【正文】
le, normal operation of network services without disruption. Computer and network technology has the plexity and diversity, makes puter and network security has bee a need to continue to update and improve the area. At present, hackers method has been more than the type of puter virus, and many attacks are fatal. In the Internet network, because the Internet does not have the time and geographical constraints, whenever there is a means to generate new attacks, we can in a week around the world, these attacks means the use of network and system vulnerabilities to attack puter systems and resulting in network paralysis. Worms, backdoor (Backdoors), Rootkits, DOS (DenialofServices) and Sniffer (network monitor) is a familiar means of several hacker attacks. However, none of these attacks means they reflect the astonishing power of today bee worse. These types of attacks means the new variant, with previous attacks appeared methods, more intelligent, targeted against Internetbased protocols and operating system level. From the Web process control procedures to the kernellevel Rootlets. Hackers practices escalating renovation, to the user39。 prevent In the information age, information can help groups or individuals so that they benefit from, the same information can also be used to pose a threat to them, caused damage. Therefore network security, including the position of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious destruction of the attacks, network security not only the technical aspects, but also management issues, both plement each other, are indispensable. First, the concept of puter network security International Organization for Standardization of puter security is defined as: To establish a data processing system and the adoption of technology and management of security protection, the protection of puter hardware, software, data is not due to accidental and malicious destruction of reasons, change and leakage. The above definition of puter security includes physical security and logical security of both the contents of the con