百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

Network and Port Scanning is An Offence

by Annie Yu

Scanning the University network or the ports on the network is a normal exercise carried out by any network administrator. However, if it is performed without prior approval, it is considered as an offence. It will be disastrous if such activities are adopted by hackers who will make use of the University or external facilities to search for vulnerable systems within the University network or other sites as break-in targets. In fact, a number of incidents had occurred in the past whereby complaints had been received from other Internet sites. In one particular case, the children of a University staff had engaged in similar activities using the staff's PC. Although some of these cases were not intentional, nevertheless, they posed serious threats to the University network as well as the privacy of others, which immediately prompted the Information Systems Advisory Committee to take actions.

In mid February 2000, the network/port scanning policy was established and enforced by the Computing Services Centre (CSC) to take disciplinary actions if 'unusual' or 'unauthorised' network or port scanning on either the University network or sites outside the University has been detected. Depending on the type of users, the responsible parties are penalised accordingly:

  1. If a staff member is found performing unauthorised network and port scanning activities, for the first time, he/she will be warned and his/her department head will be informed. Further offences will be reported to the Human Resources Office for action.

  2. If a student is found performing unauthorised network or port scanning activities, for the first time, he/she will be either warned (by e-mail or in person) or his/her computer account(s) suspended for one week. His/her department will also be notified. On the second offence, his/her computer account will be suspended for a month. Further offences thereafter will be reported to the Student Disciplinary Committee for action.

  3. The network administer of a department is allowed to scan the systems within the department subject to the approval from the department head and prior notification in writing to the CSC.

Sad to say, after implementation of the network/port scanning policy, unauthorised scanning activities still exist especially in the modem pool. Gathered from the logged events detected by gateway routers maintained by the CSC, there were still students who violated the policy and were subsequently penalised for their actions. However, during the investigation, it was found that some scanning activities might have been performed by anonymous hackers using trojan horses such as NetBus and Back Orifice via compromised PCs of the students. Unfortunately, the students concerned were still liable to the outcome of such scanning activities since they are owners of the originating PCs. To avoid this situation from happening, it is important to bear the following in mind:

  1. Protect your account/password well and change your account password frequently

  2. Do not download/run unknown programs from the Internet

  3. Use updated personal firewall or equivalent programs to protect your PC

  4. Ask for help if you find that your PC behaves strangely

  5. Format your hard disk and re-install the system with care, if necessary or in doubt

  6. Refrain from lending your PC to others

In order to maintain a healthy computing environment, it is important that each and every one of us should follow the rules and policies set out by the University.

威尼斯人娱乐城老品牌值得您信赖lm0 | 百家乐d博彩论坛| 百家乐追注法| 998棋牌游戏下载| 试玩百家乐官网网| 百家乐最新庄闲投注法| 皇博| 八卦罗盘24山图| 大发888娱乐方下载| 巴黎人百家乐的玩法技巧和规则| 宣武区| 在线百家乐下注| 百家乐官网变牌器批发| 沈阳盛京棋牌官网| 24山是那二十四山| 贞丰县| 法拉利百家乐的玩法技巧和规则 | 百家乐看牌技巧| 全讯网3| 百家乐官网怎么才能包赢| 大发888娱乐城dknmwd| 百家乐官网网站程序| 金城百家乐买卖路| 澳门百家乐官网网址多少| 玩百家乐的高手| 喀什市| 网上百家乐是叫九五至尊么| 基础百家乐官网的玩法技巧和规则 | 百家乐乐百家娱乐场| 玩百家乐官网优博娱乐城| 百家乐具体怎么收费的| 圣淘沙百家乐官网的玩法技巧和规则 | 真人娱乐城| 新濠峰百家乐的玩法技巧和规则| 百家乐取胜秘笈| 龙虎| 做生意门口禁忌| 新利国际| 全讯网3344555| 澳门百家乐怎玩| 爱婴百家乐官网的玩法技巧和规则|