Saturday, June 4, 2011

Vulnerability Scanning

Definition: usually refers to based on the vulnerability database, through the scanning methods, to specified distance or local computer system security vulnerability testing, found a kind of exploitable vulnerabilities safety testing (penetration against) behavior.
Vulnerability scanning is on your computer to perform comprehensive scanning, check your current system is flawed and if a loophole is in need of repair, otherwise once the computer is very vulnerable to network by computer hackers or injure the hole remote control so the consequences would be catastrophic for the protection, so the vulnerability scanning computer and Internet security is indispensable, and need every week on a scan and a but found a loophole will immediately repair, some loopholes system itself can repair, while others need to manually repair.
Vulnerability scanning results
Vulnerability scanning results are divided into: 1 recommend 2 optional 3 wouldn't recommend it.
1. Recommended: says system has existence of loopholes, need to install a patch to repair for computer security is very important, therefore recommend patch, as soon as possible for installation.
2. Optional: said about their computer of the selective repair, to this kind of patch, everybody should be in on the computer is fully understand its own situation, come again for selective repair.
3. Do not recommend: says if repair these patches, may cause the system problems such as blue, unable to start, so for these loopholes, I suggest you do not repair, lest cause greater computer trouble-shooting. Of course these loopholes and is often not have too big for computer damage.
Website scanning loopholes
As with system could website loopholes in, also need timely scan to found the general scan website time cycle is long, so usually adopts website platform to scan, billion web security detection platform thought for such a scanning tools. 

No comments:

Post a Comment