Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Use Linux firewall camouflage defense hacked     - C ++ pointer two third memory model (Programming)

- Lazarus IDE Start Basics Tutorial (Linux)

- Firewall types and instructions (Linux)

- Linux character device - user mode and kernel mode data transfer data (Linux)

- Oracle 11g How dataguard master repository to Oracle single instance data recovery (Database)

- Using IntelliJ IDEA 13 integrated development environment to build Android (Linux)

- Docker Private Registry Installation Guide at CentOS6.X (Linux)

- Linux systems use IP masquerading anti-hacker (Linux)

- Initialization and starting process of Linux (Linux)

- File SUID, SGID, Sticky property (Linux)

- Spark local development environment to build (Server)

- Based on Python: OpenCV simple image manipulation (Programming)

- Linux modify environment variables method (Linux)

- SolrCloud-5.2.1 cluster deployment and testing (Server)

- Android memory optimization of the disk cache (Linux)

- CentOS7 virtual machine settings, and bridging problems (Linux)

- PyCharm new Python file name and the name of the module will import the same problem might arise (Programming)

- Oracle through the alarm log view and inspect the main library, physical and snapshot standby database (Database)

- Let you Fun Ubuntu desktop eleven weapon (Linux)

- Thinking in Java study notes - initialization and cleanup (Programming)

 
         
  Use Linux firewall camouflage defense hacked
     
  Add Date : 2018-11-21      
         
         
         
  Firewall can be divided into several different levels of security. In Linux, because there are many different firewall software available, security can be high or low and most complex software can provide the protection is almost impossible to penetrate. However, Linux kernel itself, built a simple mechanism called "camouflage", in addition to the most dedicated hacker attacks, can withstand most of the invasion.

When we dial-up connection Internet, our computer will be assigned an IP address, you can let other people online back pass data to our computer. Hackers is to use IP to access your data on your computer. Linux used "IP masquerading" method, is to hide your IP, not to others on the network to see. There are several groups IP addresses are reserved for special use of the local network, Internet backbone router does not recognize. As the author of the computer IP is 192.168.127.1, but if you enter this address into your browser, I believe that nothing can not receive, because Internet is the backbone of this group do not recognize 192.168.X.X the IP. There are countless other computer Internet, is using the same IP, because you can not access, of course, can not be penetrated or cracked.

So, to solve security problems on the Internet, it seems to be a simple matter, as long as the IP address of a selected others can not access your computer, anything resolved. wrong! Because when you browse the Internet, the server will also need the information back to you, otherwise you could not see anything on the screen, while the server only the data back to the legitimate IP address registered on the Internet backbone.

"IP masquerading" is used to resolve this dilemma of technology. When you have a computer to install Linux, set to use "IP masquerading", it will be internal and bridging two networks, and automatic interpretation from the inside out or from the outside in the IP address, usually the action is called network address Translation.

In fact the "IP masquerading" more complex than some of the above. Basically, "IP masquerading" server set up between the two networks. If you use analog dial-up modem to access information on the Internet, and this is one of the network; your internal network typically corresponds to an Ethernet card, this is the second network. If you are using a DSL modem or cable modem (Cable Modem), then the system will be the second Ethernet card, instead of the analog modem. And Linux can manage IP addresses for each of these networks, so if you have a computer to install Windows (IP is 192.168.1.25) located on the second network (Ethernet eth1), then, to access in the Internet (Ethernet eth0) cable modem (207.176.253.15) when, Linux's "IP masquerading" will block all TCP from your browser issued / IP packet, out of the original local Tenth (192.168.1.25), and then to true address (207.176.253.15) substituted. Then, when the server returns data to 207.176.253.15 time, Linux will automatically return to intercept packets and fill back to the local address (192.168.1.25) Positive Solutions.
     
         
         
         
  More:      
 
- C ++ based socket communication TCP and UDP (Programming)
- The method to mount the CD under Linux (Linux)
- ActionContext and ServletActionContext Summary (Programming)
- Linux Operating System Security Study (Linux)
- To share Linux script automatically change passwords (Linux)
- Linux operating system set up to effectively prevent ARP attacks (Linux)
- mysql_config_editor encryption and decryption of the new features of MySQL realization (Database)
- Timing Nginx logs cut and remove the log records of the specified number of days before (Server)
- Ubuntu 14.04 Install WordPress on Nginx (Server)
- HTTPS Encryption Algorithm (Linux)
- Mac OS X 10.9 compiler OCI8 module (Programming)
- Ubuntu 12.04 installation DHCP Server (Server)
- Java threads and thread pools (Programming)
- Sublime Text 3 shortcuts summary (Linux)
- CentOS / Debian configuration Gitlab 7.1x to build self Git repository (Linux)
- How to use Java to read OpenOffice document (Programming)
- Linux development environment to build and use the directory structure and file --Linux (Linux)
- Solaris 10 nagios monitoring system (Linux)
- Ubuntu download install and configure Plank Dock (Linux)
- How do you access Dropbox Linux command line (Linux)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.