Читать книгу Integration of Cloud Computing with Internet of Things - Группа авторов - Страница 48

2.7.5 Mode of Camouflage

Оглавление

It’s critical that your firewall doesn’t actually obstruct attempts to access your laptop, but it doesn’t even appear like your laptop exists on the network. You are in what is known as concealment mode after square measuring connected to the web and your laptop can not be detected by samples on the laptop. Hackers will see how the computer is scanned with special expertise and the findings on the site. If you calculate in a cover-up mode, the firewall does not return this information, but appears to be connected. This information is not really connected. Thanks to this hacker your laptop does not continue to hit, because they believe that you are not online.

Integration of Cloud Computing with Internet of Things

Подняться наверх