Tuesday, October 26, 2010

Intrusion Detection Terminology Keys




With the IDS (Intrusion Detection System) is speeding the development of the terminology associated with the rapid evolution of the same. This technology to share with you some IDS terminology, some of which are very basic and relatively common, while others are some uncommon. As the rapid development and a number of IDS IDS manufacturer's market power, different manufacturers may use the same terminology that different meanings, leading to the precise meaning of certain terms out of whack. Therefore, the paper will try to include all the terms are entered.

Alerts (alert)

When an intrusion is occurring, or attempts occurred, IDS alert information system will issue a notification system administrator. If the console with the IDS system with one machine, alert information will be displayed on the monitor may also be accompanied by voice prompts. If the remote console, then the alert will be built into the system through the IDS method (usually encrypted), SNMP (Simple Network Management Protocol, is usually not encrypted), email, SMS (short message) or more of several methods of mixed mode delivery to the administrator.

Anomaly (anomaly)

When there is an event with a signal to match known attacks, most IDS will alarm. One based on anomaly (anomaly) of the IDS activity will then construct a rough outline of the host or network, when there is a profile in this time of the incident outside, IDS will alarm, such as it was done he had not done before the When, for example, a user suddenly get the administrator or root directory permissions. Some IDS vendors as heuristic function this way, but a heuristic IDS should judge their reasoning has more intelligence.

Appliance (IDS hardware)

In addition to those existing systems to be installed up the IDS software, the shelves in the market can also buy a number of existing IDS hardware, just that they can access the network application. Some of the available IDS hardware including CaptIO, Cisco Secure IDS, OpenSnort, Dragon and SecureNetPro.

ArachNIDS

ArachNIDS developed by Max Visi an attack signature database, it is updated dynamically, for a variety of network-based intrusion detection system, and its URL address http://www.whitehats.com/ids/.

ARIS: Attack Registry & Intelligence Service (Registration and intelligence service attacks)

SecurityFocus ARIS is provided an additional service that allows users to anonymously connect to the Internet network to the SecurityFocus submitted to the network security incidents, then the data will SecurityFocus and many other participants in the data, which eventually form a detailed network safety statistical analysis and trend forecasting, publishing on the web. It's URL address http://aris.securityfocus.com/.

Attacks (Attack)

Attacks can be understood as an attempt to infiltrate the system or bypass the system security policy, to obtain the information, modify information, and destroy the target network or system functional behavior. The following lists the IDS can detect the most common types of Internet attacks:

鈼?attack type 1-DOS (Denial Of Service attack, denial of service attacks): DOS attack is not a means to destroy a system by hackers, security, it is only paralyze the system, the system refused to provide services to its users. The categories include buffer overflows, by flood (flooding) run out of system resources and so on.

鈼?attack type 2-DDOS (Distributed Denial of Service, Distributed Denial of Service attack): a standard DOS attacks use a lot of data from a host to attack a remote host, but can not send enough packets to achieve the desired The results, thus gave rise to DDOS, or distributed from the host over a target to attack, run out of the remote system's resources, or failure to connect.

鈼?attack type 3-Smurf: This is an old-style attack, but also occur when an attacker use the target's camouflage the source address of broadcast address to the implementation of a smurf amplifier ping operation, then all activities will be to target the host response to interrupt the network connection. Here are 10 smurf amplifier reference URLhttp: / / www.powertech.no/smurf/.

鈼?attack type 4-Trojans (Trojan): Trojan attacks on the term comes from the ancient Greeks used the Trojan Trojans, Trojans, in the possession of the Greek soldiers, when the Trojans arrived in the city, the soldiers on the Trojans to the city and its emission Residents attack. In computer terminology, it refers to those who had the form of legal process, in fact, those who harbor malicious software software. Thus, when the user runs the legal program, in unknowingly, malicious software was installed. However, because the majority of this form of malicious programs are installed remote control tool, Trojan quickly evolved into the term refers specifically to such tools, such as BackOrifice, SubSeven, NetBus, etc..

Automated Response (automated response)

In addition to sound the alarm on the attack, some IDS can automatically defend against these attacks. There are many ways to resist: First of all, you can re-configure the router and firewall, reject that information flow from the same address; secondly, by sending reset packets off the network connection. But it both ways have problems, an attacker can in turn use to re-configure the device, the method is: by posing as a friendly address to attack and then IDS will configure routers and firewalls to reject these addresses, so was actually "own people" refuse service. Send a reset packet method requires an active network interface, so it will be placed under attack, a remedy is: to make activities within the network interface in the firewall, or use special contracting procedures to avoid the standard IP stack needs .
CERT (Computer Emergency Response Team, Computer Emergency Response Team)

The term is reflected by the first computer emergency response team selection, the team at Carnegie Mellon University to establish their computer security incident response, take action. Many organizations now have a CERT, for example CNCERT / CC (Computer Network Emergency Coordinator in China center). Because some lack of clarity in the word emergency, many organizations use the term Incident to replace it, creating new words Computer Incident Response Team (CIRT), the computer incident response team. response handling the word is sometimes used instead, which means that emergency response action, rather than long-term research.

CIDF (Common Intrusion Detection Framework; common intrusion detection framework)

CIDF trying to standardize some extent, the intrusion detection, developed a number of protocols and application program interface, so that between the intrusion detection research projects can share information and resources, and intrusion detection components can also be reused in other systems. CIDF the URL address is http://www.isi.edu/gost/cidf/.

CIRT (Computer Incident Response Team, Computer Incident Response Team)

CIRT is evolved from the CERT, CIRT represents a security incident in the philosophy of understanding change. CERT was originally a computer specifically for a particular emergency situation, but in terms CIRT incident indicates that not all incidents are necessarily emergencies, and all emergencies can be seen as incidents.

CISL (Common Intrusion Specification Language, Common Intrusion Specification Language)

CISL is CIDF between the components communicate with each other's language. As the agreement is CIDF and interface standardization attempts, so that intrusion detection CISL research attempts to standardize the language.
CVE (Common Vulnerabilities and Exposures, Common Vulnerabilities and Exposures)

On the vulnerability of an old problem is in the design of scanner or coping strategies, different manufacturers on the vulnerability of the title will be completely different. There are some loopholes in the definition of a Chamber of Commerce produced a variety of features and applications to their IDS systems, thus giving a false impression, as if their products more effective. MITRE created CVE, will be standardized vulnerability names, participating manufacturers also logical development of IDS products in accordance with this standard. CVE's URL address is http://cve.mitre.org/.

Crafting Packets (custom data packets)

Create custom packets, you can avoid the usual requirement of some data packet structure, thereby creating a data packet to deceive, or makes the computer receiving it I do not know how to handle it. Create a custom packet program available Nemesis, its URL address is http://jeff.chi.wwti.com/nemesis/.

Desynchronization (synchronization failure)

desynchronization The term originally refers to the sequence number of ways to evade IDS. Some IDS might expect it would have confused the serial number, which will lead to re-construct the data. This technology is very popular in 1998, is now obsolete, and some articles to desynchronization this term to mean other IDS evasion method.

Eleet

When hackers write vulnerability development process, they often leave a signature, one of the most notorious one is the elite. If eleet into digital, it is 31,337, and when it refers to their ability, elite = eleet, said the elite. 31337 is often used as a port number or serial number. Popular word "skillz".

Enumeration (list)

After passive research and social engineering work, the attacker will begin to list on network resources. List is the active exploration of a network attacker to found what is and what can be made use of. As the present action is no longer a passive, it is likely to be detected. Of course, in order to avoid being detected, they will quietly as possible.

Evasion (dodge)

Evasion is to launch an attack without being detected by IDS successfully. The trick is to let them see only one aspect of the IDS, but the actual attack is another target, the so-called out at large, stealing a march. Evasion of a form is set up for different packets different TTL (effective time) value, so the information through the IDS looks like a harmless, innocuous information bits in the TTL to reach the target host the Bi TTL needs to be short. Once through the IDS and close, friendly part will be lost, leaving only harmful.

Exploits (exploits)

For each vulnerability, have exploited this vulnerability to attack mechanism. In order to attack the system, the attacker exploits the preparation of a code or textbook.

Will exist for each vulnerability exploit the implementation of the mode of attack, this method is the Exploit. In order to attack systems, hackers will write exploits.

Vulnerability used: Zero Day Exploit (zero-day exploits)

Zero-day exploits is not yet understood and is still running amok exploits, that this type of vulnerability has not been found using the current. Once a vulnerability found in use by the network security community, and soon there will be a patch for it, and write the characteristics of IDS identification information, to make use of this loophole is invalid, and effectively capture it.

False Negatives (omitted)

Omission is not an IDS to detect attacks or analysts considered harmless.

False Positives (false positives)

False positive is the actual sound of the issue has been detected as IDS attacks.

Firewalls (Firewall)

Network security firewall is the first hurdle, although it is not IDS, but the firewall logs can provide valuable information for the IDS. The principle is based on the work firewall rules or standards, such as source address, port, etc., will block out dangerous connection.

FIRST (Forum of Incident Response and Security Teams, Incident Response and Security Team Forum)

FIRST is an international government and private organizations together to exchange information and coordinate response actions Alliance, the annual FIRST be a high priority, and its URL address is http://www.first.org/.

Fragmentation (fragment)

If a packet was too large to load, it had to be divided into pieces. Slice based on the network MTU (Maximum Transmission Units, the maximum transmission unit). For example, the tablets ring (token ring) the MTU is 4464, Ethernet (Ethernet) the MTU is 1500, so if a packet from the tablets were transferred to the Ethernet ring network, it will be split into smaller fragment, and then rebuild at the destination. While this deal will result in reduced efficiency, but the effect of fragmentation is still very good. Hackers will slice as a way to evade IDS, and there are some DOS attacks are also used Segmentation.

Heuristics (inspiration)

Heuristics refers to the use of intrusion detection in AI (artificial intelligence, artificial intelligence) thinking. IDS actually use heuristic theory has emerged about 10 years, but they are not enough "smart", an attacker can make it through the training of it and ignore those malicious information flow. Some IDS uses to detect abnormal pattern of invasion, such IDS must be constantly learning what is normal for the event. Some producers think this is very "smart" IDS, so they will be seen as heuristic IDS. But in fact, the real application of AI technology to the analysis of input data is also very little IDS.

Honeynet Project (Honeynet Project)

Honeynet is a learning tool, is a security flaw in the network contains. When it is under security threat, the invasion of information will be captured and accepted analysis, so that hackers can learn some things. Honeynet is a professional organization of more than 30 security members, dedicated to the understanding of hacker groups using the tools, tactics and motives as well as share their knowledge of the project. They have established a series of honeypots, provides a seemingly vulnerable Honeynet network, observe the intrusion into the hacking of these systems to study the hacker tactics, motivation and behavior.

Honeypot (Honey Pot)

Honeypot is a system that contains the vulnerability, which simulates one or more of vulnerable hosts, to provide an easy hacker targets. Since honeypots have no other tasks to be done, all connection attempts should be regarded as suspicious. Another use of honeypots is their real goal to delay the attacker attacks allow an attacker to waste time on the honeypot. At the same time, the initial targets are protected, the real value of the content will not be violated.

Honey Pot is one of the original purpose of gathering evidence for the prosecution of malicious hackers, it looks like there are "trapped" feeling. However, in some countries can not use honeypots to collect evidence to prosecute hackers.
IDS Categories (IDS category)

There are many different types of IDS, the following breakdown:

鈼?IDS Category 1-Application IDS (Application IDS): IDS application for some special applications found invasion of the signal, these applications usually refers to the more vulnerable applications such as Web servers, databases and so on. There are many original focus on the operating system host-based IDS, although not for the default application, but can also be trained, used in applications. For example, KSE (a host-based IDS) can tell us in the event log is doing, including the event log report on the application's output. An example of an application IDS is Entercept's Web Server Edition.

鈼?IDS Category 2-Consoles IDS (console IDS): In order to apply collaborative environment IDS, distributed IDS agents need to report information to the center console. Now many of the center console can also receive data from other sources, such as other producers of the IDS, firewalls, routers. The integration of these information can be presented a more complete picture of the attack. Some of the console will also add their own signatures to the agency-level console, and provide remote management capabilities. This IDS product has Intellitactics Network Security Monitor and Open Esecurity Platform.

鈼?IDS Category 3-File Integrity Checkers (File Integrity Checker): When a system's threat of attack, it often will change some of the key files to provide continued access and prevent detection. Additional information for the key documents through summaries (encrypted hash), you can periodically check the file to see if they are to be changed, thus providing a guarantee to some extent. Once such a change is detected, the integrity checker will issue a warning. Moreover, when a system already under attack, the system administrator can also use the same method to determine the extent of the system at risk. File Checker before the incident occurred after a long time to come out to intrusion detection is "hindsight", the recent number of products can be accessed in the document, while on inspection, can be seen as a real-time IDS products. Such products are Tripwire and Intact.

鈼?IDS Category 4-Honeypots (honeypots): on the honeypot, as already introduced. Examples of honeypot Mantrap and Sting.

鈼?IDS Category 5-Host-based IDS (host-based IDS): IDS on multiple sources of such systems and event log monitoring, suspicious activity. Host-based IDS, also known as host IDS, the most suitable for detection of internal staff who can be trusted and have to avoid misuse of the traditional testing methods to infiltrate the network activities. In addition to the completion of a similar event log reader function, host IDS is also on the "event / log / time" for signature analysis. Many products also contain heuristic function. Host IDS for almost real-time work, the system errors can be quickly detected, technicians and security people are very like it. Now, host-based IDS is that based on server / workstation all types of host intrusion detection system. Such products include Kane Secure Enterprise and Dragon Squire.

鈼?IDS Category 6-Hybrid IDS (Hybrid IDS): The structure of modern switched network intrusion detection operation to bring some problems. First, the default state in exchange for network card in promiscuous mode does not allow the work, which makes the installation of traditional network IDS is very difficult. Second, the high speed of the network means that many packets will be discarded by NIDS. Hybrid IDS (Hybrid IDS) is a program to solve these problems, it will raise a level of IDS, a combination of network node IDS and Host IDS (host IDS). Although the coverage of this solution greatly, but taking into account the resulting huge amount of data and costs. Many network servers only critical to retain mixed-IDS. Some manufacturers to complete more than one task are called IDS Hybrid IDS, in fact it is only for advertising effects. Hybrid IDS products CentraxICE and RealSecure Server Sensor.

鈼?IDS Category 7-Network IDS (NIDS, Network IDS): NIDS on all flow through the monitoring agent to monitor network traffic for suspicious activities and unusual features include activities to respond to attacks. NIDS was originally mixed with the IDS filter information packet sniffer, but recently they have become more intelligent and can decipher the agreement and to maintain state. There NIDS products based on the application, just install and can be applied to the host. NIDS attack on the characteristics of each information packet analysis, but under high load in the network, or to discard some packets. Network IDS products are SecureNetPro and Snort.

鈼?IDS Category 8-Network Node IDS (NNIDS, network node IDS): Some network IDS is not reliable at high speed, the load will be discarded after the high proportion of their network information packet, and switching network will often hinder the network IDS to see to the mixed packet transmission. NNIDS the NIDS functions entrusted to a separate host, thus alleviating the high speed and exchange issues. Although NNIDS and personal firewall features similar, but there are differences between them. To be classified as NNIDS personal firewall, an attempt should be made of the connection. For example, unlike many personal firewall found in the "trying to connect to port xxx", a NNIDS would have done any of the probe characteristics. In addition, NNIDS will host the event received is sent to a central console.

NNIDS products BlackICE Agent and Tiny CMDS.

鈼?IDS Category 9-Personal Firewall (Personal Firewall): a personal firewall installed on a separate system, preventing unwanted connection, either incoming or out to protect the host system. Be careful not to confuse it with NNIDS. Personal firewalls are ZoneAlarm and Sybergen.

鈼?IDS Category 10-Target-Based IDS (target-based IDS): This is not a clear one IDS terminology, different people have different meaning. One possible definition file integrity checker, while the other is the definition of the network IDS, which is only for those who are looking for and protected as vulnerable to attack by the characteristics of the network. The purpose behind this definition is to improve the speed of IDS, because it does not search for those unnecessary attacks.

IDWG (Intrusion Detection Working Group, Intrusion Detection Working Group)

Intrusion Detection Working Group's goal is to define data formats and exchange of information, procedural steps, such information is for intrusion detection systems, response systems, and those in need of management systems and their interaction are important. Intrusion Detection Working Group to work with other IETF organizations.

IDWG the URL address is http://www.ietf.org/html.charters/idwg-charter.html.

IETF's URL address is http://www.ietf.org/.

Incident Handling (event processing)

To detect an intrusion is just the beginning. More generally, the situation is, the console operator members will Buduan to receive alerts, with a fundamental Wufa separate the time to personally track every potential incident, the operator will be in the interest of the event Shangzuo Chu Biaozhiyibei future You Response Team to research. After the initial reaction, you need to deal with the incident, that is, such as surveys, debates and issues like the prosecution.

Incident Response (incident response)

On the detection of the initial response of potential events, then these events according to event handling procedures.

Islanding (island)

Island is to the network is completely cut off from the Internet, which is almost a last resort, and no way of approach. An organization only in the large-scale virus outbreaks or security attacks are very obvious when using this tool.

Promiscuous (mixed mode)

By default, IDS can only see out of the host network interface information, which is the so-called non-promiscuous (non-promiscuous mode). If the network interface is a mixed mode, you can see the segment in all of the network traffic, regardless of its source or destination. This is necessary for network IDS, but may be used by packet sniffer to monitor network traffic. Exchange-based HUB can solve this problem, see the place full of traffic, will have a number of cross (span) port.

Routers (router)

Router is used to connect different subnets center, they work in the OSI 7 layer model of the transport layer and network layer. The basic function of the router is a network packet transmitted to their destination. Some routers have access control lists (ACLs), allows packet filtering unwanted information out. Many routers can log information to their injected into the IDS system, providing access to the network blocked attempts to valuable information.

Scanners (Scanner)

Scanner is an automated tool that scans the network and host vulnerability. With intrusion detection systems, they are also divided into many types, the following were described.

鈼?Scanner Type 1-Network Scanners (network scanner): network scanner on the network search to find all the hosts on the network. Traditionally, they use the ICMP ping technology, but this approach can easily be detected. In order to become hidden, there are some new technologies, such as fin ack scan and scan. Use of these scanners is another more subtle advantage: different operating systems on these scans have different reactions, thus providing an attacker with more valuable information. An example of this tool is nmap.

鈼?Scanner Type 2-Network Vulnerability Scanners (network vulnerability scanner): network vulnerabilities scanner network scanner a step forward, it can detect the target host, and highlight all the loopholes for hackers to use. Network vulnerability scanner for attackers and security experts to use, but will allow IDS systems often "tense." Retina of such products and CyberCop.

鈼?Scanner Type 3-Host Vulnerability Scanners (host vulnerability scanners): such tools as a privileged user, from the internal scan host, password strength testing, security policy and file permission and so on. Network IDS, Host IDS particular it can be detected. Such products are SecurityExpressions, it is a remote Windows vulnerability scanners, and can automatically repair vulnerabilities. There are as ISS database scanner, will scan the database vulnerability.

Script Kiddies (script kiddies)

Some are much-vaunted Internet security breaches, such as the February 2000 denial of service attacks against Yahoo, is the number of teenage students dry, they dry the purpose of these bad things seem to fame. Security experts often to these people as script kiddies (Script Kiddies). Script kiddies are usually spontaneous, less skilled cracker, they use the information downloaded from the Internet, software or scripts on the target site for destruction. Hacker organizations or law enforcement authorities have expressed contempt for these script kids, because they are usually unskilled, there are a lot of time to carry out his hand, destroy, their purpose generally is to impress their friends. Script kiddies is like holding a rush of children, they do not understand ballistics, do not have to be able to manufacture firearms, can become a powerful enemy. Therefore, whenever they can not underestimate their strength.

Shunning (hide)

Equipment is configured to avoid the border to reject unwanted packets to all, and some even refuse to escape all the IP addresses from certain countries, the information packets.

Signatures (feature)

IDS is the core of signatures, which allows IDS to trigger when the event occurs. Feature information is too short will always trigger the IDS, leading to false positives or wrongly reported that the work is too long will slow down the rate of IDS. Some features will be supported by the number of IDS IDS as a standard of good or bad, but a feature of some commercial products cover many attacks, and some manufacturers of these features will be listed separately, which would give the impression as if It contains more features, a better IDS. We must be aware of these.

Stealth (hidden)

Hide is the IDS in detecting attacks from outsiders can see, they often use outside in the DMZ, not firewall protection. Some of its shortcomings, such as automatic response.







相关链接:



DB2 9's XML index



Decrypt the World Trade Center's first building built on the ruins of



3GPP to WMV



Jobs leak Macworld speech



ABC classification OF goods



error 1607 unable to install installshield



How I sold 1,000 cars, 200 sets of villas



Children's Books list: Foreign Books victory, was embarrassing domestic children's books



Guide Adventure And Roleplay



VBScript Month Function



Flash to MPEG



Font Tools CATALOGS



Fast Switch Input 3 Ax



FLV to SWF



The new VPN Strength



Specialist Health And Nutrition



Friday, October 15, 2010

China Business Daily: Who is the end of the traditional MP4


Cinema, Album, Photo, MP3, mobile hard disk, tape recorders, cameras, portable TVs, wireless Internet ... ... due for market launch large-scale, MP4 fashion concept of this seemingly already set a number of functions in one ultra-high integration unity, the cross and end its traditional definition. The hero, Techno music and other planning in the future to occupy a favorable position in the territory of the new entrants are even more to solution providers on behalf of itself, shot the upstream industry chain, looking for their new products with more profit selling .

"Super-integrated" end "traditional MP4"

In the traditional sense "MP4" is a palm-sized only to watch MPEG4 format video files player. But as long as the Dinghao Zhongguancun in Beijing, Dragon and other stores to walk round, you will find that the simple sense now that MP4 has almost vanished. Film source shortage, prices remain high, even as the biggest characteristic of the video seems to move with the public runs counter to traditional habits of consumers, these "shortcomings" that traditional MP4 players have emerged with more and more limited commercial prospects, "niche products" almost to be the fate of its doomed.

However, "integration and reunification," the IT trend also applies to digital. So manufacturers have tested the water at home and abroad, with more features to help you leap into the high level of integration of a broader market space. Now the market is still all kinds of products known as MP4, MP3, DC, DV, mobile hard drives, digital partner, e-books and other functions are being more and more enterprises into their own products which, even the phone call functionality can easily be added.

From pure MPEG4 video player to the present ultra-integrated products, and then follow the "MP4" the very narrow sense, is not appropriate the name is already. Techno music was developed by the company to its new product called the PMP (portable multimedia mobile terminal), while the hero in its own product called "palm hegemony." In accordance with the Hero Chao Liang head of new words: "Although we are now doing MP4, but perhaps it did a few years more advanced things."

As we explore the mobile phone could replace MP3, digital cameras, electronic books, when, in fact, should see a bit farther, not only who have replaced, but the new generation of mobile devices will look like? Although all the vendors we interviewed agree that MP4 will be hot next year, but they had in mind has a brand new MP4 mobile terminal, while a narrow escape MP4 is still a "transitional Hero" destiny.

Expand profit margins

It is, therefore, how to seize the lead in the new map in a good position to avoid a sudden one day going to face the dramatic ebb and flow of dry sand of embarrassment, some manufacturers thought would be the problem. When the number of hardware manufacturers still do follow along the old train of thought, picked a price war, "the old sword" to kill the market, some entrants have quietly resorted to after the new "trick."

"Hero to do is move the digital entertainment solutions. End-products are only part of the background software support and a variety of audio and video content works is also essential. Put these together, what we want to provide a complete application of concepts . "Liang Chao repeatedly emphasized to reporters the new. Support such a new concept of entertainment, is a hero by tying the interests of all to build up an industrial chain alliance.

Currently the MP4 content production chain, including publishers, audio and video technology providers, content delivery and download platform for service providers, terminal Play equipment manufacturers, distributors and end users in these most. However, the public use of the upstream chip brand MP4 different format to support playback of the content are not the same. Techno music executive director Zhuming Cheng told reporters: "In dozens of MPEG4 file format, a product can play MP4 only about two or three, so despite the existence of many content services platform, but can not provide the corresponding format of the content."

Gaps and opportunities that this market a lot of the manufacturer. France ARCHOS Shenzhen Office marketing Chen Jun Hong, said: "Companies are looking for local content partners, there are already several in the discussions among the successful if that is the outcome of the year." MP4's in the same constant has been wading DEC Executive Assistant Wang Huan also said: "the enterprise is considering whether it should be shot with the integration of industrial chain of problems."

In addition to integrated industry chain, China's enterprises in this new market, there are other similar real opportunity. Techno music claims in the system design, application design and software design aspects of PMP products with independent intellectual property rights, the hardware manufacturers to sell abroad "program." "At present, the agreement was signed with our PMP technology solutions including Core Pacific Digital has five companies, including, but come to us to do program evaluation, the intention to take sample tests are already dozens of companies, including even very well-known digital production company. estimated that in 2006, we adopted this solution provides the project will reach 100 million yuan annual income of more than. "Zhu way very proud.

Not difficult to see shot in the upper reaches of the program through the synergy of hardware and software, so solution providers of the new ideas and technology, domestic enterprises have been interested in a step forward. Success or failure is still difficult to clear, but simply do MP4 hardware has not much room for development, up to now is like color TV, phone manufacturers, like. But it means the software application development possibilities, many manufacturers with industry cooperation, Chinese enterprises can also be completely the same as Microsoft or Intel to start the role of upstream suppliers.






Recommended links:



Evaluate Graphic



I have a A4 paper give you a high PERFORMANCE [1]



Additional team bonus, energy stimulate team



Automation Tools Directory



Five-stroke Input Method Is Not Just Pole



Selected FIFTH one, Peking University Guanghua New Year's Forum



Specialist Management AND Distribution



TD 3 TENDER cover is the key to solve



ASF To AVI



fix hotmail virus for free Speed up slow running



"Computer countryside" Brewing changing situation



Recommend Inventory And Barcoding



Customer is NOT his wife is a lover of God is



MPG to Flash



Describes the properties of the problem MIDP



QuickTime To MPEG



Tuesday, October 5, 2010

WinGate FAQ


WinGate is a proxy server and firewall software package that allows multiple users simultaneous access only through a connection Internet. I use it in the process of collection, summarizes some small experience, is dedicated to you "size."

Q: Client QQ, network flashget Ant and how to set?

A: First confirmed WinGate server is enabled by default Socks proxy service, QQ client preferences in the network settings tab, find the proxy settings, select the "Use Socks5 proxy server", "Proxy server address" enter WinGate server's IP address, the default port is 1080, such as the WinGate server to allow anonymous access to optional user name and password, press the test button, if you can over the line through.
Netants, Flashget set method similar to the "Options" settings find the "Agent" tab, add a "proxy server", enter the server address, port type and port number (FTP port default is 21) , must be noted that even if the server does not offer Socks, and FTP proxy services can use the HTTP proxy port (default 80), and then set it to "Default Proxy" button.

Q: What applications to install WinGate client?

A: The need for a direct Internet connection without support Socks proxy service programs (such as NetMeeting) need to install the WinGate Client software. In the WinGate client configuration is successful, the client application should be configured to direct Internet connection, but no longer need to configure proxy server parameters. As the LAN only WinGate server has a valid WAN IP, can only call other people using NetMeeting, or receive calls within the LAN can not accept calls from the Internet.

Q: OE and Foxmail how to send and receive E-mail settings?

A: OE and use the client to receive e-mail settings Foxmail easier POP3 server mail program is set to WinGate server's IP address, attention should POP3 account in the "@" symbol to crosswise " "such as your original account is" user@263.net ", be changed to" user # 263.net ". However, mail has some problems, WinGate's SMTP proxy can only set up a server, which means you have to find a letter of the SMTP server allows anonymous to ensure that the LAN users to use different mail letters, so best to own build an SMTP server on the server.

Q: I have IIS installed WinGate server to use port 80, the WWW service can be modified into WinGate as another port?

A: Yes, as long as no other server on port conflict on the line. In fact, modify the port there are other useful, for example, you do not want to let other people use QQ but do not want to influence their use, the Socks in the server port set to other numbers. Some SMTP port by increasing the number of SMTP servers to resolve the problem letter, but the server and the client set a lot of trouble.

Q: WinGate server cache (Cache) is set too bigger better?

A:. Because the hard disk is increasingly becoming the bottleneck of the whole system, Cache is too large, multiple concurrent client access to server hard disk will cause congestion, the current mainstream models (CPU: P 鈪?800MHz, memory: 128MB) according to the number of users and access custom settings for the 100MB ~ 200MB is enough.

Q: Why browse the server where the content can not be added to the Cache?

A: First of all, the server must also like the same client can be WinGate Internet through a proxy cache, followed by some pages (such as ASP, PHP) dynamically to access Internet, generally can not be saved in the Cache.

Q: How WinGate server to filter out undesirable sites?

A: WinGate server side in a strategic (Policies) to filter sites. But take note, WinGate support the transfer of HTTP to Socks, Socks proxy service must be both in the application of the policy. Setting an example with the following? Quot; sex "site filter string.

The first step: in the WWW proxy service in the establishment of a strategy

By Administrator log on to the Gatekeeper, double-click Services (Services) tab of the WWW Proxy Service (WWW proxy service) to edit. Selection strategy (Policies) tab, the default rights (System policies) option, choose to ignore (Are ignored). Click Add (Add), select "All" radio button (Everyone) as an acceptable strategy for users. Click the ban list of labels (Ban list), click open the prohibited list of options (Enable ban list option). Click Add (Add), restrict a specific site, click This criterion is met if, select the HTTP URL, in the middle of the input box, select "contains" (Contains from the list). In the last input box, type "sex", increase the other to join the list of prohibited content, save your settings.

Step Two: Application Strategy

Double-click the Socks proxy service, select Socks Advanced (Advanced) tab, the HTTP protocol option, select the Use following policy button. Then the next menu, select the WWW Proxy server entries, click OK and save.

Q: Set the "use dial", the why, when access to LAN resources, WinGate also dial-up?

A: This is a request from the workstation by the DNS query result, even if these queries are in the local network (such as query the LAN computer name or shared printer name) will trigger the automatic dialing WinGate, by prohibiting DNS request to allow dial-up solution. By Administrator log on to the Gatekeeper, in the "System" tab, double-click the DNS service (DNS service), the General (General) tab close "to allow start dialing request (Allow request to initiate)" option, click OK, Save your settings.






相关链接:



3G2 to MPEG



free online fax Services to send fax by email



DVR-MS To MP4



ASF converter