Thursday, October 14, 2010

Waterproof Wall - terminology to explain



In the field of computer security, firewall and waterproof walls are a very similar name. Firewall is installed in different networks (such as a trusted internal network and the untrusted public network) or network security domain combinations between the number of components. It can monitor, limit, change the data flow across the firewall, as far as possible within the network on the external screen of information, structure and operating conditions, in order to achieve network security. Logically, a firewall is a separator, a limiter, is a parser to effectively monitor the internal network and the Internet between any activities to ensure that the internal network security.

As a result, we know that a firewall to prevent external network through the isolation of the internal network to attack, it passively inspect all network packets flow through to block the communication security policy violations. Firewalls are based on the work of a basic assumption: it is located inside and outside the network access point, and there is no other bypass external gateway is based on this assumption, the firewall within the network became the protector. But, obviously, for internal security, the firewall can do nothing.

Waterproof wall thus came into being, and the traditional firewall concept is completely different, waterproof wall design to prevent leakage of internal information like water. The birth of a firewall is to prevent outside intrusion. It is a monitoring system within the network, at the internal network, at any time monitor the security situation within the host. If the fire is to prevent the spread of external threats to internal, then water is the means to prevent the leakage of internal information. Visible, waterproof wall is a network monitoring system within this very image of a call.

Simple waterproof wall by the probe and the monitoring center. In general, which consists of three structures: high-level user interface layer, real-time updates based within the network topology to provide system configuration, policy configuration, real-time monitoring, audit reports, security alarm and other functions; low-level modules layer, the distribution of the probe in the composition of each host; middle layer of the security services, real-time information collected from the lower to the senior report or alarm, and record the whole system of audit information, to prepare for queries or generate reports.

Waterproof wall generally has the following major functions: information leakage prevention, to prevent the internal network host, network, storage media, printers and other media, intentionally or unintentionally Kuosan local confidential information; system user management system records the user login information for the provide the basis for future safety audits; system resources, security management, limited hardware and software installation, uninstall, control the operation of a specific procedure to restrict the system into Safe Mode, rename the control file and delete operations; real-time health monitoring system, through the Intranet real-time capture and record screen host, to monitor internal security personnel to deter malicious insiders, and after the issue of security and provide the basis of its source, when necessary, can also be involved in direct control security of the host I / O devices such as keyboard, mouse, etc.; information security audit, network security audit record information, and provide the host within the network usage, security event analysis report.

In summary, the water wall is a firewall, virtual private networks, intrusion detection systems and other safety equipment, security services provided by an effective complement. On the overall security system, it is also an integral part. Although information security products, including encryption, antivirus, firewall, anti-electromagnetic radiation, platform systems, electronic authentication, vulnerability scanning, intrusion detection, identification authentication, physical security protection system and other ten series, but these products can only be part of the solution , not the whole problem.

According to international authorities CSI / FBI statistical data provided, and aggressive behavior in many cases, the most important time is the most secure information leakage; attacks were mainly from within, not from outside hackers. Well, there is no readily available information technology or products can block the leakage of the tap it? Waterproof wall system, such a system is adopted.

Waterproof wall system is composed of Internet access security control, computer control port security, procedures, use of safety control, safety control file copy, CD burner safety control, file and print security control, illegal invasion of security control, security control hardware resources, operating behavior management, remote surveillance, immunization and virus hackers trojan from a centralized management platform.







Recommended links:



Zhou Hongyi 1 billion investment is not money, is lonely



Only store is not ENOUGH



Remodeling "value Stream"



Ten New Media Future And Destiny Of The Four Buildings Television ___



Business Storage



Toyota Authorized Dealer



Call Of UPS Power Pollution



DVR-MS To MPEG



Catalogs Office Suites And Tools



Harbin Engineering University, the world's five major classification societies in hand



HAL.DLL damaged the problems caused by Ubuntu not boot



Second-hand computers Xi'an China Merchants Plaza, more than 60 illegal businesses operating wit



MKV To Xbox 360



Storage Hobby



apple ipod touch iphone PRICES down sharply



QuickTime to MPEG



Wednesday, October 6, 2010

Tissot wave through the "Dakar"


Recently, the wave Tissot server always seems linked with the sport. August, Tissot wave machine chess battle in China over human masters Union, draw was the first person of Chinese chess Xu Yinchuan, steal the show. Residual sound unfinished war machine, September 12, Peng Zhen, general manager of another wave of server Oracle and Intel jointly announced in Beijing the first wave of Tissot worldwide, China's first international database system through a credible certification.

The International Business from the Oracle software and hardware providers such as the application according to the user, test experience and developed by some extreme conditions out of authentication system, as certified stringent and the industry known as "server Dakar Rally," said. From the man-machine war to the "Dakar Rally", the wave shows its aggressive side. As we all know, sports arena, beyond the self, and tap the potential of every player's goal, but "higher, faster, stronger" is the essence of sports competition. Similarly, the wave Tissot completed this series of challenges, the eyes are also more clearly on the high-end server market contention. "We hope that through the public display of the high tide of Tissot capacity and high reliability, rapid expansion of Tissot in the high-end business applications market for key applications." Peng Zhen said.

"Dakar" test

It was learned that the credibility of the international database system is Oracle certified in mid-June this year released the latest test specifications, all known Oracle Linux Validated Configurations (hereinafter referred to as VC certification). The certification includes three aspects: Single, RAC, Destructive testing, hardware compatibility, software and hardware functionality and overall performance cluster system such as a full range of tests on the server. The certification test the reliability of high-performance server constitutes a serious challenge.

Prestigious Dakar Rally began in 1979, 17 races last year, 11,052 km trip. Car must still frozen by the French, through the Mediterranean and the Atlas Mountains, the Sahara Desert and then challenge the death. Throughout the process, drivers must go through sand, desert, mud, road, grassland, farmland and other hard sections, the magnitude of the game far more than any other.

So on what basis VC certification is also known as the "Dakar Rally" it. It is understood, VC certification is the most outstanding feature of the limit on the server test. Including the application of this ultimate test limits and physical limits of both. In the application of limit testing to maximize the large amount of calculation and processing tasks on high-performance server stress test; and physical limits, the simulation will be no power, network and other extreme conditions to test the server.

Specifically, in the man-machine war, the wave Tissot assessment of 10 trillion chess game, in the processing unit area of 10 GB per second of switching capacity, 300 million to complete complex queries. But this showdown is verified Tissot wave in computing power and data capacity of the rapid exchange of the level. Certification in VC, Peng Zhen to a set of data: in 3 days 脳 24 hours of ERP use case testing, wave Tissot handled 200G total production, financial management data. Such a large data size, the utilization rate of the subsystem modules are pushed all the time to rise to the limit: I / O load up to 80%, CPU load 70%, 90% memory load. These figures show that, VC certification, all computing systems are beyond the scope of normal operations, the verge of system collapse.

In addition to the operation of overload, is even more surprising, VC certification also repeatedly put a man on a server or parts of the "destroy" behavior, such as hard disk out, computing unit, storage network or communications network failure, etc., further verify the platform's rapid recovery and availability.

Faced with this ordeal, wave Tissot performance then? According to the wave of mine Hu Jun, director of server technology introduced not only the wave of the successful completion of all tests, and runs very good condition. Data, Tissot system average response time under 3 seconds. "Even in the 10 instances of destructive testing, Tissot still be up against." Lei Jun Hu further stressed. Oracle China Development Center senior research manager Miss Wang Xiruo also expressed appreciation for the wave of Tissot's performance: "Wave Tissot Oracle database through credible certification, which proves the power of the wave of high-performance servers and reliability."

On the other hand, in addition to the challenges of extreme performance, VC certification also covers the key high-end server applications in various fields. It is understood that the wave of Tissot ERP applications in business, commercial CRM applications, telecommunications GPRS applications, VoIP applications, business consulting subsystem, the electronic post office, Meta Forum, health insurance and other fields have the test, and pass smoothly. "Needless to say on the performance of Tissot, one look at the first wave is the only one to be invited to participate in certification by the domestic manufacturers will be able to explain a lot of problems." In this regard, private chat after the wave of the server when the general manager of Peng Zhen said.

Wave of the dream

"For the players, the Dakar is a challenge; for people who did not participate in, Dakar is a dream." This is the founder of the Dakar Rally on the Dakar, the French driver Zelisabin Rally interpretation, Peng Zhen was also used to express feelings through the VC certification. At this point, the wave of Tissot, for Peng Zhen, the "Dakar" has been conquered, waves of people's dreams back to the most fundamental areas.

"Development of high-end server has been our dream wave of people." Peng Zhen in his toast to repeat the words again. As Peng Zhen said, Tissot from the release wave will begin eyeing the business computing. The major challenge for business computing in the financial, telecommunications, taxation, public security and so the demand for super-server. On the one hand, they demand higher computing power; the other hand, also requires ability to provide uninterrupted service. This requires that used in the financial, telecommunications, business and other fields not only need high server capacity, but also to provide uninterrupted for its support. Second pause, or any services, the time delay, will bring a decline in customer satisfaction or money losses.

In the Chinese market, the traditional high-end server market has been dominated by international brands, domestic enterprises to international brand recognition even to the extent of superstition. IT procurement popular among people with this sentence: "to buy international brand, something wrong with the server issues; buy domestic brand, break down is the responsibility of procurement officers." Undeniably, the international brand in the high-end server market did walk in the front, then wave of people's dream but also * how to achieve it?

Down to earth, challenge the limit, the pursuit of recognition, this is the wave of Hu Lei Jun person is given by way of a dream. In order to meet customer demand, the wave Tissot constantly to prove himself in various ways. If the Competition on Huashan Mountain-style man-machine war wave of Tissot demonstrated superior computing power, high-end technology to its success the brand image, then through the VC certification wave Tissot industrial users to demonstrate the reliability of the wave of Tissot and credibility.

In this regard, Hu said Lei Jun, the high-end server market is a circle, in order to enter this circle, must make their own brand. After many tests, however, is a brand and a lot of cases of temper come. "We will try a variety of certification, further challenges and that the wave of Tissot's abilities, but more important is to do some of the more solid the truth, and customers closer to the application of the application, with the actual wave that Tissot fully capable among the high-end server market. "

In fact, the wave has been achieved in many sectors of our key applications. For example during the 2003 college entrance examination, because SARS cases, need to build a strong network of consulting platform, Tissot is the entrance counseling network platform strong backing. In the past two weeks during the 24-hour operation to meet the needs of nearly 10 million visit the candidates, past candidates to avoid the application consultation process with a dense chaotic scenes to ensure that the extraordinary period of social stability. In addition, the wave of Tissot in the treasury system, the social security system, tax system, e-government, weather and many other key areas of outstanding performance.

Certification through the Human World War and the VC test, wave Tissot has been demonstrated to enter the high-end server market overall technical strength. However, we must not only overcome international brands in the technology, but also in the market to win, this journey in terms of the wave Tissot is another, "the Dakar Rally." But you can see, in the Chinese business computing market, has burst on the scene towering wave of Tissot, the high-performance development strategies are also being gradually emerge. In response, the wave of Senior Vice President Wang Endong does not mince words: "As the banner of high performance computing research, wave Tissot accumulated over the years has been to the overall development of the time."



"Development of high-end server is the wave of people dream of." Peng Zhen, general manager of the wave of the server says

Link

Wave Tissot Server Events

November 2002, the wave start "Tissot works."

April 2003, the official release wave wave-based "flexible deployment of" design concept of the Tissot family of high-performance servers.

May 2004, the tide Tissot to 56180phH (composite queries per hour capacity) before the break and breaking maintained by the IBM Global Business Intelligence in the computing world records (TPC-H).

September 2004, Tissot to become the world's first wave of high-speed Internet technology-based international certification through the OCE high-performance server products in China.

December 2004, wave and BEA cooperation in SPECjAppServer2002 tests, the results again 1638.97TOPS broke 1574TOPS previously created by the HP commercial transaction processing (SPEC) world record.

March 2005, the tide Tissot awarded with the "second prize of national science and technology."

By the end of 2005, Ministry of wave Tissot was "important invention of Information Industry" award.

August 2006, Tissot wave of the "wave Cup" China's first man-machine chess battle and defeat the five Chinese Chess Master League, and with "the first person of Chinese chess," Xu Yinchuan war and.

September 2006, the tide Tissot company passed the Oracle database system credible international certification (Oracle VC), a global first, China's first certified by the server vendor.






相关链接:



AVI to MPEG4



Cursors And Fonts INTRODUCTION



Easy to use Health And Nutrition



e-cology in the Pan Micro Series 15



3GP to MPEG



CEO? Does not change the financial style, the class!



Graphical MODELING AutoCAD2000 Football



RUP anti-pattern



[Other] PROJECT2000 thematic knowledge (3)



MP4 To WMP



Vehicles - Screen Savers Infomation



Do Not Let Your Single Into A Disturbance With



Using Visual Basic's TIMER control



Work with the reliable replica watches supplier



EVALUATE Screen Capture



HTML 5 in change?



How far are we from lean Manufacturing?