资源列表
Practical-Network-Technologies
- 讲述了三层交换机 路由器的配置,以及网络通信过程中的各种协议-Practical Network Technologies Configuration Guide
httptunnel-3.3
- 基于防火墙的基本原理,通过分析防火墙穿透的主要技术,利用防火墙的可信关系,实现了反 向连接加HTTP隧道和共享DNS套接字句柄来穿透防火墙-Based on the basic firewall principle, firstly, themain firewall penetrating techniqueswas ana- lysed.Then using inverse connection andHTTP-tunnel to pass through firewallswas prop
Linuxfierwall-source-file
- 对Linux内核防火墙的设计给出了比较明确的分析解释。-The design of the firewall to Linux kernel are more specific analysis explanation
WebCastellum_GettingStarted
- 一个web防火墙入门手册 WebCastellum -WebCastellum getingstarted
network_firewall
- a simple network firewa-a simple network firewall
iptables-1.1.9
- IPtables使用指南,iptables是linux系统的防火墙-How to use iptables
The-firewall-penetrating-technique
- 基于防火墙的基本原理,通过分析防火墙穿透的主要技术,利用防火墙的可信关系,实现了反 向连接加HTTP隧道和共享DNS套接字句柄来穿透防火墙 -Based on the basic firewall principle, firstly, themain firewall penetrating techniqueswas ana- lysed.Then using inverse connection andHTTP-tunnel to pass through firewallsw
RESEARCH-ON-HTTP-TUNNEL
- 在总结分析应用层的几种防火墙穿透技术基础上,提出了反向 连接结合 HTTP 隧道的防火墙穿透通信方法,设计并实现了 HTTP 隧道 防火墙穿透通信模块。 -after reviewing and analyzing several technologies of application-layer firewall penetration, this paper presents the firewall penetrating technology based on HTT
src
- Source Code for Intrusion Detection System
uml
- Unified Modelling Diagram of Intrusion Detection System
dfd
- Data Flow Diagram of Intrusion Detection System
Module-description
- Module descr iption of IDS
