当前位置:网站首页>Guide to the construction of network security testing laboratory - Chapter 1, section 1.5 key terms
Guide to the construction of network security testing laboratory - Chapter 1, section 1.5 key terms
2022-07-25 01:43:00 【Full stack programmer webmaster】
Hello everyone , I meet you again , I'm the king of the whole stack .
This excerpt is from the asynchronous community 《 Network security test Laboratory construction guide 》 No 1 Chapter 1.5 Section key terms , author 【 beautiful 】Michael Gregg( Michael Greg )
1.5 Key terms chmod—— Used to change file permissions Linux Operating system commands . etc/shadow file ——Linux The possible storage location of password files in the system , Only root User access . A firewall —— A software or hardware security system used to manage and control network connectivity and network services . Firewall is the throat of traffic entering and leaving the network , It can also block unrestricted access . Firewalls can be connected firewalls or connectionless firewalls . A hub —— It is a device that can connect computers and other devices in Ethernet LAN ( For example, network attached memory ) Devices connected by network cables . ISO Image file —— Can be stored as a separate file CD or DVD Image file of CD , At the same time, it can represent the complete structure of the CD . Unlocking Technology —— Technology that does not rely on keys to unlock . Enforce access control —— Is a way to control access . Access rights are determined by the sensitivity of the information contained by the interviewee ( Use labels to indicate ) And the authorization assigned to visitors to access this information ( Such as the “ clear ” Authorization of ) To decide . MD5sum command ——MD5 It is a method of generating 128 Bit information digest to check the data integrity of the encryption algorithm ,MD5sum yes Linux System execution MD5 Command of Algorithm . Network Attached Storage —— It is a storage device for files and data , And support LAN direct access . Phone theft —— Used to express telecommunication network or telecommunication 、 Illegal operation caused by voice network cracking . Router —— The device determines the next network node that a packet will pass through in the process of forwarding to the final destination . The router creates and maintains a routing table , And use the information in the table to determine the best path of each packet . The routing process takes place in OSI The third layer of the seven layer network model ( The network layer ). Salt value —— Add a layer of randomness to the stored password by changing the password hash value . Switch —— A device used to separate LANs and provide packet filtering . A LAN switch has multiple ports , Each port can support an entire Ethernet or token ring LAN . virtualization —— Virtualization technology is a software implementation method for hardware . It allows users to run multiple operating systems on the same physical host without affecting each other . WiFi The detector —— A device used to detect wireless signals . Wireless access point —— Devices used to bridge wired and Wireless Networks . Wireless access points act as central nodes for wireless device users connected to wired networks .
Publisher : Full stack programmer stack length , Reprint please indicate the source :https://javaforall.cn/108543.html Link to the original text :https://javaforall.cn
边栏推荐
- Common functional interfaces_ Predicate interface_ Default method and and predicate interface exercise_ Set interface filtering
- record
- Origin and development of philosophy Hegel external historical form
- [daily question in summer] Luogu p6850 Noi
- Sort out some scattered knowledge points by yourself
- Beijing Zhun electric clock, Beidou clock server, GPS network time server, NTP satellite timing system
- Specificity and five applications of Worthington alcohol dehydrogenase
- Document the use of anti shake in packaged components and projects
- Freedom and self action Hegel
- Harbor installation
猜你喜欢

Musk responded whether he would upload his brain to the cloud: already did it!

Top priority of dry goods: common indicators and terms in data analysis!

Custom type
![[C + + primer notes] Chapter 8 IO Library](/img/84/53cca8bb00b392c74b5dfe039da711.png)
[C + + primer notes] Chapter 8 IO Library

Open source demo | release of open source example of arcall applet

Summary of the most complete MySQL data types in history (Part 2)

Using multithreaded execution method in Lua script based on nlua implementation

Leetcode - number of palindromes

Cloud native platform, let edge applications play out!

What do growth enterprises need most to build a data-driven organization?
随机推荐
Performance analysis method - Notes on top of performance
Sort out some scattered knowledge points by yourself
Prosci 14-3-3 (phosphate ser58) antibody instructions
【Power Shell】Invoke-Expression ,Invoke-Expression -Command $activateCommand; Error or power shell failed to activate the virtual environment
Interview questions
[programmer interview classic] 01.09 string rotation
[basic usage of STL]
[linear DP] Digital triangle
Mobile Robotics (3) Kalman filter
Upgrade the leapfrog products again, and the 2023 Geely Xingrui will be sold from 113700 yuan
After burning up 130 billion yuan in ten years, vertical e-commerce will eventually enter the dust of history
Chip sold at sand price: Lei Jun's dream was "ruined" by this company
Data governance notes
Worthington cytochrome c digestion study carboxypeptidase B scheme
What are the important trends revealed by the release of "operator data viability index"?
10 commonly used data visualization tool software
Hcip - BGP - border gateway protocol
C traps and defects Chapter 2 lexical "traps" 2.4 switch statements
Kubernetes creates a user with dashboard read-only permission (with exec permission)
JVM Foundation