-
Answer]: An intrusion prevention system (IPS) is a computer network security facility, which is a supplement to anti-virus software and firewalls. It is a computer network security equipment that can monitor the data transmission behavior of the network or network equipment, and can interrupt, adjust or isolate some abnormal or harmful hidden network data transmission behaviors in a timely manner.
Intrusion prevention systems can be further divided into stand-alone intrusion prevention systems (HIPS i.e., host-based intrusion prevention systems), network intrusion prevention systems (network-based intrusion prevention systems), and application-based intrusion prevention systems according to their uses.
The host-based intrusion prevention system protects a single host, which needs to read logs on the host and perform anomaly detection, and is generally deployed in the protected host system.
-
HIPS is a software that monitors the operation of your computer's Chinese files and files, uses other files and changes to the registry, and reports to you requests for permission. If you block it, it won't work or change. For example, if you double-click on a virus program, and the HIPS software pops up to report and you block it, then the virus still doesn't run.
To quote a sentence: "The virus mutates every day, and new ones emerge every day, so that the killing of soft may not be able to keep up with the pace of the virus, and HIPS can solve these problems." HIPS is a trend in the development of system security in the future, as long as you have enough professional level, you can only use HIPS without antivirus software macro.
However, HIPS cannot be called a firewall, at most it can only be called a system firewall, which cannot prevent other computers on the network from attacking your computer.
Because the virus mutates every day and new ones are disturbed every day, it may not be able to keep up with the pace of the virus, and HIPS can solve these problems.
Our personal HIPS can be divided into 3D: AD (Application Defend) - Application Defense System, RD (Registry Defend) Registry Defense System, FD (File Defend) File Defense System. It uses customizable rules to determine and allow or disallow local runs, registry reads and writes, and file reads and writes.
-
Answer]: A host-based intrusion prevention system can block buffer overflows, change login passwords, change dynamic link libraries, and intrusions that attempt to wrest control from the operating system. Network-based intrusion prevention systems focus on packet filtering protection, such as dropping offensive packets or blocking connections.
The application human intrusion prevention system can prevent attacks such as cookie tampering, SQL ** embedding, parameter tampering, buffer chain overflow, forced browsing, malformed packets, and data type non-terrestrial matching. Option B belongs to the application intrusion prevention system function, so select option B.
1.The motherboard MSI945 neo5-f, sold for 450 yuan, is definitely not worth it, and the 945 has been replaced by P31. >>>More
DDR2 667 512 land costs about 150 pieces, other graphics cards cost 500 700, hard disks cost more than 500, optical drives cost 200 300, power supplies and others also cost some money, almost. Let me tell you, it's not the motherboard and CPU that are important, but the memory and the CPU are important, of which the memory is more important, because as long as you don't play games, the CPU usage is below 10%, including watching movies at the same time, chatting and watching web pages. But. >>>More
With the rapid development of cloud computing, the most popular of which is cloud hosting, and major businesses are hyping up their cloud products. So, what are the benefits of so-called cloud hosting? Compared with the traditional hosting space, cloud hosting has many advantages, which are mainly reflected in: >>>More
I've always used the Cozyhome space, which is very good. Recommended to you.
Cloud server concept.
Cloud server is a virtualization technology similar to VPS server, VPS is the use of virtual software, VZ or VM on a server to virtualize a number of independent server-like parts, each part can be a separate operating system, the management method is the same as the server. The cloud server is a part of a group of cluster servers that virtualize multiple independent servers, and each server in the cluster has an image of the cloud server, which greatly improves the security and stability of the virtual server, and the cloud server will be inaccessible unless all the servers in the cluster have problems. Cloud server is a kind of elastic cloud technology based on web services, which provides elastic cloud cloud technology that can adjust the configuration of cloud hosts, integrates IaaS services of computing, storage and network resources, and has the ability to use and pay instantly on demand. >>>More