论文部分内容阅读
信息革命在改变人类传统的生产、生活方式并极大促进生产力发展的同时,也带来了不容忽视的负面影响。网络和主机的安全正成为每一个计算机用户都面临的紧迫问题。为了解决这些问题,一系列的网络安全技术应运而生。榕基软件在 RJ-iTop 榕基网络隐患扫描系统中最早提出分布式扫描技术,并且根据用户的不同需求不断完善。目前,榕基网络隐患扫描系列产品共有四款:增强型、手持式、机架式和软件式。其中前三款均合理设计运用了分布式扫描技术。榕基网络隐患扫描系统手持式产品能够充分发挥自身可移动的优势,能够很好的适应分布式网络扫描。我们可以将手
The information revolution has brought negative impacts that can not be neglected while changing the traditional production and lifestyles of mankind and greatly boosting the development of productive forces. Network and host security are becoming pressing issues for every computer user. In order to solve these problems, a series of network security technologies came into being. Yung-based software in the RJ-iTop Yung-based network scanning system hidden threats first proposed distributed scanning technology, and according to the different needs of users continue to improve. At present, Yung-based network of hidden scanning products a total of four: enhanced, handheld, rack and software. The first three models are designed and implemented using distributed scanning technology. Yung-based network vulnerability scanning system handheld products can give full play to their own mobile advantages, can be well adapted to distributed network scanning. We can hand