Font Size: a A A

The Network Security Tests Of Platform System-port Scan Agent Of Study And Realizing

Posted on:2005-08-17Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2178360182472575Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of modern computer technology, globalization and the sphere of application of computer geometry-increase .Applied to as follow areas of science,education, culture and other areas which concerning our daily life. Yet the latest version system leaks emerge in Endlessly, with the more complication of computer and the more enlarged size of Internet. What if the system administer failed to update the latest system leaks or as a experience-shorter or just cursoriness. Maybe system breakdown or collapse.When it comes to computer virus or hacker wants to invade to your system or host computer, no matter what means their tack, it is obvious that they have to scan the system leaks at first. The opened port of computer looks like a gate in which it is easy to get into the internal. So, as far as system security are concerned, no matter in Internet or Intranet, you should adopt a initiative strategy which promptly timely accurately to detected the state of port in your host computer or firewall. This is computer port-scanning technology which one of important tools of initiative defense technology mentioned above.This essay mainly focus on the computer port-scanning technology and employs the TCP SYN Scanning technology and the ICMP Scanning technology in network security-detection system that in a speediness, in time, precise and safety way. It is called Simulate Hacker Multithread Invade-detection Scanner technology(SHMIS).They can detect the state of computer port of host computer at goal network promptly > timely accurately -. safety. Or have a port-detected function of network security software, and take as data support tool of viewing system security which network system administer or network security software developer have.
Keywords/Search Tags:thread, socket, port, bind, mutex
PDF Full Text Request
Related items