The development of detection to catch intruders in the network. Design work of the IP table firewall can be customized by installing the operating system Snort Snort serves as the primary network operating system. Install IP table to act as a firewall. In developing the site to make contact with the firewall. Technology has brought development, security and firewalls, IP Contact Table. In order to establish rules of the network can be configured via the site and control the use of IP addresses, ports, websites and files. Correctly according to the rules that have defined
the IP table firewall will work in command on the command line only. It allows the administrator difficult to use. Has developed a network security technologies. Which can help protect networks from theft of confidential business information to be misused. And prevent malicious attacks from viruses (Virus), worm (Worm) and the Internet without security. The risk of being compromised is not allowed. This form of the security system, there are many forms of acting against dangers from the outside to enter the network can serve to pass on any changes to the package. Any visitors But customizing a VIP table. Appropriate to use
the results of the experiment. Developing a system to detect intruders on the network. Can control the use of IP addresses, port site files correctly according to the rules defined.
การแปล กรุณารอสักครู่..
