-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
Switches in data link layer, by the purpose of the received data frames MAC address compared with its own address table to determine the data frame is forwarded to which port, only when the switch receives the broadcast frame or switch address table without the MAC address of the corresponding port, to get the frame to all ports broadcasting, in this way, Ethernet node is rarely receive departure for other nodes data frame,
CodePudding user response:
Arp deceptionIn addition, not all people using this model to get the data, you said as long as can guarantee flow that from me and leave, such as a password without wifi, does not necessarily need to take traffic, with trojans directly grasp the important information, such as direct bulk scanning IP based on vulnerability to invade others computer, or page to hang horses, software
CodePudding user response:
CodePudding user response:
Switches can be blackCodePudding user response:
Front of the Trojan horse in general, any security non-existing,Refer to
"The matrix" fully _ _ knowledge base blog garden
In the "the matrix" zion is a virtual world _ _ knowledge base blog garden
CodePudding user response:
Is ah, have what, there is no absolute safetyCodePudding user response:
Through the arp, all traffic from my walk, you can ignore the data link layer of the equipmentCodePudding user response:
Like some institutions included personal information, then resell, finally to hackers