The geographical distribution of the potential threat based on the collected blocked IP addresses from file hosts.deny
DOI:
https://doi.org/10.15584/di2016.11.21Keywords:
system security, firewall, identification, encryptionAbstract
Server solutions based on systems Linux boxes allow to block remote access to their resources by typing the IP address into the /etc/hosts.deny file. This is an effective method of blocking a particularly onerous customers whose intentions are vague. This article is an example of the conversion of obtained IP addresses to related geographical locations to obtain the geographical distribution of potential dangerDownloads
Published
2016-12-15
How to Cite
Wołoszyn, J. (2016). The geographical distribution of the potential threat based on the collected blocked IP addresses from file hosts.deny. DIDACTICS OF INFORMATION TECHNOLOGY, 11, 161–166. https://doi.org/10.15584/di2016.11.21
Issue
Section
ICT TOOLS IN PRACTICE