Font Size: a A A

Hole Scanner On Embedded System

Posted on:2004-12-28Degree:MasterType:Thesis
Country:ChinaCandidate:W LiFull Text:PDF
GTID:2168360092475061Subject:Computer applications
Abstract/Summary:PDF Full Text Request
Recently, net attack things often occur . It makes people know the fearfulness that net holes bring and realize the importance of the things that keep away the hackers . In fact , net security risks are in every time . Hole scanning can find net hole in time and restore these net holes by which we may protect our net . But,actual hole scanning due to work on an unsafe base, net hole scanners aren't very safe. Secondly,the unconsistent of holes storeroom standard makes the unconsistent of the scanned results that makes users unconvenience. Thirdly,the hole scanners at present are in PC and they aren't easy to take.At last,the passsingnet hole scanners cann't scan through the different net segment.。This paper settles the insecurity and incommodity of net scanners in the PC. At the same time, we imploder an embedded operating system independently on the base of Linux, discuss the feasibility of embedded net hole scanner and mend shortages of hole scanner at present. This paper finds a good link point in embedded system and net security that are two big computer ways and combines embedded system and hole scanner perfectly。...
Keywords/Search Tags:Net hole, embedded system, embedded operating system, hole scan, Frangibility, embedded scan equipment, hardware converting
PDF Full Text Request
Related items