Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Linux firewall anti-hacker disguise malicious attacks     - 64-bit Ubuntu 15.10 How to compile the latest version of the 32 Wine 1.7.53 (Linux)

- To help you easily protect the Linux System (Linux)

- Ubuntu 14.10 / 14.04 / 12.04 virtual users to install the printing software Boomaga (Linux)

- Ubuntu and derivatives installation Atom 0.104.0 (Linux)

- linux firewall configuration (Linux)

- Echo Command Examples (Linux)

- Let MySQL 5.6 support Emoji expression (Database)

- Binary tree and some basic operations with binary list (Programming)

- TL-WR703N to install OpenWrt process notes (Linux)

- Linux command to view the system status (Linux)

- Hadoop 2.0 Detailed Configuration Tutorial (Server)

- Cacti monitoring service Nginx (Linux)

- How do you change the default browser and Email Client in Ubuntu (Linux)

- Getting case of Python Hello World (Programming)

- To install Scribus 1.4.4 under ubuntu (Linux)

- TeamCity continuous integration in the Linux installation (Linux)

- Mount NFS network file system (Linux)

- C ++ virtual functions Classic Insights (Programming)

- VMware 8 installation configuration Win7, CentOS-7 Wizard (Linux)

- VMware ghost Linux card error (Linux)

 
         
  Linux firewall anti-hacker disguise malicious attacks
     
  Add Date : 2018-11-21      
         
         
         
  Firewall can be divided into several different levels of security. In Linux, because there are many different firewall software available, security can be high or low and most complex software can provide the protection is almost impossible to penetrate. However, Linux kernel itself, built a simple mechanism called "camouflage", in addition to the most dedicated hacker attacks, can withstand most attacks.

When we dial a series on the Internet, our computer will be assigned an IP address, you can let other people online back pass data to our computer. Hackers is to use IP to access your data on your computer. Linux used "IP masquerading" method, is to hide your IP, not to others on the network to see. There are several groups IP addresses are reserved for special use of the local network, Internet backbone router does not recognize. As the author of the computer IP is 192.168.1.127, but if you enter this address into your browser, I believe that nothing can not receive, because Internet is the backbone of this group do not recognize 192.168.X.X the IP. There are countless other computer Intranet, also with the same IP, because you can not access, of course, can not be penetrated or cracked.

So, to solve security problems on the Internet, it seems to be a simple matter, as long as the IP address of a selected others can not access your computer, anything resolved. wrong! Because when you browse the Internet, the server will also need the information back to you, otherwise you could not see anything on the screen, while the server only the data back to the legitimate IP address registered on the Internet backbone.

"IP masquerading" is used to solve this dilemma of technology. When you have a computer to install Linux, set to use "IP masquerading", it will be internal and external bridging the two networks, and automatic interpretation from the inside out or from the outside in the IP address, usually the action called network address translation.

In fact the "IP masquerading" more complex than some of the above. Basically, "IP masquerading" server set up between the two networks. If you use analog dial-up modem to access information on the Internet, and this is one of the network; your internal network typically corresponds to an Ethernet card, this is the second network. If you are using a DSL modem or cable modem (CableModem), then the system will be the second Ethernet card, instead of the analog modem. And Linux can manage IP addresses for each of these networks, so if you have a computer to install windows (IP is 192.168.1.25), located on the second network (Etherneteth1), then, to access in the Internet (Etherneteth0) cable modem (207.176.253.15) when, Linux's "IP masquerading" will block all TCP from your browser issued / IP packet, out of the original local address (192.168.1.25), and then to real address ( 207.176.253.15) substituted. Then, when the server returns data to 207.176.253.15 time, Linux will automatically return to intercept packets and fill back to the correct local address (192.168.1.25).

Linux can manage several local computer (such as "IP masquerading" schematic Linux in the 192.168.1.25 and 192.168.1.34), and deal with each packet, and without confusion. The author has an old 486 computer installation SlackWareLinux can be simultaneously processed by a computer to a cable modem four packets, and the speed is not reduced.

In the second version of the core before, "IP masquerading" is sending IP management module (IPFWADM, IPfwadm) to manage. The second version of the core, while providing faster, more complex IPCHAINS, but still provides IPFWADMwrapper to maintain backward compatibility, therefore, the author of this article will be IPFWADM example, to explain how to set up "IP masquerading" ( You can use the IPCHAINS to http://metalab.unc.edu/mdw/HOWTO/IPCHAINS-HOWTO.html query method, the page and a "IP masquerading" more detailed explanation).

In addition, certain applications such as RealAudio and CU-SeeME used non-standard packets, you need a special module, you can also get information from the website.

That's it! Your system "IP masquerading" should now be able to work properly. Six months, 56K analog data card prices suddenly fell down a lot. However, most of the new data card is removed the control board is actually on the microprocessor, so the system will create additional load on the main CPU, while Linux does not support these "WinModem" card. Although the Linux kernel gurus, or have the ability to write drivers for the WinModem card, but they also understand that in order to save 10 yuan and dollar impact on system performance, is not wise.

Make sure you are using the Modem card, there is hopping can be used to set the COM1, COM2, COM3 and COM4, ​​this way, the data card is available in Linux work properly.

When the author at the time of writing this article, I spent time testing a variety of different data cards. Linux support plug and play device, so I bought a piece of non-hopping by the Amjet production data card, it also found another disturbing problem.

On the test PC is a old 486, using the 1994 version of AMIBIOS. After inserting this plug and play data card, the computer will not boot up, appears on the screen is the "main hard disk failure" (Primaryharddiskfailure). The inspection found that the original plug and play BIOS actually should be reserved for hard disk controller 15 interrupts, rations of the data card. Finally, the author abandoned the use of plug and play product on the old computer, because they do not deserve these things take time. So, please note before purchasing a data card, first look at whether to adjust the hopping COM1 to COM4.

In the author's bulletin board (http://trevormarshall.com/BYTE/) on, I saw several friends ask if you can use multiple dial-up lines to improve the Internet connection speed. The best example here is 128KISDN, it is also using two 56K channels to achieve the speed of 128K. When the ISP to provide such services, in fact, will configure two separate lines connected to the same IP.

You can see that, although there EQL such modules on Linux, that allows you to simultaneously use two data card on a computer, but unless the ISP dial-up connection on the two groups provide the same IP, otherwise the two data card only on send information to help it.

If you dial the general ISPPPP line, you'll get an IP address from the server can find you return packets in millions of computers; and every time you dial ISP, will get a different IP address.

Your browser sent packets, but also contains the local IP address of the server for data backhaul. EQL can be those rumored packet, distributed to a different ISP lines, but when the return data, but only received by one IP address, which is the address that the browser is being used. If using ISDN, then the ISP will address this issue; Some ISP will provide the corresponding IP address for dial-up access multiple sets of lines, but the price is very expensive.

In the pursuit of speed, do not neglect the efficiency of Linux firewall. On the office has six users through "IP masquerading" firewall, to access a 56K analog modem, work very well, it was only when downloading large files will slow down the speed. Before you decide to install a number of ISP dial-up lines, you can set up an "IP masquerading" server to try. windows of dealing with multiple IP is not very efficient manner, while the Windows network and modem spaced, enhance efficiency will allow you surprised.

In short, Linux used "IP masquerading" method, is to others on the hide your IP, not to see the network.
     
         
         
         
  More:      
 
- Ubuntu users to install voice switch instructs the applet (Linux)
- Linux System Getting Started Learning: Linux command in w (Linux)
- ORA-14400: inserted partition key does not map to any partition (Database)
- 12 kinds of detection of CPU information on a Linux system tools (Linux)
- Linux firewall rules example Extracts (Linux)
- Ubuntu installed racing game Speed Dreams 2.1 (Linux)
- Installation and use GAMIT / GLOBK Software (Linux)
- FFmpeg compiled with only H264 decoding library (Programming)
- QEMU code analysis: BIOS loading process (Linux)
- systemd Power Management (Linux)
- DupeGuru- find and remove duplicate files (Linux)
- Debian 8.1 (amd64) deployed Memcached (Server)
- SQLite3 simple operation (Database)
- Redis configuration file interpretation (Database)
- The difference between Linux su and sudo commands (Linux)
- MySQL Tutorial: Building MySQL Cluster under Linux (Database)
- Git remote repository Explanation (Linux)
- Linux Security Setup Guide (Linux)
- Let Linux boot methods to enter characters interface and set FrameBuffer resolution methods (Linux)
- Security: Unix operating system intrusion tracking Strikes Back (Linux)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.