Your are here:hacking technology > network management > Article list

Net will teach you how to prevent rogue systemHits:2
For company, one of the biggest threat is sensitive data - such as leakage of the client or employees ZhiFuKa or personal identity information, etc. These data are sometimes internal employees have stolen. This kind of circumstance, system...2010-10-09
As malware k?can the security tagHits:2
Norman Data Defense and Security Labs New Data from G M?, Opportunities such as impairing the malware security?mighty k?clouds can reveal. 1 AAA centralized abuse trust and authentication, authorization and accounting (AAA) is a term for a...2010-10-08
Experts impart security net silver-colored safety countermeasuresHits:2
Currently, the net to traditional business already 30% of the counter operations, according to the China banking association, by late 2008, online banking financial institutions to individual customers 14814.63 million,...2010-09-30
Wireless router set skillsHits:3
For some of the wireless network function, notebook always makes us lightly. Now is to introduce wireless router security Settings of specific content. One of the most important function of notebook that can support Wi Fi wireless Internet...2010-09-29
XP PC can shutdown handlingHits:4
Many friends of computer users are recognizing should be met xp PC can shutdown, is a great thing! 1 and when the Windows of the sound files from damage cannot shutdown First you can determine exit Windows sound files are already destroyed...2010-09-28
Batch open 3389 port programming shareHits:21
echo Windows Registry Editor Version 5.00 3389.reg echo. 3389.reg echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\netcache] 3389.reg echo Enabled = 0 3389.reg echo [HKEY_LOCAL...2010-09-27
Local restricted even not onlineHits:4
Local even accept restricted or no connection ADSL virtual dial-up PPPoE, it is based on your machine and ADSL between the board established a virtual circuit for dialing, therefore the local even accept restricted or no connection...2010-09-26
From the Angle of server security protection hackersHits:1
Prevent database was illegal downloads Furthermore, a bit of network security administrator, will download from the web site of the default data path program. Of course there is part of the administrator very careless, get program directly...2010-09-25
How to network interfaces specified indexHits:8
Sometimes in order to add routing routing network interfaces specified index, for example ADD 157.0.0.0 MASK are 255.0.0.0 157.55.80.1 METRIC 3 IF 2 IF the number of network is used to specify the interface. If the machine is more CARDS,...2010-09-21
Switch port encountered frequently threatened and their prevention measuresHits:3
A common security threats In the enterprise, the threat of switch port, summarize the behavior is more a few kinds of cases. A host is unauthorized users connect to the Internet at enterprises. If employees from their home for a computer...2010-09-20
How to protect the good domain name server Linux under the safeHits:2
(1) limit name servers recursive query functions Close recursive inquires into name servers can make it more passive mode, send to external DNS query request, will only answer oneself of authorization requests, without any external...2010-09-18
How will this in LAN stealthHits:5
On a LAN, we all like to neighbors flip online, because people often put the big game sharing and wonderful. But neighbors has a bad online: even if you don't share your computer will appear in the Internet , from neighbors privacy and...2010-09-17
Network examination and repair the damaged teach system filesHits:4
1 repair damaged system files We usually computer operation process may be because of a mistake and lost some important documents of the system, system is therefore become very unstable, always wrong, if it is to install system, it...2010-09-16
How to guarantee the safety of Internet user modeHits:4
In computer configuration is not high, not to install the machine anti-virus software must efficiency is much higher. I more than two years without antivirus software is no virus causes of body dye. Plainly in the user's identity is online...2010-09-15
Ensure the security of wirelessHits:1
You should grasp wireless safety of six specialty skills is the content of the course, Linksys and TP - LINK, d-link, manufacturers, SMC NETGEAR, all have many a/b/g 802.11 wireless products, even the standard appeared and compatibility of...2010-09-13

Home  <<Prev  4   5   6   7   8   9   10   11   12   13   14  Next>>  Last

Current Page:9 , Total 29 Pages, Every Page 15 Records, Total Records: 432

Hot Articles
Recommend Articles
New Articles
Sub category