Discuz! Board

 找回密碼
 立即註冊
搜索
熱搜: 活動 交友 discuz
查看: 16|回復: 0

The actual video looks like this

[複製鏈接]

1

主題

1

帖子

5

積分

新手上路

Rank: 1

積分
5
發表於 2024-3-4 12:40:21 | 顯示全部樓層 |閱讀模式
Otherwise, users will leave. Any community that you are about to enter needs to be conscious of putting the user community first. GIG is looking for people who can build a good is good team! GIG is currently looking for motivated colleagues who want to grow while learning together!GIG holds study sessions on various themes every month, and they are currently being held online to prevent the spread of coronavirus infection. This time, we had Mr. Wada, a server-side engineer in the creative division, speak on the theme of "security measures." This study session was held in a metaverse space called " Hubs by Mozilla "!

The avatars that each person created watched the study session, which was a unique experience that everyone had a blast with! ■Speaker profile Noriyuki Wada Server side engineer After graduating from a technical school in Shizuoka, he worked on projects at an IT company Special Data as an SIer. After that, he gained experience as a web service manager and joined GIG as a server-side engineer in February 2018. What is a port number? Wada: First, let's talk about port numbers. Port numbers are numbers that specify the entry and exit points of a service. What can be done with each port number is determined globally. For example, number 21 allows you to send and receive files, but anything else is rejected by the server. When connecting to the server, you can connect via SSH using port 22.





Although SSH is encrypted, there are still concerns regarding security. This is because port number 22 is open, so anyone can access it. Therefore, we thought, ``It would be better to create a system that allows port 22 to be opened, but only certain people can access it.'' So we created another system that acts as an administrator, and we created a system called the ``Springboard Server.'' What is a springboard server? Wada: If you go through a stepping stone, there will be a history of who accessed where. If you can access the web server directly without going through a stepping stone, it will be difficult to track the logs and it will be difficult to identify the attack.

回復

使用道具 舉報

您需要登錄後才可以回帖 登錄 | 立即註冊

本版積分規則

Archiver|手機版|自動贊助|GameHost抗攻擊論壇

GMT+8, 2025-2-7 15:03 , Processed in 0.112292 second(s), 18 queries .

抗攻擊 by GameHost X3.4

© 2001-2017 Comsenz Inc.

快速回復 返回頂部 返回列表
一粒米 | 中興米 | 論壇美工 | 設計 抗ddos | 天堂私服 | ddos | ddos | 防ddos | 防禦ddos | 防ddos主機 | 天堂美工 | 設計 防ddos主機 | 抗ddos主機 | 抗ddos | 抗ddos主機 | 抗攻擊論壇 | 天堂自動贊助 | 免費論壇 | 天堂私服 | 天堂123 | 台南清潔 | 天堂 | 天堂私服 | 免費論壇申請 | 抗ddos | 虛擬主機 | 實體主機 | vps | 網域註冊 | 抗攻擊遊戲主機 | ddos |