²©¿ÍÈÕÀú |
« July 2025 » |
ÈÕ |
Ò» |
¶þ |
Èý |
ËÄ |
Îå |
Áù |
|
|
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
|
|
|
|
|
ÈÕÖ¾¹éµµ |
ÈýÔÂ, 2006
ËÄÔÂ, 2006
ÎåÔÂ, 2006
ÁùÔÂ, 2006
ÆßÔÂ, 2006
Ê®ÔÂ, 2006
ʮһÔÂ, 2006
Ê®¶þÔÂ, 2006
Ò»ÔÂ, 2007
¶þÔÂ, 2007
ÈýÔÂ, 2007
ËÄÔÂ, 2007
È«²¿...
|
|
²©¿Íͳ¼Æ |
·ÖÀà: 9
ÎÄÕÂ: 204
ÆÀÂÛ: 0
±êÇ©: 3
¸½¼þ: 103
ÒýÓÃ: 0
½ñÈÕ·ÃÎÊ: 6713
×Ü·ÃÎÊÁ¿: 24976284 |
|
|
Ö÷»úÈëÇÖ·ÀÓùÌåϵ |
Ëùνhips(Ö÷»úÈëÇÖ·ÀÓùÌåϵ)£¬Ò²¾ÍÊÇÏÖÔÚ´ó¼ÒËù˵µÄϵͳ·À»ðǽ£¬ËüÓбðÓÚ´«Í³ÒâÒåÉϵÄÍøÂç·À»ðǽnips. ¡¡¡¡¶þÕßËäÈ»¶¼ÊÇ·À»ðǽ£¬µ«ÊÇÔÚ¹¦ÄÜÉÏÆäʵ»¹ÊÇÓкܴó²î±ðµÄ£º´«Í³µÄnipsÍøÂç·À»ðǽ˵°×Á˾ÍÊÇÖ»ÓÐÔÚÄãʹÓÃÍøÂçµÄʱºòÄܹ»ÓÃÉÏ£¬Í¨¹ýÌØ¶¨µÄtcp/ipÐÒéÀ´ÏÞ¶¨Óû§·ÃÎÊijһipµØÖ·£¬»òÕßÒ²¿ÉÒÔÏÞÖÆ»¥ÁªÍøÓû§·ÃÎʸöÈËÓû§ºÍ·þÎñÆ÷ÖÕ¶Ë£¬ÔÚ²»ÁªÍøµÄÇé¿öÏÂÊÇûÓÐʲôÓô¦µÄ£»¶øhipsϵͳ·À»ðǽ¾ÍÊÇÏÞÖÆÖîÈça½ø³Ìµ÷ÓÃb½ø³Ì£¬»òÕß½ûÖ¹¸ü¸Ä»òÕßÌí¼Ó×¢²á±íÎļþ--´ò¸ö±È·½Ëµ£¬Ò²¾ÍÊǵ±Ä³½ø³Ì»òÕß³ÌÐòÊÔͼ͵͵ÔËÐеÄʱºò×ÜÊÇ»áµ÷ÓÃϵͳµÄһЩÆäËûµÄ×ÊÔ´£¬Õâ¸öÐÐΪ¾Í»á±»hips¼ì²âµ½È»ºóµ¯³ö¾¯¸æÑ¯ÎÊÓû§ÊÇ·ñÔÊÐíÔËÐУ¬Óû§¸ù¾Ý×Ô¼ºµÄ¾ÑéÀ´ÅжϸÃÐÐΪÊÇ·ñÕýÈ·°²È«£¬ÊÇÔò·ÅÐÐÔÊÐíÔËÐУ¬·ñ¾Í²»Ê¹Ö®ÔËÐУ¬Ò»°ãÀ´Ëµ£¬ÔÚÓû§ÓµÓÐ×ã¹»½ø³ÌÏà¹Ø·½ÃæÖªÊ¶µÄÇé¿öÏ£¬×°ÉÏÒ»¸öhipsÈí¼þÄܷdz£ÓÐЧµÄ·ÀֹľÂí»òÕß²¡¶¾µÄ͵͵ÔËÐУ¬ÕâÑù¶ÔÓÚ¸öÈËÓû§À´Ëµ£¬Öж¾²åÂíµÄ¿ÉÄÜÐԾͻù±¾ÉϺܵͺܵÍÁË.µ«ÊÇ£¬Ö»ÊÇ×°ÉϸöhipsÒ²²»ÊÇ×ȫµÄ£¬±Ï¾¹--Óû§´©ÉϵÄÖ»ÊǸöȫ͸Ã÷·Àµ¯ÒÂÒ²»¹ÊǻᱻijЩ±ðÓÐÓÃÐĵÄÈË͵¿úÈ¥Óû§µÄ¸öÈËÒþ˽µÄ£¬ËùÒÔ£¬Ñ¡ÓÃÒ»¿î¹¦ÄÜÇ¿´ó¶øÐ¡ÇɵķÀ»ðǽҲÊǺÜÖØÒªµÄ--ÆðÂëÓзÀÖ¹DDOS¹¥»÷ºÍ·ÀarpÆÛƹ¥»÷¹¦ÄÜ(¶ÔÄÚÍøÓû§ÓÈÎªÖØÒª)£¡ ¡¡¡¡ÉÏÃæÊǶÔhipsºÍ·À»ðǽ×÷¸öÇø±ð£¬ÒòΪɱÈíºÍÕâÁ½ÀàÈí¼þ²î±ð±È½Ï´ó£¬¾Í²»Äõ½ÕâÀïÀ´ËµÁË£¬ÏÂÃæÎÒ¾ßÌå½éÉÜÒ»ÏÂhipsÒÔ¼°³£¼ûµÄ¼¸¿îhips°²È«Èí¼þ£¬Ï£Íû¶Ô¸÷λÓÐËùñÔÒæ£¡ ¡¡¡¡ÎÒÃǸöÈËÓõÄHIPS¿ÉÒÔ·ÖΪ3D£º ¡¡¡¡AD(Application Defend)Ó¦ÓóÌÐò·ÀÓùÌåϵ ¡¡¡¡RD(Registry Defend)×¢²á±í·ÀÓùÌåϵ ¡¡¡¡FD(File Defend)Îļþ·ÀÓùÌåϵ ¡¡¡¡Ëüͨ¹ý¿É¶¨ÖƵĹæÔò¶Ô±¾µØµÄÔËÐгÌÐò¡¢×¢²á±íµÄ¶Áд²Ù×÷¡¢ÒÔ¼°Îļþ¶Áд²Ù×÷½øÐÐÅжϲ¢ÔÊÐí»ò½ûÖ¹¡£ ¡¡¡¡³£ÓõÄHIPSÈí¼þÓУº¹úÍâµÄSNS(Safe'n'Sec Personal)--AD+FD+RD£¬SSM(System Safety Monitor)£¬PG(ProcessGuardºÍPort Explorer)--AD+RD£¬GSS(Ghost Security Suite)--AD+RD£¬SS(SafeSystem 2006)--FD. ¡¡¡¡ÆäʵÎÒ¾õµÃÕâЩhipsÈí¼þÔÚ¹¦ÄÜÉÏÒ²´ó¶à²î²»¶à£¬¸ü¶àµÄÎÒÃÇÆäʵҲ¾ÍÊDZȽÏÒ»ÏÂ˵ÄÉúÃüÁ¦¸üÍçÇ¿(²»ÈÝÒ×±»ÆäËû½ø³Ì¸Éµô)£¬Ë¸üÊʺϹúÈËËùÐ裬˸ü¼òµ¥ÒײÙ×÷£¬ÏÂÃæÎÒ¾ÍÕâЩ·½Ãæ×ö¸öÏà¶Ô±È½Ï¼òµ¥µÄ½éÉܰɣ¡ ¡¡¡¡Ê×ÏÈÊÇSSM(System Safety Monitor)--ÒòΪÎұȽÏϲ»¶Õâ¿î£º ÉÌÒµ°æÃâ·Ñ°æ ×¢²á±í¼àÊÓ£º ¸ß¼¶ »ù±¾¹ý³Ì¼àÊÓ£º ¸ß¼¶ »ù±¾µ×²ã´ÅÅÌ·ÃÎÊ¿ØÖÆ£ºÓÐ Î޵ײã¼üÅÌ·ÃÎÊ¿ØÖÆ£º ÓÐ ÎÞ NT·þÎñ¼àÊÓ£º ¸ß¼¶ »ù±¾ IEÉèÖøú×Ù£º¸ß¼¶ »ù±¾Óû§³ÌÐòÓѺöԻ°£º ÓÐ ÎÞÓÅÏÈÖ§³Ö£º ¸ß µÍ¿ª·¢ÓÅÏÈ£º ¸ß µÍ Win9xÖ§³Ö£º ÎÞ ÓÐ ¡¡¡¡SSMÔÚÉùÓþÉÏÃæÊÇÏ൱²»´íµÄ£¬¶øÇÒÒ²Ïà¶ÔºÜÎȶ¨--ËäÈ»Äܱ»ICEword¸Éµô£¬²»¹ýÆäËûµÄhipsÀàºÃÏñÒ²¶¼ÊÇÄܱ»¸ÉµôµÄ£¬Õâ¸ö²»ÊÇÖØµã£¬ÒòΪÔÚ±ùÈÐÒª¸ÉµôËûÃÇ֮ǰ£¬hipsÈí¼þÒѾ»á±¨¾¯Ñ¯ÎÊÊÇ·ñÔÊÐí¸ÃÏî²Ù×÷£¬ËäȻ˵ȷÁ˸öFD¹¦ÄÜ£¬²»¹ýÎÒ¾õµÃ¶Ô¸öÈËÓû§À´ËµÒѾÏ൱×ã¹»£¬ÆðÂëÎÒÒѾÓаëÄêʱ¼äδÖж¾²åÂíÁË--µ±È»£¬Èç¹ûÄ㻹ÊDz»·ÅÐÄ£¬ÔÙ×°ÉϸöSS²¹×ã3D¹¦ÄÜÒ²ÊÇ¿ÉÒԵģ¬×î¹Ø¼üµÄÊÇSSMÉÌÒµ°æÒѾ±»³É¹¦ÆÆ½âÁË(¸ÃÈí¼þÓмòÌåÖÐÎİæ)£¬Î¨Ò»¾õµÃ²»Ë¬µÄ¿ÉÄܾÍÊÇÔçÆÚʹÓñȽϷ±Ëö£¬±Ï¾¹Ê²Ã´¶«Î÷µÄÔËÐж¼ÒªÑ¡ÔñÔÊÐí»¹ÊǽûÖ¹Ò²ÊÇÒ»¼þÍ·ÌÛÊ£¬ËùÒÔÒ»°ãÔÚ¸Õ×°ÉϵÄʱºò£¬ÎÒ¸öÈ˽¨Ò黹ÊÇÏÈÈ«²¿ÔËÐÐÒ»±éËùÓеÄÄãÒª¾³£Óõ½µÄ¶«Î÷¾Í¿ÉÒÔÁË£¬Õ¼ÓÃ×ÊÔ´Ò²»¹¿ÉÒÔ£¬Ò»°ãÊÇÒ»¸ö½ø³Ì10M×óÓÒ£¬cpu»ù±¾Ã»¸Ð¾õ.ÎÒ¸øSSM´ò90·Ö ¡¡¡¡Æä´ÎÊÇSNS(Safe'n'Sec Personal)--ËûÊÇΨһ3DµÄŶ£¬Ëü½¨Á¢ÔÚÐÐΪ·ÖÎöµÄ»ù´¡ÉÏ£¬ÓÐ×îÏȽøµÄÔ¤ÏÈÕì²éϵͳ£¬¿ÉÒÔ·ÀÖ¹²¡¶¾ÉøÍ¸¼ÆËã»ú£¬ÆÆ»µÐÅÏ¢£¬¶Ô¼ÆËã»ú¶àÁËÒ»²ã±£»¤£¬ÔÚ¼ÆËã»ú±£»¤·½ÃæÊµÏÖÖØ´óÍ»ÆÆ¡£Í¬Ê±£¬¿ìËÙ°²×°£¬Ò×ÓÚ²Ù×÷µÄ½çÃæ£¬ºÍ·´²¡¶¾Èí¼þºÍ¸öÈË·À»ðǽ¼«ºÃµÄ¼æÈÝÐÔ£¬ÖÇÄܵľö²ß¼¼Êõ£¬×îÇ¿µÄ±£»¤ºÍ¶ÔϵͳÔËÐеÄ×îСӰÏìµÈÌØµã¸üÔö¼ÓÁËSafe'n'secµÄ÷ÈÁ¦--º¹£¬Õâ¸öÊǹٷ½½éÉÜ£¬ÎÒ×Ô¼º¾õµÃÊÇÏ൱µÄÅ£ÁË£¬²»¹ýÎÒ×Ô¼º»¹Ã»ÓÐÓùý--ÕâÊÇȫӢÎİ汾ӢÓïÌ«²Ë£¬¶øÇÒûÓÐÆÆ½â(רҵ¼ÓÃܹ«Ë¾³öÆ·£¬ÏëÆÆ½âÄѶȺôóµÄ)£¬ÔÚÍøÉÏ¿´¹ý²âÆÀ£¬¾Ý˵ÊDZÈGSS+SS»¹ÒªÅ£µÄ.ÎÒ¸øSNS´ò95·ÖÔÙÏÂÀ´¾ÍÊÇGSS(Ghost Security Suite)£¬ÆäʵÓõÄʱ¼ä²¢²»ÊǺܳ¤£¬¿ÉÄÜûÓжà´ó·¢ÑÔȨ£¬²»¹ýÎÒ¸öÈ˲»ÊǺÜϲ»¶Õâ¿î£¬ÒòÎªÃ²ËÆ²»Ì«Îȶ¨£¬ÔÚÔËÐдóÐÍÓÎÏ·µÄʱºò£¬ËƺõCPUÈÝÒ×ìÉý£¬Õâ¸ö²»ÉÙÈËÈç´Ë£¬²»ÖªµÀÊDz»ÊÇ´ËÈí¼þ±¾À´¾ÍÊÇÈç´Ë£¬µ«ÊÇGSS»¹ÊÇÏ൱²»´íµÄ--¼òµ¥Ã÷ÁË£¬ÓÐ×Ô¼ºµÄ²Ù×÷ģʽ£¬²»ÈçSSMÀ´µÄϸÖ·±Ëö£¬µ«ÊÇÒ²ÊÇÏ൱°²È«£¬ÌرðÊÇÔÚÅäºÏSSʹÓÃÖ®ÏÂ.²»¹ý×ˬµÄÊÇÈÝÒ×±»ÈÎÎñ¹ÜÀíÆ÷¸Éµô£¬Îһ裬¶øÇÒ³¤Ê±¼äûÓиüÐÂÁË£¬²»ÖªµÀ¸ãʲô£¡²»¹ý»°Ëµ»ØÀ´£¬ÏÖÔÚÍøÂ·¹ã·ºÁ÷´«µÄGSSÑǶûµÏÆÆ½â°æ»¹ÊǺܲ»´íµÄ.ÎÒ¸øGSS´ò88·Ö£¬GSS+SS´ò92·Ö ¡¡¡¡×îºó¼òµ¥ËµÏÂPGºÍSS£¬SS¹æÔòÍêÉÆµ«²»¹»Îȶ¨£¬PG¼òµ¥Îȶ¨£¬´óÖÂÉÏPG¸Ð¾õºÍSSMÒÔ¼°GSS²î²»¶à£¬¾Í¿´Óû§¸öÈËϲºÃÁË~~~ ¡¡¡¡×îºó»¹ÌáÒ»¿îhipsÈí¼þ--Winpooch(ÒòΪûÓÐÓùý£¬ËùÒÔ¾ÍÖ»ÄܽèÓñðÈ˵ϰÀ´ËµÁË)£¬Ïà¶ÔGSS¶øÑÔ£¬ÎÞÒÉ£¬GSSµÄÎȶ¨ÐÔ±ÈWinpoochÂÔÇ¿£¬µ«ÊÇGSSµÄ¹æÔòÌí¼Óµ½500Ìõ×óÓÒµÄʱºò¾Í»á±äµÃºÜÂý£¬¶øÇÒGSSÖ»ÄÜ¼à¿Ø×¢²á±í£¬µ«ÊÇ£¬Winpooch²»Ö»¿ÉÒÔ¼à¿Ø×¢²á±í£¬»¹¿ÉÒÔ¼à¿ØÎļþµÄ¶ÁÈ¡¡¢Ð´È룬»¹¿ÉÒÔ¼à¿ØÍøÂçÁ¬½Ó£¬¶øÇÒĿǰWinpoochÒѾÓÐ600¶àÌõ¹æÔòÁË£¬¶ÔϵͳµÄÓ°Ï컹ÊǺÜС£¬Èí¼þÍÆ¼ö¸øÄãÁË£¬ºÃ²»ºÃÓû¹µÃÄã×Ô¼º²âÊÔ²Å×îʵ¼Ê¡£ Ò»¡¢ ¹ØÓÚHipsµÄ»ù±¾¸ÅÄî. HIPS£º Host Intrusion Prevent System Ö÷»úÈëÇÖ·ÀÓùϵͳ¡£HIPSÊÇÒ»ÖÖÄÜ¼à¿ØÄãµçÄÔÖÐÎļþµÄÔËÐкÍÎļþÔËÓÃÁËÆäËûµÄÎļþÒÔ¼°Îļþ¶Ô×¢²á±íµÄÐ޸쬲¢ÏòÄ㱨¸æÇëÇóÔÊÐíµÄµÄÈí¼þ¡£Èç¹ûÄã×èÖ¹ÁË£¬ÄÇôËü½«ÎÞ·¨ÔËÐлòÕ߸ü¸Ä¡£±ÈÈçÄãË«»÷ÁËÒ»¸ö²¡¶¾³ÌÐò£¬HIPSÈí¼þÌø³öÀ´±¨¸æ¶øÄã×èÖ¹ÁË£¬ÄÇô²¡¶¾»¹ÊÇûÓÐÔËÐеġ£ÒýÓÃÒ»¾ä»°£º¡±²¡¶¾ÌìÌì±äÖÖÌìÌì³öУ¬Ê¹µÃɱÈí¿ÉÄܸú²»Éϲ¡¶¾µÄ½Å²½£¬¶øHIPSÄܽâ¾öÕâЩÎÊÌâ¡£¡±¡£ HIPSÊÇÒÔºóϵͳ°²È«·¢Õ¹µÄÒ»ÖÖÇ÷ÊÆ£¬Ö»ÒªÄãÓÐ×ã¹»µÄרҵˮƽ£¬Äã¿ÉÒÔÖ»ÓÃHIPS¶ø²»Ðèɱ¶¾Èí¼þ¡£µ«ÊÇHIPS²¢²»ÄܳÆÎª·À»ðǽ£¬×î¶àÖ»ÄܽÐ×öϵͳ·À»ðǽ£¬Ëü²»ÄÜ×èÖ¹ÍøÂçÉÏÆäËû¼ÆËã»ú¶ÔÄã¼ÆËã»úµÄ¹¥»÷ÐÐΪ¡£ ÒòΪ²¡¶¾ÌìÌì±äÖÖÌìÌì³öУ¬Ê¹µÃɱÈí¿ÉÄܸú²»Éϲ¡¶¾µÄ½Å²½£¬¶øHIPSÄܽâ¾öÕâЩÎÊÌâ¡£
¶þ¡¢HIPSÔÀíÒÔ¼°ºÍɱ¶¾Èí¼þ¡¢·À»ðǽµÄÇø±ð.
ɱ¶¾Èí¼þ£º ¼ÆËã»ú²¡¶¾Ö¸µÄÊÇһЩ¾ßÓжñÒâ´úÂë¿ÉÄÜΣº¦¼ÆËã»úµÄ³ÌÐò¡£ ɱ¶¾Èí¼þ»ù±¾ÉÏÓ¦µ±¾ßÓÐÒÔÏÂÁ½¸ö»ù±¾¹¦ÄÜ£º 1£ºÉ±¶¾-- ¼´¶Ô´ø¶¾Îļþ»ò²¡¶¾±¾Éí½øÐвéɱµÄ¹¦ÄÜ¡£ 2£º¼à¿Ø-- Ò»°ã¾ßÓÐÎļþ¼à¿Ø£¬ÍøÒ³¼à¿Ø£¨¼´¼à¿ØÔ¶³Ì80/8080µÈ³£Óö˿ڣ©£¬Óʼþ¼à¿Ø£¨¼´¼à¿ØPOPºÍSMTP¶Ë¿Ú£©£¬µÈ¡£ Äܹ»É±¶¾·À¶¾µÄÊÇɱ¶¾Èí¼þ£¬²»ÊÇ·À»ðǽ¡£
·À»ðǽ£º ¼òµ¥µÄÀí½â£¬·À»ðǽÊǼÜÔÚÁ½¸ö»¥ÏàͨÐÅÖ÷»úÖ®¼äµÄÒ»¸öÆÁÕÏ£¬¶Ô·Ç·¨Êý¾Ý°ü½øÐйýÂË¡£ ÎÒÃÇʹÓõĶàÊý¸öÈË·À»ðǽ»ù±¾¾ßÓУº·ÀÖ¹·Ç·¨ÈëÇÖ£¨·ÀÖ¹ÄÚÁ¬£© Óë ·ÀÖ¹±¾µØ·Ç·¨ÍâÁ¬ µÄ¹¦ÄÜ£¬¶øSP2ϵͳ×Ô´øµÄǽûÓкóÕߵŦÄÜ¡£
»ùÓÚÕâÁ½µã£¬ÎÒÃÇ¿ÉÒÔ¼òµ¥Àí½â·À»ðǽµÄÁ½¸ö×÷Ó㺠1£ºÍ¨¹ý×èÖ¹·Ç·¨Êý¾Ý°ü£¬·ÀÖ¹ºÚ¿Íͨ¹ýijЩÊÖ¶ÎÈëÇÖ¡£ 2£º·ÀֹľÂí·¢ÉúÍâÁ¬µÁÈ¡±¾µØ»úÃÜÐÅÏ¢¡£¸öÈË·À»ðǽûÓÐɱľÂíµÄ¹¦ÄÜ£¬ËüËù×öµÄÊÇÔÚÖÐÁËľÂíÖ®ºó£¬Í¨¹ý¹æÔò½ûÖ¹ÆäÍâÁ¬ÒÔÃⶪʧÊý¾Ý¡£ ÏÖÔÚÓв»ÉÙ³§É̽«×Ô¼ºµÄɱÈíºÍ·À»ðǽ×ö³ÉÒ»¸öÍøÂç·À»¤Ìåϵ£¬±ÈÈ磺KIS£¨¿¨°Í£© NIS£¨Åµ¶Ù£© MIS£¨¿§·È£©µÈ¡£¡£¡£
HIPS£ºHost Intrusion Prevent System Ö÷»úÈëÇÖ·ÀÓùϵͳ Ëùνhips£¨Ö÷»úÈëÇÖ·ÀÓùÌåϵ£©£¬Ò༴ϵͳ·À»ðǽ¡£ËüÓбðÓÚ´«Í³ÒâÒåÉϵÄÍøÂç·À»ðǽ£¨nips£©¡£¶þÕßµ«Ö÷񻂿±ðÊÇ£º´«Í³µÄnipsÍøÂç·ÀÖ»ÓÐÔÚÄãʹÓÃÍøÂçµÄʱºò£¬Í¨¹ýÌØ¶¨µÄ tcp/ipÐÒéÀ´ÏÞ¶¨Óû§·ÃÎÊijһipµØÖ·,»òÕßÒ²¿ÉÒÔÏÞÖÆ»¥ÁªÍøÓû§·ÃÎʸöÈËÓû§ºÍ·þÎñÆ÷ÖÕ¶Ë£»¶øhipsÊÇÏÞÖÆ½ø³Ìµ÷,»òÕß½ûÖ¹¸ü¸Ä»òÕßÌí¼Ó×¢²á±íÎļþ¡£µ±Ä³½ø³Ì»òÕß³ÌÐòÊÔͼ͵͵ÔËÐÐʱ£¬Õâ¸öÐÐΪ¾Í»á±»Ëùhips¼ì²â£¬È»ºóµ¯³ö¾¯¸æ£¬Ñ¯ÎÊÓû§ÊÇ·ñÔÊÐíÔËÐС£Ò»°ãÀ´Ëµ,ÔÚÓû§ÓµÓÐ×ã¹»½ø³ÌÏà¹Ø·½ÃæÖªÊ¶µÄÇé¿öÏÂ,×°ÉÏÒ»¸öhipsÈí¼þÄܷdz£ÓÐЧµÄ·ÀֹľÂí»òÕß²¡¶¾µÄ͵͵ÔËÐУ¬ÒÔ·ÀÖж¾¡¢²åÂíµÄ¿ÉÄÜÐÔ¡£ ±ÈÈ翨°Í£¬¿§·ÈµÈÒ²¾ß±¸ÓÐһЩhipsµÄ¹¦ÄÜ,µ«¹¦ÄÜÉϱȲ»ÁËרҵµÄhipsÈí¼þ.
Èý¡¢ HIPS¹¦ÄܵÄÀà±ð HIPS¹¦ÄܵÄÀà±ð¿ÉÒÔ·ÖΪ3D£º 1.AD(Application Defend)Ó¦ÓóÌÐò·ÀÓùÌåϵ¡¢ 2.RD(Registry Defend)×¢²á±í·ÀÓùÌåϵ¡¢ 3.FD(File Defend)Îļþ·ÀÓùÌåϵ¡£ Ëüͨ¹ý¿É¶¨ÖƵĹæÔò¶Ô±¾µØµÄÔËÐгÌÐò¡¢×¢²á±íµÄ¶Áд²Ù×÷¡¢ÒÔ¼°Îļþ¶Áд²Ù×÷½øÐÐÅжϲ¢ÔÊÐí»ò½ûÖ¹¡£ ĿǰÔÚÓÐЩɱÈí»ò·À»ðǽÖУ¬Ò²º¬HIPS¹¦ÄÜ¡£
ËÄ¡¢ HipsÈí¼þµÄ´óÈ« 1£®Tiny Firewall (ÍøÂç·À»ðǽ)£¬ http://www.tinysoftware.com ¹¦ÄÜ£ºAD+RD+FD, 2£®Safe'n'Sec (¼ò³ÆSNS»òϬţ)£¬ http://www.safensoft.com/ ¹¦ÄÜ£ºAD+FD+RD, 3£®SystemSafeMonitor(¼ò³ÆSSM), http://syssafety.com/ ¹¦ÄÜ£º:AD+RD 4£®SafeSystem (¼ò³Æss) £¬ http://www.gemiscorp.com/english/main.html ¹¦ÄÜ£ºSS(SafeSystem 2006)--FD 5£®GhostSecuritySuite£¨¼ò³ÆGSS£©£¬http://www.ghostsecurity.com ¹¦ÄÜ£ºAD+RD 6£®ProcessGuard(¼ò³ÆPG), http://www.diamondcs.com.au/processguard/ ¹¦ÄÜ£ºAD+RD 7£® Winpooch £¬http://sourceforge.net/projects/winpooch ¹¦ÄÜ£ºÒ»ÌõÖÒʵµÄ¡°¿´¼Ò¹·¡±, ʹÓÃapi hook¼¼Êõ,¿ÉÒÔ¶Ô¼¸ºõËùÓеĿÉÒɲÙ×÷½øÐÐ¼à¿Ø¡¢±¨¸æ»ò×èÖ¹¡£ 8. Parador File Protection PE http://www.e-securion.com/ ¹¦ÄÜ£ºFD 9. EQSecure for System, http://www.eqsecure.com ¹¦ÄÜ£º AD+FD+RD, Ò»¿î¹ú²úHIPSÈí¼þ. 10. ProSecurity£¬ http://www.proactive-hips.com/ ¹¦ÄÜ:FD+RD£¬×÷ÕßÊÇÖйúÈË 11. Privacyware Dynamic Security Agent - http://www.privacyware.com 12. ANTIHOOK °Ä´óÀûÑǵÄPD£¬http://www.infoprocess.com.au/AntiHook.php 13. Arovax ShiedÃÀ¹úµÄ£¬http://www.arovaxshield.com/download.php 14. Malware Sweeper Pro£¬http://www.malwaresweeper.com/ 15. Core Force£¬http://force.coresecurity.com/index.php?module=base&page=download 16 . Watcher£¬http://www.donationcoders.com/kubicle/watcher/ 17. DefenseWall £¬ http://www.softsphere.com/ 18. BufferZone SAE/Home/Pro £¬ http://www.trustware.com/ 19. GreenBorder £¬ http://greenborder.com/ 20. Virtual Sandbox £¬http://www.fortresgrand.com/products/vsb/vsb.htm 21. VELite £¬ http://www.secureol.com/ 22. SandBoxie £¬ http://sandboxie.com/ 23. RunSafe £¬ http://www.runsafe.com/ 24. 1-Defender £¬ http://amustsoft.com/1-defender/ 25. All-Seeing-Eyes £¬ http://www.fortego.com/ase 26. GesWall £¬ http://www.gentlesecurity.com/ 27. winpatrol£¬
|
|
|
Submitted
by ¶àÇéÀË×Ó on 2007, March 10, 3:22 PM |
«
ÉÏһƪ
|
ÏÂһƪ
»
Ìí¼ÓÆÀÂÛ
|
|
|