º¸¾È ¿î¿µ °ü¸® 
SSH and Intrusion Detection
Á¶ÇöÁ¤

SSH ÇÁ·ÎÅäÄÝÀÇ »ç¿ëÀº »ç¿ëÀÚ°¡ À̸§°ú ¾ÏÈ£¸¦ Àü¼ÛÇÒ ¶§ ¾Ïȣȭ¸¦ ÅëÇÏ´Â ¹æ¹ýÀ¸·Î ¿ø°Ý ÄÄÇ»ÅÍ Á¢±ÙÀÇ À§ÇèÀ» ÁÙ¿´À¸³ª, ÆäÀ̷εå¿Í Åͳαâ´ÉÀ¸·Î...

´Ù¿î·Îµå : 90 / Á¶È¸¼ö : 5738 / Ãßõ :
An Overview of Remote Operating System Fingerprinting
À̹ÎÈ£

¿î¿µÃ¼Á¦ ½Äº° OS fingerprinting the science of determining the operating system of a...

´Ù¿î·Îµå : 86 / Á¶È¸¼ö : 6762 / Ãßõ :
Extranet Access Management(EAM)
Á¶¿µÁÖ

EAM °³¿ä ÅëÇÕÀÎÁõ, ±ÇÇѰü¸® ¼Ö·ç¼Ç EAM ÀÎÅͳÝ, ÀÎÆ®¶ó³Ý, C/S ȯ°æ¿¡¼­ È¿°úÀûÀÎ ÅëÇÕÀÎÁõ(SSO) ȯ°æ°ú À̸¦ ±â¹ÝÀ¸·Î ÅëÇÕµÈ ±ÇÇѰü...

´Ù¿î·Îµå : 144 / Á¶È¸¼ö : 9639 / Ãßõ :
¿ú(worm)ÀÇ ¹ø½Ä°ú ´ëÀÀÃ¥
ÃÖÈ¿½Ä

¾Ç¼º ÄÚµå °³¿ä Á¦ÀÛÀÚ°¡ ÀǵµÀûÀ¸·Î »ç¿ëÀÚ¿¡°Ô ÇÇÇØ¸¦ ÁÖ°íÀÚ ¸¸µç ÇÁ·Î±×·¥, ¸ÅÅ©·Î, ½ºÅ©¸³Æ® µî ½ÇÇà °¡´ÉÇÑ ÇüÅÂ

´Ù¿î·Îµå : 98 / Á¶È¸¼ö : 5134 / Ãßõ :
½Ã½ºÅÛ º¸¾È °úÁ¦
¹ÚÂù¿ë

¹öÆÛ ¿À¹öÇ÷οì(Buffer Overflow)´Â ¶§¶§·Î ÇØÄ¿°¡ ½Ã½ºÅÛÀÇ Á¦¾î±ÇÀ» °¡Áú¼ö ÀÖ´Â º¸¾ÈÀÇ Ãë¾àÁ¡ÀÌ µÉ¼ö ÀÖ´Ù. National Ins...

´Ù¿î·Îµå : 114 / Á¶È¸¼ö : 5953 / Ãßõ :
Defeating Overflow Attacks
¹ÚÂù¿ë

¹öÆÛ ¿À¹öÇ÷οì(Buffer Overflow) ¹öÆÛ°¡ °¡Áö°í ÀÖ´Â ¹öÆÛ ¿µ¿ª¹Û¿¡ µ¥ÀÌÅͰ¡ ¾²¿©Áö°Ô µÉ¶§ ¹ß»ý ¹öÆÛ ¿µ¿ª ¹ÛÀÇ µ¥ÀÌÅͰ¡ ½Ã½ºÅÛÀÇ ...

´Ù¿î·Îµå : 86 / Á¶È¸¼ö : 5930 / Ãßõ :
Building a More Secure Network
George Rosamond

¾ÈÀüÇÏ°Ô °í¾ÈµÈ ³×Æ®¿öÅ© topography´Â °ø±ÞÀÚ¿Í °í°´ °ü¸®ÀÚ »çÀÌÀÇ °øÅëÀûÀÎ ÁÖÁ¦ÀÌ´Ù. ±×·¯³ª ¾ÈÀüÇÑ ³×Æ®¿öÅ© µðÀÚÀÎÀº ¸Å¿ì ºñ½Ñ Çϵå¿þ...

´Ù¿î·Îµå : 80 / Á¶È¸¼ö : 5847 / Ãßõ :
SMB ±â¾÷ º¸¾È °¡À̵å
Á¤ Á¾ ¸í

ÀÎÅͳݰú ÃÖ±ÙÀÇ ¼¼°èÀû À̺¥Æ®·Î ÀÎÇØ ±â¾÷ÀÌ º¸¾È¿¡ Á¢±ÙÇÏ´Â ¹æ½ÄÀÌ ±Ùº»ÀûÀ¸·Î ¹Ù²î¾ú½À´Ï´Ù. ºÒ°ú 10³â Àü¸¸ ÇØµµ ³×Æ®¿öÅ© º¸È£´Â ¾î¶»°Ô ÇØ¼­...

´Ù¿î·Îµå : 112 / Á¶È¸¼ö : 6087 / Ãßõ :
A guide for Small & Mid-sized Business
Á¤Á¾¸í

º¸¾ÈÀÇ °³¿ä SMBÀÇ 30%ÀÌ»óÀÌ ¼¼»óÀÌ °³º®ÇÏÁö ¾Ê´Â ÇÑ °ø°Ý¹ÞÁö ¾ÊÀ» °ÍÀ¸·Î »ý°¢ ÇÏ´Â ÀÌÀ¯ Too small to be targeted ...

´Ù¿î·Îµå : 74 / Á¶È¸¼ö : 6277 / Ãßõ :
ÀÎÅÍ³Ý °ø°ÝÀÇ ´ëÀÀ¹æ¹ý
½Å¿µÂù

ÀûÀÇ ¸ðµç °ÍÀ» È®ÀÎÇØ º¸ÀÚ! ¡°Military action is important to the nation ? it is the ground ...

´Ù¿î·Îµå : 104 / Á¶È¸¼ö : 6016 / Ãßõ :
  31 | 32 | 33