The geographical distribution of the potential threat based on the collected blocked IP addresses from file hosts.deny
DOI:
https://doi.org/10.15584/di2016.11.21Keywords:
system security, firewall, identification, encryptionAbstract
Server solutions based on systems Linux boxes allow to block remote access to their resources by typing the IP address into the /etc/hosts.deny file. This is an effective method of blocking a particularly onerous customers whose intentions are vague. This article is an example of the conversion of obtained IP addresses to related geographical locations to obtain the geographical distribution of potential dangerDownloads
Downloads
Published
2016-12-02
How to Cite
Wołoszyn, J. (2016). The geographical distribution of the potential threat based on the collected blocked IP addresses from file hosts.deny. DIDACTICS OF INFORMATION TECHNOLOGY, 11, 161–166. https://doi.org/10.15584/di2016.11.21
Issue
Section
ICT TOOLS IN PRACTICE
License
Copyright (c) 2016 DIDACTICS OF INFORMATION TECHNOLOGY

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.