The geographical distribution of the potential threat based on the collected blocked IP addresses from file hosts.deny

Authors

  • Jacek Wołoszyn Uniwersytet Techno0logiczno-Humanistyczny

DOI:

https://doi.org/10.15584/di2016.11.21

Keywords:

system security, firewall, identification, encryption

Abstract

Server solutions based on systems Linux boxes allow to block remote access to their resources by typing the IP address into the /etc/hosts.deny file. This is an effective method of blocking a particularly onerous customers whose intentions are vague. This article is an example of the conversion of obtained IP addresses to related geographical locations to obtain the geographical distribution of potential danger

Published

2016-12-15

How to Cite

Wołoszyn, J. (2016). The geographical distribution of the potential threat based on the collected blocked IP addresses from file hosts.deny. DIDACTICS OF INFORMATION TECHNOLOGY, 11, 161–166. https://doi.org/10.15584/di2016.11.21

Issue

Section

ICT TOOLS IN PRACTICE