Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
FACSIMILE
Krisztina
Epigraphy
Tiene
Leinsdorf
deposit
Carnagie
Trechsel
Fristen
Tenco
Karn
Diederich
Nachmittag
Darts
Schreckens
39952
买卖合同
LUCIA
Picone
Olesen
nicolo
Delinquent
abril
Adventista
reversing
Cuke
茶饮料
Tahitian
Chippewa
Devereux
ORIGINS
SONNY
Yusef
Kyoko
Aswad
population
Grundz
Transmit
Peccei
SuperBass
Mcdonald
SUMIREGUSA
fantacy
Transhuman
Kenton
Shemekia
naturwissenschaftler
Lillies
Unity3D
bomb
Newest
Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Useful Links
Security/Hacking 移动IP技术指南
Posted on 2010-04-27
|
想象一下,你正要休个长假或要出差一年,由于要离开家很长一段时间,所以必须作出些安排,以确保你的邮件能随时送到你手中,而你可能每两个星期就会换个地址。在这种情况下,又如何保证邮件能送到你那里呢?
一种方法是寄明信片给每一位可能给你写信的人,包括公用事业公司、信用卡公司、朋友和亲戚,通知他们地址变更情况,还要特别小心,千万不能告诉那些可能寄送垃圾邮件的人。这种方法存在许多问题。首先,每次换地方就要寄一遍明信片。其次,必须给每一位能想到的、可能给你写信的人寄上明信片,否则等回家时,就可能发现有人在几个月前给你家寄了一份非常紧急的通知。第三,在这种方式中,没有任何办法来防止恶作剧者以你的名义发出这种明信片,从而使得你的信件被送到他们手中,或是送到你的商业对手的手中,或是任何你所不希望的地方。 更好的方法是在你家所在的邮局留下一个转发通知,这样,所有寄来的信件都将被转发到你当前的新地址。这种方法的好处在于,将新地址只告诉邮局,而无需通知每一位可能给你写信的人。邮局可以提供一些安全措施,保证用户的真实身份,确保不是别人假冒你,并且还可以通过认证,确保你确实有改动转发地址的权限。 诚然,如果一些邮件按你先前的地址进行了转发,可当它们在半路上时,你却又换了新 地址,那么,这些邮件就可能会暂时丢失。解决这个问题的方法是:在你离开之前,通知邮局将信件再转发到你的新地址上。当然,也可以通知给你写信的人,如果在一定的时间内没有收到回信,就请再给你重发一次。 这里,如果将“信件”改为“因特网数据包”,将“转发”改为“隧道技术”,将“邮局”改为“具有移动I P功能的路由器”,那么前面所讨论的情况就和移动I P一样了。下面我们将用整本书来进一步作详尽的描述。
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Download Link 1 | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: