摘要:
The present invention is related to a method for neutralizing a malicious ARP spoofing attack generated in a local network and in particular, the present invention provides a method for neutralizing an ARP spoofing attack comprising a step for detecting an ARP spoofing attack based on an ARP request packet generated for an ARP spoofing attack; a step for generating a plurality of counterfeit MAC addresses and dynamically changing MAC addresses of network devices or servers which are to be protected whenever an ARP spoofing attack is generated; and a step for neutralizing an ARP spoofing attack by using a counterfeit MAC address which is capable of neutralizing an ARP spoofing attack adequately.
摘要:
A lens optical system including, in a sequence from an object to an imaging device on which an image of the object is formed; a first lens having a a positive refractive power; a second lens having negative refractive power; a third lens having a a positive refractive power; and a fourth lens having a negative refractive power and an incident surface facing the object is concave and an exit surface facing the imaging device has an inflection point.
摘要:
A lens optical system having first to fourth lenses sequentially arranged from an object, and between the object and an image sensor on which an image of the object is formed. The first lens has a positive refractive power and is convex toward the object. The second lens has a negative refractive power and is biconcave. The third lens has a positive refractive power and is convex toward the image sensor. The fourth lens has a negative refractive power and at least one of an incident surface and an exit surface of the fourth lens is an aspherical surface. An aperture may be arranged between the first and second lenses.
摘要:
A lens optical system having first to fourth lenses sequentially arranged from an object, and between the object and an image sensor on which an image of the object is formed. The first lens has a positive refractive power and is convex toward the object. The second lens has a negative refractive power and is biconcave. The third lens has a positive refractive power and is convex toward the image sensor. The fourth lens has a negative refractive power and at least one of an incident surface and an exit surface of the fourth lens is an aspherical surface. An aperture may be arranged between the first and second lenses.
摘要:
The present invention provides a method consisting of a step for analyzing a traffic receiving mirroring, a step for judging whether NAT (Network Address Translation) use of a client configuring and using a private network as well as a provided authorized IP (an Internet IP) is allowed or not, for analyzing and detecting the number of sharing terminals, a step for creating a database using data, and a step for formulating a policy by using information in database, so that when the users of a private network connect to Internet at the same time, permission or blocking of Internet use can be executed selectively.
摘要:
A lens optical system including first, second, third, fourth, and fifth lenses that are sequentially arranged between an object and an image sensor on which an image of the object is formed. The first lens may have a positive refractive power and may be biconvex. The second lens may have a negative refractive power and may have a meniscus shape that is convex toward the object. The third lens may have a positive refractive power. The fourth lens may have a positive refractive power and may have a meniscus shape that is convex toward the image sensor. The fifth lens may have a negative refractive power, and at least one of an incident surface and an exit surface of the fifth lens may be an aspherical surface.
摘要:
A lens optical system including first, second, third, fourth, and fifth lenses sequentially arranged between an object and an image sensor on which an image of the object is formed, in order from a side of the object. The first lens has a positive (+) refractive power and is biconvex. The second lens has a negative (−) refractive power and a meniscus shape convex toward the object. The third lens has a negative (−) refractive power. The fourth lens has a positive (+) refractive power and a meniscus shape convex toward the image sensor. The fifth lens has a negative (−) refractive power, and at least one of an incident surface and an exit surface of the fifth lens is an aspherical surface. A focal length f1 of the first lens and a total length TL of the lens optical system satisfies inequality: 0.5
摘要:
The present invention is related to a method for neutralizing a malicious ARP spoofing attack generated in a local network and in particular, the present invention provides a method for neutralizing an ARP spoofing attack comprising a step for detecting an ARP spoofing attack based on an ARP request packet generated for an ARP spoofing attack; a step for generating a plurality of counterfeit MAC addresses and dynamically changing MAC addresses of network devices or servers which are to be protected whenever an ARP spoofing attack is generated; and a step for neutralizing an ARP spoofing attack by using a counterfeit MAC address which is capable of neutralizing an ARP spoofing attack adequately.
摘要:
A lens optical system including, in a sequence from an object to an imaging device on which an image of the object is formed; a first lens having a a positive refractive power; a second lens having negative refractive power; a third lens having a a positive refractive power; and a fourth lens having a negative refractive power and an incident surface facing the object is concave and an exit surface facing the imaging device has an inflection point.
摘要:
The present invention relates to a method of implementing a security system for preemptively preventing a decrease in work efficiency due to leaked confidential secrets or the browsing of non work-related sites through a mobile terminal. A security manager implements an environment for allowing, blocking, or recording Internet usage in an independent mobile communication network in an area requiring security, uses a security system server to preregister information on mobile terminals of users who are expected to use the Internet, makes agreements on how personal information will be handled when outside visitors visit the network, registers information on mobile terminals of outside visitors with the security system server, and oversees the installation of a security app whenever necessary.