当前位置:网站首页>Guide to the construction of network security testing laboratory - Chapter 1, section 1.5 key terms
Guide to the construction of network security testing laboratory - Chapter 1, section 1.5 key terms
2022-07-25 01:43:00 【Full stack programmer webmaster】
Hello everyone , I meet you again , I'm the king of the whole stack .
This excerpt is from the asynchronous community 《 Network security test Laboratory construction guide 》 No 1 Chapter 1.5 Section key terms , author 【 beautiful 】Michael Gregg( Michael Greg )
1.5 Key terms chmod—— Used to change file permissions Linux Operating system commands . etc/shadow file ——Linux The possible storage location of password files in the system , Only root User access . A firewall —— A software or hardware security system used to manage and control network connectivity and network services . Firewall is the throat of traffic entering and leaving the network , It can also block unrestricted access . Firewalls can be connected firewalls or connectionless firewalls . A hub —— It is a device that can connect computers and other devices in Ethernet LAN ( For example, network attached memory ) Devices connected by network cables . ISO Image file —— Can be stored as a separate file CD or DVD Image file of CD , At the same time, it can represent the complete structure of the CD . Unlocking Technology —— Technology that does not rely on keys to unlock . Enforce access control —— Is a way to control access . Access rights are determined by the sensitivity of the information contained by the interviewee ( Use labels to indicate ) And the authorization assigned to visitors to access this information ( Such as the “ clear ” Authorization of ) To decide . MD5sum command ——MD5 It is a method of generating 128 Bit information digest to check the data integrity of the encryption algorithm ,MD5sum yes Linux System execution MD5 Command of Algorithm . Network Attached Storage —— It is a storage device for files and data , And support LAN direct access . Phone theft —— Used to express telecommunication network or telecommunication 、 Illegal operation caused by voice network cracking . Router —— The device determines the next network node that a packet will pass through in the process of forwarding to the final destination . The router creates and maintains a routing table , And use the information in the table to determine the best path of each packet . The routing process takes place in OSI The third layer of the seven layer network model ( The network layer ). Salt value —— Add a layer of randomness to the stored password by changing the password hash value . Switch —— A device used to separate LANs and provide packet filtering . A LAN switch has multiple ports , Each port can support an entire Ethernet or token ring LAN . virtualization —— Virtualization technology is a software implementation method for hardware . It allows users to run multiple operating systems on the same physical host without affecting each other . WiFi The detector —— A device used to detect wireless signals . Wireless access point —— Devices used to bridge wired and Wireless Networks . Wireless access points act as central nodes for wireless device users connected to wired networks .
Publisher : Full stack programmer stack length , Reprint please indicate the source :https://javaforall.cn/108543.html Link to the original text :https://javaforall.cn
边栏推荐
- The current situation of the industry is disappointing. After working, I returned to UC Berkeley to study for a doctoral degree
- On let variable promotion
- How to use ES6 async and await (basic)
- After burning up 130 billion yuan in ten years, vertical e-commerce will eventually enter the dust of history
- Some of my understanding about anti shake and throttling
- Beijing Zhun electric clock, Beidou clock server, GPS network time server, NTP satellite timing system
- [C + + primer notes] Chapter 6 functions
- Origin and development of philosophy Hegel external historical form
- Record the bugs encountered and some work experience
- [hero planet July training leetcode problem solving daily] 20th BST
猜你喜欢

Musk responded whether he would upload his brain to the cloud: already did it!

The most complete summary of MySQL data types in history - (first)

【Power Shell】Invoke-Expression ,Invoke-Expression -Command $activateCommand; Error or power shell failed to activate the virtual environment

Hbuilderx developed by uni app connects to night God simulator

Worthington cytochrome c digestion study carboxypeptidase B scheme

Example analysis of recombinant monoclonal antibody prosci CD154 antibody

Target segmentation for 10000 frames of video, less than 1.4GB of video memory, open source code | ECCV 2022

How to use ES6 async and await (basic)

Promise basic use

Speed comparison between 64 bit width and 32 bit width of arm64 memory
随机推荐
Interview questions
[FAQ of waiting insurance] can the waiting insurance evaluation organization help with the waiting insurance rectification?
Open sharing of scientific data in the context of open science: the practice of the national Qinghai Tibet Plateau scientific data center
[basic usage of STL]
The difference between sigsuspend and sigwait
Alibaba cloud released the white paper "upgrade - standardization of data warehouse upgrade delivery"
DotNetCore. Cap notes
JS convert pseudo array to array
About the difference between for... In and for... Of and object. Keys()
The two supply chain centers of HEMA launched the "background" of innovative research and development of multi format commodities
[summer daily question] Luogu p1706 full ranking question
Data governance notes
Research and application of scientific data management strategy for high energy synchrotron radiation source
[linear DP] Digital triangle
How to obtain workers' coats and helmets in stray? How to obtain workers' helmets
Contemporary fairy quotations
Application status of typical marine environmental observation data products and Its Enlightenment to China
Multi species tissue slide prosci pancreatic tissue solution
Summary of the most complete MySQL data types in history (Part 2)
Fraud detection using CSP