The need for behavior management school network Present, China's largest colleges in various forms of network access methods are implemented and the Internet connection, virtually put a full of wisdom and temptations of the world stretching in front of teachers and students opened. The use of campus networks there are the following: First of all, the Internet has many reactionary propaganda speech, pornography, terrorist violence and feudal superstitions site. As the interests of the people drive many highly toxic, especially young people thought the content on the Internet have emerged, in this case, the Internet not only can not bring civilization and progress, it will bring evil and defeat. As the young people not mature thinking, coupled with the lack of discretion, it is easy to go astray. Campus bulletin boards, message boards, chat rooms and other interactive part is the problem-prone areas. How to prevent users of these improper online behavior, track and record each user's online records, it has become the campus network should be an essential function. Once a problem is often not done because of the history of the Internet can not be pursued, to the school brought a lot of unnecessary trouble. Functional Description Prime bright software "God of the police network," Construction of the campus network monitoring solution (HC Network with map) 1) logging: detailed records of Internet browsing log, post log, chat log, etc.. 2) access control: restrict chat, limit Internet traffic, limit time spent online; Web filtering, URL filtering, keyword filtering, port filtering, content filtering, posting, U disk and monitor stock control software, disable the application process . 3) check function: online log check, posting records of inquiries, chats, queries, send and receive e-mail query, the system operator inquiries. 4) Statistical features: statistics traffic statistics internet time, visit the website of Statistics the number of statistical local area network resources. 5) virtual identity collection features: You can capture the process by monitoring the computer used the Internet Email account, forum account, blog account, MSN, QQ and many other virtual identity number, and can be related to the true identity Multi-level management components: 1) the definition of illegal information: higher authorities can be defined as the illegal information and instructions issued to the subordinate directed LAN monitoring server, the server will lower the unconditional implementation of the illegal information filtering. The definition of illegal information can be illegal website (URL), domain names, IP addresses, it can be illegal, keywords, etc.. 2) pass the data back function: the lower control server performs superior's orders under the management server, and will meet the requirements of the information back to the parent management server, stored in upper management server's database. 3) set the alarm or block: for all the illegal information, you can set the alarm or blocking mode. Set to alarm mode, does not affect the online behavior online staff, but all acts of illegal information online will automatically report to upper management server; set to block mode, not only all the acts of illegal information online all the reports to upper management server, and will promptly block the online behavior. 4) back function: upper management server can check its subsidiary LAN computer access logs, statistics subordinate LAN network traffic and network resources. 5) sub-control centers: local area network of any one computer can monitor the server on the remote control, you can remotely set up, remote querying. Remotely operate the server with the same convenience. Beijing Guangming Software Prime Technology Co., Ltd. is a professional software development, software production, Web site operators, e-commerce technology companies, located in the national software industry base, the national software export bases of Zhongguancun Software Park, is a software park a shining star, the member units of China Software Association, the Beijing Science and Technology Commission finds that high-tech enterprises, two soft enterprise. The company has an innovative, pioneering spirit of the high-quality combat team, with the domestic first-class software development technology and engineering technology. Provide customers with the best solutions and professional services. Company: Guangming Software Technology Co., Ltd. Beijing Golden Age Headquarters Address: Haidian District, Beijing Zhongguancun Software Park, No. 1105, Block 3B Shandong Base: High-tech Development Zone, Shandong Jinyu Road, Jining City, 54 URL: www.ssgm.net Unified sales and service toll-free hotline :400-6789-518 We are high quality suppliers, our products such as core driller , water drilling rigs for oversee buyer. To know more, please visits radial drilling machine.
Related Articles -
core driller, water drilling rigs,
|