tailieunhanh - GFI LANguard Network Security Scanner 8: Manual
Pretty Good Privacy (PGP) was developed during the same period as PEM, in the early 1990’s. PGP was originally designed for securing Internet mail. PGP shares most technical features, such as digital signatures and public-key based encryption, with PEM. Like PEMit uses a proprietary, non-MIME-compatible, message format [3]. However, later MIME-compatible variations have evolved [22]. PGP’s main difference from other proposals is its key management system. It does not use Certificates, but rather a proprietary syntax. Also, it uses a non-hierarchical certification model known as “web of trust”. We will not study PGP further, a good reference is [98], and an account of PGP History can be. | GFI LANguard Network Security Scanner 8 Manual By GFI Software http Email info@ Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical for any purpose without the express written permission of GFI SOFTWARE. LANguard is copyright of GFI SOFTWARE. 2000-2008 GFI SOFTWARE. All rights reserved. Version - Last updated March 27 2008 Contents 1. Introduction 1 Introduction to GFI LANguard Network Security How is this manual Key GFI LANguard . License 2. Installing GFI LANguard Network Security Scanner 9 System Firewall Installation Upgrading earlier versions of GFI LANguard Entering your license key after 3. Navigating the management console 15 Navigating the GFI LANguard . management 4. Getting started Performing an audit 17 Performing the first security Performing a security scan using default Configuring scan Scan Scan range Quick-start scans using currently logged on user Quick-start scans using alternative logon Quick start scans using SSH Private Quick-start scans using a null 5. Getting started Analyzing the security scan results 27 Scan Analyzing the summary scan results for the scanned Analyzing the target computer scan What to do after a scan. 30 Analyzing the detailed scan Detailed scan results Analyzing Reporting unauthorized devices as high security Detailed scan results Analyzing potential Detailed scan results Analyzing Handling
đang nạp các trang xem trước