Linux network access control method and device
A technology of network access control and network access, which is applied in the field of Linux network access control, can solve problems such as uncontrollability, and achieve the effect of improving flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] figure 1 It is a flow chart of the Linux network access control method in one embodiment, such as figure 1 The Linux network access control method in the shown embodiment includes:
[0040] Step S100, receiving a running command of the application program, and obtaining the identification of the application program.
[0041] Specifically, the identification of the application program refers to a mark used to distinguish different application programs, or a mark for distinguishing characteristics of different application programs, including any one of program category, name, and version number of the application program.
[0042] Step S200, loading preset hijacking function library and dynamic library.
[0043] Specifically, the preset hijacking function library includes open series functions, close functions, create series functions, read functions, write functions, socket operation series functions (socket, listen, bind, connect, send, recieve, etc.), kill function ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


