IP address basic knowledge

xiaoxiao2021-03-06  40

1. IP address basic knowledge. 2. What institution is all assigned? 3. What is the public address and private address? 4. Why is it affected by a network attack? 5. How to intercept the network attack? 6. Computer common port list. 1. IP address basic knowledge. Millions of hosts on the Internet, in order to distinguish these hosts, people have assigned a specialized address for each host, called IP address. Each host can be accessed through the IP address. The IP address consists of 4 part numbers, each of which corresponds to 8-bit binary numbers, and each part is separated by a decimal point. For example, a host's IP address is: 211.152.65.112, the Internet IP address is responsible for the planning of the global address by the NIC (Internet Network Information Center); at the same time by Inter NIC, APNIC, RIPE three network information center, responsible for the United States And IP address assignments in other regions. Fixed IP: The fixed IP address is a long-term fixed assignment IP address used by a computer, usually a special server has a fixed IP address. Dynamic IP: Because IP address resources are very short, online dial-up online or ordinary broadband Internet users generally do not have fixed IP addresses, but is dynamically assigned a temporary IP address dynamically. Ordinary people generally do not need to understand dynamic IP addresses, which are automated by computer systems. Public Address is the responsibility of the Inter NIC (Internet Network Information Center Internet Information Center). These IP addresses are assigned to registration and propose an organization that applies for Inter NIC. Access the Internet through it. Private address (private address) belongs to the inlet address, which is specifically used inside the organization. The following is listed below A class 10.0.0.0--10.255.255.0--10.255.255.0--172.31.255.0.0--172.168.0.0--192.168.255.255

2. IP address is all assigned by the agency? All IP addresses are responsible for uniform allocation by the International Organization NIC (Network Information Center), and there are currently three such network information centers in the world. InterNic: Responsible for the United States and other regions; Enic: Responsible for Europe; APNIC: Responsible for the Asia Pacific region. my country's application IP address should be located in Tokyo University in Japan through the APNIC, APNIC. At the time of application, consider which type of IP address is applied, and then propose to the domestic agency.

3. What is a public address and a private address? Public address (PUBLIC Address is responsible for the Inter NIC (Internet Network Information Center Internet Information Center). These IP addresses are assigned to registration and propose an organization that applies for Inter NIC. Access the Internet through it. Private address (private address) belongs to the inlet address, which is specifically used inside the organization. The following is listed below A class 10.0.0.0--10.255.255.0--10.255.255.0--172.31.255.0.0--172.168.0.0--192.168.255.255

4. Why is there any network attack? According to the China Public Security Department, the Ministry of Public Security 2004 National Information Network Security Status and Computer Virus Epidemic Survey Campaign is successful. The survey shows that China's computer user's computer virus infection rate is 87.9%, which is higher than last year. 2%. The survey showed that China's computer user's computer virus infection was 87.9%, an increase of 2% over last year. However, the number of users with computer viruses in more than 3 times has a larger loss, accounting for 57.1% of the number of users infected, 26% lower than last year, indicating that the anti-user prevention ability of the viral infection has increased. May 2003 to May 2004, computer viruses with the highest infection rate in China are network worms and viruses or malicious code for browsers, such as "荡 波", "network sky", "Nima", "SQL" Worm ", etc. The damage and losses caused by computer viruses have declined in previous years, but the destruction of the network has a significantly rising trend, especially some computer viruses that steal computer user accounts, passwords, etc., have strong hidden hidden, and harmful. The survey showed that the proportion of network security incidents in the survey unit was 58%. Among them, 22% of the total occurred, 13% of 2 times, 23% of 3 or more. In a network security event, the safety incident caused by computer viruses, worms and Trojans accounts for 79% of the total number of security events, and network attack events such as service, port scanning and tampering web pages account for 43%, and mass spam dissemination. Safety events account for 36%. 54% of the loss caused by the network security incident of the investigative unit is relatively slight, the loss is serious and very serious, accounting for 10% of the total number of units of safety incident. The main reason for causing network security incidents is that the safety management system is not implemented and the safety prevention awareness is weak, including 66% of the total number of safety incidents due to unpaid, anti-software vulnerabilities. At the same time, the survey shows that the information network usage units have improved and strengthen the emphasis on security management work, implementing security management measures and safety dedicated technology products, but the user's security concept is weak, and the safety management personnel lack training, and lack effective Safety information notification channels, the development of safety service industry cannot meet social needs, etc. The main reason for causing network security incidents is that the safety management system is not implemented and the safety prevention awareness is weak, including 66% of the total number of safety incidents due to unpaid, anti-software vulnerabilities. At the same time, the survey shows that the information network usage units have improved and strengthen the emphasis on security management work, implementing security management measures and safety dedicated technology products, but the user's security concept is weak, and the safety management personnel lack training, and lack effective Safety information notification channels, the development of safety service industry cannot meet social needs, etc. 5. How do personal users intercept network attack? · Hacker attack behavior characteristics Analysis of anti-attack technology comprehensive analysis report

6. Computer common port list.

1 Transfer Control Protocol Port Services Multi-channel Switch Selector 2 CompressNet Management Utility 3 Compression Processes 5 Remote Job Login 7 Express (Echo) 9 Discard 11 Online User 13 Time 15 NetStat 17 RC 18 Message Send Protocol 19 Character Generator 20 File Transfer Protocol (Default Data) 21 File Transfer Protocol (Control) 22 SSH Remote Login Protocol 23 Telnet Terminal Simulation Protocol 24 Reserved to Personal Mail System 25 SMTP Simple Mail Send Agreement 27 NSW User System Scene Engineer 29 MSG ICP 31 MSG Verification 33 Display Support Protocol 35 Reserved to Personal Printer Services 37 Time 38 Routing Access Protocol 39 Resource Location Protocol 41 Graph 42 WINS Host Name Service 43 "Nickname" WHO IS Service 44 MPM (Message Process Module) Sign Protocol 45 Message Processing Module 46 message processing module (default send port) 47 NI FTP 48 digital audio background service 49 TACACS login host protocol 50 remote mail check protocol 51 Imp (interface information processor) logical address maintenance 52 Xi 乐 network service system time protocol 53 domain name server 54 Xi 乐Network Service System Bill Exchange 55 ISI Graphics Language 56 Sxi Network Service System Verification 57 Reserved Personal Terminal Access 58 Single Network Service System Email 59 Reserved Personal File Service 60 Und Defined 61 Ni Mail? 62 Asynchronous Communication Adapter Service 63 WHOIS

64 Communication Interface 65 TACACS Database Services 66 Oracle SQL * NET 67 Boot Protocol Service 68 Boot Protocol Client 69 Small File Transfer Protocol 70 Information Retrieval Protocol 71 Remote Job Service 72 Remote Job Service 73 Remote Job Service 74 Remote Service 75 Reserved to personal dial-out service 76 distributed external object storage 77 reserved to personal remote job input service 78 correction TCP 79 Finger (Query remote host online users) 80 Global Information Network Hypertext Transfer Protocol (WWW) 81 Host2 name Service 82 Transport Utility 83 Modular Intelligent Terminal ML Device 84 Utility Tracking Device 85 Modular Intelligent Terminal ML Device 86 Micro Focus COBOL Programming Language 87 Reserved to Personal Terminal Connection 88 Kerberros Security Authentication System 89 SU / MIT Terminal Simulation Gateway 90 DNSIX Security Properties Tags 91 Mit Dover Spi 92 Network Print Protocol 93 Device Control Protocol 94 Tivoli Object Scheduling 95 SUPDUP 96 DIXIE Protocol Specification 97 Fast Remote Virtual File Protocol 98 TAC (Tokyo University Automatic Computer) News Agreement 101 USUALLY from SRI-NIC 102 ISO-TSAP 103 ISO MAIL 104 X400-SND 105 CSNET-NS 109 Post Office 110 POP3 Server (Mailbox Transfer Server) 111 Portmap or SunRPC 113 Query 115 SFTP 117 PATH or UUCP-PATH 119 News Server 121 Bo Jammerkillah 123 Network Time Protocol (Exp) 135 DCE Endpoint ResolutionNetBiOS-NS 137 NetBIOS-NS 138 NetBIOS-DGN 139 WIN98 Shared Resource Port (NetBIOS-SSN) 143 IMAP Email 144 News - News 153 SGMP - SGMP 158 PCMAIL 161 SNMP - SNMP 162 SNMP-TRAP -SNMP 170 Network PostScript 175 VMNET 194 IRC 315 LOAD 400 VMNET0 443 Security Service 456 HACKERS P aradise 500 sytek 512 exec 513 login 514 shell - cmd 515 printer - spooler 517 talk 518 ntalk 520 efs 526 tempo - newdate 530 courier - rpc 531 conference - chat 532 netnews - readnews 533 netwall 540 uucp - uucpd 543 klogin 544 kshell 550 new- rwho - new-who 555 Stealth Spy (Phase) 556 remotefs - rfs_server 600 garcon 666 Attack FTP 750 kerberos - kdc 751 kerberos_master 754 krb_prop 888 erlogin 1001 Silencer or WebEx 1010 Doly trojan v1.35 1011 Doly Trojan 1024 NetSpy.698 (YAI) 1025 NetSpy.698 1033 Netspy 1042 Bla1.1 1047 GateCrasher 1080 Wingate 1109 kpop 1243 SubSeven 1245 Vodoo 1269 Mavericks Matrix 1433 Microsoft SQL Server database services 1492 FTP99CMP (BackOriffice.FTP) 1509 Streaming Server 1524 ingreslock 1600 Shiv 1807 SpySender 1981 ShockRa

转载请注明原文地址:https://www.9cbs.com/read-73068.html

New Post(0)