【正文】
ad to all the purpose of the machine by the network administrator set up and manage to focus, it will work with the operating system and other security is closely linked to bee a part of network security management, and automatically provide the best network virus defensive measures. When the puter virus online resources applications attack, such as the virus exists in the informationsharing network of media, it is necessary to the security at the gateway, on the network frontend for antivirus. 2, network firewall technology Is a kind of used to strengthen the network access control to prevent the external network users to illegal means to enter the external network through the internal network, access internal network resources and protect the internal network operating environment special for Network Interconnection Devices. It is between two or more networks such as packet transmission link in accordance with a certain degree of security strategy to implement the inspection, to determine whether the network munication between are allowed to, and monitor the network running. Although the firewall is to protect the network from an effective means of hacking, but there are obviously inadequate: through the firewall can not protect against outside attack other means, can not prevent defectors from the inside and inadvertent threats posed by users, but also can not pletely prevent the transmission of the virus have been infected with the software or documents, and can not protect against datadriven attacks. 3, security encryption technology Encryption technology for the global emerce to provide a guarantee, so that Internetbased electronic trading system has bee possible, thus improving the symmetric encryption and asymmetric encryption technology is still the mainstream of the 21st century. Symmetric encryption to the conventional passwordbased technology, puting encryption and decryption operations use the same key. Asymmetric encryption, encryption key that is different from the decryption key, encryption keys are made public, anyone can use, only the decryption key to decrypt people know. 4, the network host op