ashamoni56776 發表於 2024-3-4 12:40:21

The actual video looks like this

Otherwise, users will leave. Any community that you are about to enter needs to be conscious of putting the user community first. GIG is looking for people who can build a good is good team! GIG is currently looking for motivated colleagues who want to grow while learning together!GIG holds study sessions on various themes every month, and they are currently being held online to prevent the spread of coronavirus infection. This time, we had Mr. Wada, a server-side engineer in the creative division, speak on the theme of "security measures." This study session was held in a metaverse space called " Hubs by Mozilla "!

The avatars that each person created watched the study session, which was a unique experience that everyone had a blast with! ■Speaker profile Noriyuki Wada Server side engineer After graduating from a technical school in Shizuoka, he worked on projects at an IT company Special Data as an SIer. After that, he gained experience as a web service manager and joined GIG as a server-side engineer in February 2018. What is a port number? Wada: First, let's talk about port numbers. Port numbers are numbers that specify the entry and exit points of a service. What can be done with each port number is determined globally. For example, number 21 allows you to send and receive files, but anything else is rejected by the server. When connecting to the server, you can connect via SSH using port 22.

https://cxbdirectory.com/wp-content/uploads/2024/03/Special-Data-300x191.png



Although SSH is encrypted, there are still concerns regarding security. This is because port number 22 is open, so anyone can access it. Therefore, we thought, ``It would be better to create a system that allows port 22 to be opened, but only certain people can access it.'' So we created another system that acts as an administrator, and we created a system called the ``Springboard Server.'' What is a springboard server? Wada: If you go through a stepping stone, there will be a history of who accessed where. If you can access the web server directly without going through a stepping stone, it will be difficult to track the logs and it will be difficult to identify the attack.

頁: [1]
查看完整版本: The actual video looks like this

一粒米 | 中興米 | 論壇美工 | 設計 抗ddos | 天堂私服 | ddos | ddos | 防ddos | 防禦ddos | 防ddos主機 | 天堂美工 | 設計 防ddos主機 | 抗ddos主機 | 抗ddos | 抗ddos主機 | 抗攻擊論壇 | 天堂自動贊助 | 免費論壇 | 天堂私服 | 天堂123 | 台南清潔 | 天堂 | 天堂私服 | 免費論壇申請 | 抗ddos | 虛擬主機 | 實體主機 | vps | 網域註冊 | 抗攻擊遊戲主機 | ddos |