|
Explains in detail virtual machine's installment | Hits:10 |
Recently looked at many courses, many above used the virtual machine, therefore I also wanted to install a virtual machine. What is the virtual machine? The virtual machine is an abstract computer, is the same with the actual computer, has... | 2008-07-14 |
Let the network transmission the speed dash | Hits:6 |
The network transmission speed is always the hot topic which everybody pays attention, the same equipment actually presents the poles apart in the different place of use the effect, is this also because of what? Actually this... | 2008-07-14 |
About the network connections the solution which limits | Hits:7 |
Meets the network connections frequently limits the question, on-line looks for the solution, how always not to be effective, oneself try to find out is doing, but also has solved some: ) 1st, obtains IP. Start--Movement--Inputs cmd-... | 2008-07-12 |
Chats in local area network's limit and the breakthrough | Hits:10 |
Present's enterprises used the computer regarding the staff to carry on the strict limit, for instance could not glance over the homepage, could not play certain games, could not on MSN, limit port and so on. Some limits have the... | 2008-07-12 |
The share network management should grasp skilled CMD order | Hits:136 |
net use h: [url= file://ip/c] ipc[/url] password /user: after user direct debarkation, maps opposite party C: To this locality is H: net use h: [after url= file://ip/c] ipc[/url] debarkation, maps opposite party C: To this locality ... | 2008-07-11 |
Teaches you to close the network port protection network security | Hits:7 |
Each service corresponds the corresponding port, for instance the audiences like known by everybody the WWW service's port is 80, smtp is 25, ftp is in the 21, win2000 installment tacitly approves is these service opening. It... | 2008-07-11 |
Prevents the hacker to invade the WEB server three inchworms | Hits:7 |
The WEB server common situation occurrence, following gives three kind of most common situations the solutions Against ACCESS database downloading Increased MDB the expansion mapping to be possible. Method: The IIS attribute, the... | 2008-07-10 |
Why can't hundreds of thousands of equipment block the hacker attack | Hits:10 |
The security is a three-dimensional concept, is not an equipment support's plane Withstands the hacker attack is not only the bank, more enterprises and the unit come under various hacker attack similarly, perhaps by now you will think why... | 2008-07-10 |
SQL pours into the new threat: Will challenge the operating system security | Hits:14 |
Recent SQL pours into the attack to demonstrate that uses the multistage attacks which SQL pours into to be possible to provide to operating system's interactive GUI (graphical user interface) visits. A Europe's researcher discovered... | 2008-07-09 |
Graphic solution IE8 many security features are not hung horse influence (figure) | Hits:9 |
In August, Microsoft announcement next generation browser Internet Explorer 8 Beta 2 editions, the new edition will have brought many security features, This morning we once introduced not hangs the horse influence the characteristic... | 2008-07-09 |
Safeguard system clean neat unloading stubborn procedure small skill | Hits:8 |
Along with the network popularization, on-line software are also getting more and more, has brought enormous convenient for everybody, but has some softwares by the IE plug-in unit's form compulsion installment, is unable to unload, is... | 2008-07-08 |
The expert analyzes ten big wireless network security suggestion | Hits:8 |
Since near section time, the wireless network security has become a hot topic of discussion, how some about to protect the wireless network security at many forums the suggestion, but many these suggestion fish item of promiscuous,... | 2008-07-08 |
|