登录
首页 » WINDOWS » 防火墙PDF2

防火墙PDF2

于 2004-12-22 发布 文件大小:5139KB
0 179
下载积分: 1 下载次数: 67

代码说明:

  防火墙技术文档PDF2.rar(firewall technical documentation PDF2.rar)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • NetGuard
    网络防火墙NetGuard源码.基于费尔的Ndis Hook技术,里面有代码说明.(NetGuard source network firewall. Ndis Hook of Fairbanks-based technology, there are codes.)
    2009-04-28 21:07:31下载
    积分:1
  • 67634
    pysl-iPhone电话短信防火墙,精选ios编程学习源码,很好的参考资料。(Pysl-iPhone phone SMS firewall, selection of learning IOS programming source code, a good reference.)
    2013-12-11 10:47:45下载
    积分:1
  • DrvFltIp
    一个驱动级的防火墙源程序,基于ndis hook,可以设定外部设定过滤规则,(A drive source firewall level, based on ndis hook, set the filter can be set to external rules,)
    2021-01-18 15:48:43下载
    积分:1
  • 151
    真彩防火墙按钮源码,例程程序结合易语言模块彗星真彩控件模块.ec,实现真彩防火墙按钮效果。(TFT firewall button source , routine program combined with easy language module comet true color control module .ec, true-color firewall button effects .)
    2016-11-09 12:57:14下载
    积分:1
  • xfilter20
    防火墙源码,基于windows api开发的firewall(firewall source code)
    2009-05-02 14:47:48下载
    积分:1
  • 151
    真彩防火墙按钮源码,例程程序结合易语言模块彗星真彩控件模块.ec,实现真彩防火墙按钮效果。(TFT firewall button source , routine program combined with easy language module comet true color control module .ec, true-color firewall button effects .)
    2016-08-23 02:24:41下载
    积分:1
  • 24746
    Windows防火墙对象应用源码,程序创建易语言对象实现Windows防火墙的操作。(Windows Firewall target application source code , the program creates easy language object that implements the Windows Firewall operation.)
    2015-09-09 17:08:16下载
    积分:1
  • mininet_SDN
    使用mininet模拟SDN防火墙,包含源代码,实验报告(Use mininet simulation SDN firewall, including source code, test reports)
    2020-08-26 23:38:14下载
    积分:1
  • PrinciplesofInformationSystemsSecurity
    应用的角度介绍计算机信息系统安全原理,并将有关内容按照如下体系梳理:第1篇攻防技术:内容包括恶意程序、网络攻击(黑客)、隔离技术(防火墙、物理隔离和电磁防护)、安全监控(IDS、网络诱骗和审计)、紧急响应和取证;第2篇安全信任体系:内容包括加密与信息隐藏、认证、安全协议;第3篇安全体系结构和评估标准。 (Perspective on the application of computer information system security principles, and the contents sorted according to the following system: the first an offensive and defensive techniques: including malicious programs, network attacks (hackers), isolation technology (firewalls, physical isolation and electromagnetic protection), security monitoring (IDS, network trap and audit), emergency response and forensics No. 2 security trust system: the content includes encryption and information hiding, authentication, security protocols the first three security architecture and evaluation criteria.)
    2009-12-21 12:42:49下载
    积分:1
  • TcpMultiTransfer
    TCP端口映射工具,有几种工作模式,可以简单的映射端口,可以通过几种模式配合实现端口反弹(在防火墙只允许单向访问的时候将内网的服务映射到外网)可以实现在只允许访问一个端口的情况下访问任意端口等。可以对TCP数据加密,防止在网络上被人监听。可以多种模式串联起来实现复杂网络环境下的网络访问(TCP port mapping tool, there are several operating modes, can simply map the port, with the port rebound (in the firewall to allow only one-way access when mapped within network services to the external network) through several modes can be achieved in only access to any port, such as in the case to allow access to a port. TCP data encryption, to prevent be listening on the network. Series can be a variety of modes of the complex network environment, the network access)
    2013-01-04 22:14:46下载
    积分:1
  • 696518资源总数
  • 104292会员总数
  • 28今日下载