network failure of operators
- Gpt/gpt2/dialogpt detailed explanation comparison and application - text generation and dialogue
- What is FTP? How does the ECS open the FTP protocol?
- Pycharm from installation to full armament
猜你喜欢

Doctor application | Hong Kong University of science and Technology (Guangzhou) Mr. Liu Hao recruits the full award doctor / Master in data mining

祝贺钟君成为 CHAOSS Metric Model 工作组的 Maintainer

External network access SVN server (external network access SVN server deployed on the cloud)

Introduction to C language custom types (structure, enumeration, union, bit segment)

Training course of mixed accuracy from simple to deep

英特尔 XTU 官方超频工具已支持 Win11 22H2 和 13 代酷睿 Raptor Lake 处理器

Openeuler kernel technology sharing issue 20 - execution entity creation and switching

Multi task video recommendation scheme, baidu engineers' actual combat experience sharing

抢先报名丨新一代 HTAP 数据库如何在云上重塑?TiDB V6 线上发布会即将揭晓!

Abnova荧光原位杂交(FISH)探针解决方案
随机推荐
多任务视频推荐方案,百度工程师实战经验分享
Abnova多肽设计和合成解决方案
什么是数据中台
事件
Openeuler kernel technology sharing issue 20 - execution entity creation and switching
Mac CentOS installation phpredis
Chemical properties and specificity of Worthington Papain
Student information management system user manual
15+ urban road element segmentation application, this segmentation model is enough
Application practice | Apache Doris integrates iceberg + Flink CDC to build a real-time federated query and analysis architecture integrating lake and warehouse
Abnova peptide design and synthesis solutions
web渗透测试----5、暴力破解漏洞--(6)VNC密码破解
编译器是如何将芯片执行的第一个指令放到芯片起始地址的?
openGauss 3.0版本源码编译安装指南
web渗透测试----5、暴力破解漏洞--(9)MS-SQL密码破解
Advanced authentication of uni app [Day12]
微博国际版更名为微博轻享版
Specificity and correlation of Worthington deoxyribonuclease I
Gpt/gpt2/dialogpt detailed explanation comparison and application - text generation and dialogue
"The first share of Chinese member e-commerce" gathered in the anti reptile attack and defense war | talk with industrial security experts