- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
个人电脑防御黑客技巧(Personal computer defense hacker skills)
个人电脑防御黑客技巧(Personal computer defense hacker skills)
Now a lot of personal computer software Trojan attacks, more functional than before, the use is more convenient than before, so the damage is larger than before, Kiki found a lot of people in the Trojans do not know, I wrote a little experience, give you a reference. If you want to make your computer safe, just tie up your fence, watch your own door, and your computer has its own door. Lets call it
port
You surf the network, people chat with you, and you send e-mail, you must have a common agreement, this agreement is the TCP/IP agreement, any network software communication is based on the TCP/IP protocol. If the Internet is the highway network, computer is a roadside houses, houses have a door you can access the TCP/IP agreement, the computer can have 256 times 256 door, from 0 to 65535, door, the TCP/IP protocol called it the port. When you send email, E-mail software gave the letter to the mail server port 25, when you receive the E-mail software from the mail server port 110 in the door to win, I write the things you see now, is the 80 port access server. The newly installed personal computer opens the port number of 139 ports. When you are on the Internet, you communicate with the outside world through this port. Hacker is not immortal, he also enters your computer through port;
How does a hacker get into your computer?
Of course, also based on the TCP/IP protocol through a port into your personal computer. If your computer has a shared directory, then the hacker can access your computer via port 139, and pay attention to it! WINDOWS has a defect, even if you set the shared directory how long passwords, a few seconds can get into your computer, so youd better not set up a shared directory, do not allow other people to view your computer information. In addition to port 139, hackers cant hack into your personal computer if no other ports are open. So how did hackers get into your computer? The answer is to ente
您可能关注的文档
- 七年级上册历史复习提纲(Seven grade history review outline).doc
- 七年级上册历史期中测试题(The test of grade seven in the historical period).doc
- 七年级上册历史第三单元《统一国家的建立》知识点(On the third unit seven grade to establish a unified state of knowledge).doc
- 七年级《一元一次方程》教材分析(Analysis of the textbook of one yuan one equation in Grade Seven).doc
- 七年级上册历史(Seven grade history).doc
- 七年级上册数学试卷(The seven grade math test).doc
- 七年级上册语文课堂作业本答案(The seven grade language classroom homework answer).doc
- 七层共挤薄膜(Seven layer coextrusion film).doc
- 七年级下册-历史复习提纲(Grade seven - historical review outline).doc
- 七年级下册-历史期末测试题(Grade seven - history final test).doc
- 个人成功计划(Personal success plan).doc
- 个人知识管理的动态观念(The dynamic concept of personal knowledge management).doc
- 个人科研总结(Personal research summary).doc
- 个人特性与公管理司理念如何相匹配(How does individual characteristics match up with the concept of the public management division).doc
- 个人录音及网络k歌器材介绍.doc
- 个人简历写法(Resume writing).doc
- 个人电脑配置单大全(PC configuration Dan Daquan).doc
- 个人简介写法(Personal introduction).doc
- 个人管理篇1观念决定一切管理(Personal management 1 ideas determine all management).doc
- 个人金融产品营销策略(Personal financial products marketing strategy).doc
文档评论(0)