1. IP address basic knowledge.
Millions of hosts on the Internet, in order to distinguish these hosts, people have assigned a specialized address for each host, called IP address. Each host can be accessed through the IP address. The IP address consists of 4 part numbers, each of which corresponds to 8-bit binary numbers, and each part is separated by a decimal point. For example, a host's IP address is: 211.152.65.112, the Internet IP address is responsible for the planning of the global address by the NIC (Internet Network Information Center); at the same time by Inter NIC, APNIC, RIPE three network information center, responsible for the United States And IP address assignments in other regions.
Fixed IP: The fixed IP address is a long-term fixed assignment IP address used by a computer, usually a special server has a fixed IP address.
Dynamic IP: Because IP address resources are very short, online dial-up online or ordinary broadband Internet users generally do not have fixed IP addresses, but is dynamically assigned a temporary IP address dynamically. Ordinary people generally do not need to understand dynamic IP addresses, which are automated by computer systems.
Public Address is the responsibility of the Inter NIC (Internet Network Information Center Internet Information Center). These IP addresses are assigned to registration and propose an organization that applies for Inter NIC. Access the Internet through it.
Private address (private address) belongs to the inlet address, which is specifically used inside the organization.
The following is listed below, the private address of the freelance:
Class A 10.0.0.0--10.255.255.255
Class B 172.16.0.0--172.31.255.255
Class C 192.168.0.0--192.168.255.255
2. What institution is allocated by the IP address?
All IP addresses are responsible for unified allocation by the International Organization NIC (Network Information Center), and there are currently three such network information centers in the world.
INTERNIC: Responsible for the United States and other regions;
ENIC: Responsible for Europe;
APNIC: Responsible for the Asia Pacific.
my country's application IP address should be located in Tokyo University in Japan through the APNIC, APNIC. At the time of application, consider which type of IP address is applied, and then propose to the domestic agency.
3. What is public address and private address?
Public Address is the responsibility of the Inter NIC (Internet Network Information Center Internet Information Center). These IP addresses are assigned to registration and propose an organization that applies for Inter NIC. Access the Internet through it.
Private address (private address) belongs to the inlet address, which is specifically used inside the organization.
The following is listed below.
Class A 10.0.0.0--10.255.255.255
Class B 172.16.0.0--172.31.255.255
Class C 192.168.0.0--192.168.255.255
4. Why is it attacked by a network?
According to the China Ministry of Public Security, the Ministry of Public Security 2004 National Information Network Security Status and Computer Virus Epidemic Survey Campaign ended, the survey showed that China's computer user's computer virus infection rate was 87.9%, which was 2% higher than last year.
The survey showed that China's computer user's computer virus infection was 87.9%, an increase of 2% over last year. However, the number of users with computer viruses in more than 3 times has a larger loss, accounting for 57.1% of the number of users infected, 26% lower than last year, indicating that the anti-user prevention ability of the viral infection has increased. May 2003 to May 2004, computer viruses with the highest infection rate in China are network worms and viruses or malicious code for browsers, such as "荡 波", "network sky", "Nima", "SQL" Worm ", etc. The damage and losses caused by computer viruses have declined in previous years, but the destruction of the network has a significantly rising trend, especially some computer viruses that steal computer user accounts, passwords, etc., have strong hidden hidden, and harmful.
The survey showed that the proportion of network security incidents in the survey unit was 58%. Among them, 22% of the total occurred, 13% of 2 times, 23% of 3 or more. In a network security event, the safety incident caused by computer viruses, worms and Trojans accounts for 79% of the total number of security events, and network attack events such as service, port scanning and tampering web pages account for 43%, and mass spam dissemination. Safety events account for 36%. 54% of the loss caused by the network security incident of the investigative unit is relatively slight, the loss is serious and very serious, accounting for 10% of the total number of units of safety incident.
The main reason for causing network security incidents is that the safety management system is not implemented and the safety prevention awareness is weak, including 66% of the total number of safety incidents due to unpaid, anti-software vulnerabilities. At the same time, the survey shows that the information network usage units have improved and strengthen the emphasis on security management work, implementing security management measures and safety dedicated technology products, but the user's security concept is weak, and the safety management personnel lack training, and lack effective Safety information notification channels, the development of safety service industry cannot meet social needs, etc.
The main reason for causing network security incidents is that the safety management system is not implemented and the safety prevention awareness is weak, including 66% of the total number of safety incidents due to unpaid, anti-software vulnerabilities. At the same time, the survey shows that the information network usage units have improved and strengthen the emphasis on security management work, implementing security management measures and safety dedicated technology products, but the user's security concept is weak, and the safety management personnel lack training, and lack effective Safety information notification channels, the development of safety service industry cannot meet social needs, etc.
5. How do personal users intercept network attack?
● Characteristic analysis of hacker attack behavior, anti-attack technology comprehensive analysis report!