|
Otherwise, users will leave. Any community that you are about to enter needs to be conscious of putting the user community first. GIG is looking for people who can build a good is good team! GIG is currently looking for motivated colleagues who want to grow while learning together!GIG holds study sessions on various themes every month, and they are currently being held online to prevent the spread of coronavirus infection. This time, we had Mr. Wada, a server-side engineer in the creative division, speak on the theme of "security measures." This study session was held in a metaverse space called " Hubs by Mozilla "!
The avatars that each person created watched the study session, which was a unique experience that everyone had a blast with! ■Speaker profile Noriyuki Wada Server side engineer After graduating from a technical school in Shizuoka, he worked on projects at an IT company Special Data as an SIer. After that, he gained experience as a web service manager and joined GIG as a server-side engineer in February 2018. What is a port number? Wada: First, let's talk about port numbers. Port numbers are numbers that specify the entry and exit points of a service. What can be done with each port number is determined globally. For example, number 21 allows you to send and receive files, but anything else is rejected by the server. When connecting to the server, you can connect via SSH using port 22.
![](https://cxbdirectory.com/wp-content/uploads/2024/03/Special-Data-300x191.png)
Although SSH is encrypted, there are still concerns regarding security. This is because port number 22 is open, so anyone can access it. Therefore, we thought, ``It would be better to create a system that allows port 22 to be opened, but only certain people can access it.'' So we created another system that acts as an administrator, and we created a system called the ``Springboard Server.'' What is a springboard server? Wada: If you go through a stepping stone, there will be a history of who accessed where. If you can access the web server directly without going through a stepping stone, it will be difficult to track the logs and it will be difficult to identify the attack.
|
|