wi-fi共享大師免廣告_如何保護Wi-Fi網絡免受入侵

wi-fi共享大師免廣告

wi-fi共享大師免廣告

wifisecurityheader

Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior. Read on as we show you how to secure your home Wi-Fi network.

不安全的Wi-Fi是人們訪問您的家庭網絡,竊取您的Internet并通過更多惡意行為使您嚴重頭痛的最簡單方法。 請繼續閱讀,我們會向您展示如何保護家庭Wi-Fi網絡。

為什么要保護您的網絡? (Why Secure Your Network?)

In a perfect world you could leave your Wi-Fi networks wide open to share with any passing Wi-Fi starved travelers who desperately needed to check their email or lightly use your network. In reality leaving your Wi-Fi network open create unnecessary vulnerability wherein non-malicious users can sponge up lots of our bandwidth inadvertently and malicious users can pirate using our IP as cover, probe your network and potentially get access to your personal files, or even worse. What does even worse look like?? In the case of Matt Kostolnik it looks like a year of hell as your crazy neighbor, via your hacked Wi-Fi network, uploads child pornography in your name using your IP address and sends death threats to the Vice President of the United States. Mr. Kolstolnik was using crappy and outdated encryption with no other defensive measures in place; we can only imagine that a better understanding of Wi-Fi security and a little network monitoring would have saved him a huge headache.

在理想的環境中,您可以將Wi-Fi網絡保持開放狀態,以便與任何急需查看電子郵件或輕度使用您的網絡的過往Wi-Fi饑餓的旅行者共享。 實際上,讓您的Wi-Fi網絡保持開放狀態會造成不必要的漏洞,其中非惡意用戶可能會無意間吞噬我們的大量帶寬,惡意用戶可能會使用我們的IP進行盜版,探測您的網絡并有可能訪問您的個人文件,甚至更差。 更糟的是什么樣? 對于馬特·科斯托尼克(Matt Kostolnik)來說,當您瘋狂的鄰居通過被入侵的Wi-Fi網絡,使用您的IP地址以您的名義上傳兒童色情內容并將其發送給美國副總統的威脅時,看起來就像是一個地獄的一年。 Kolstolnik先生使用的是笨拙且過時的加密,沒有其他防御措施。 我們只能想象,對Wi-Fi安全性的更好了解以及對網絡的一點監控將使他免于頭痛。

保護您的Wi-Fi網絡 (Securing Your Wi-Fi Network)

2011-07-19_151252

Securing your Wi-Fi network is a multi-step affair. You need to weigh each step and decide if the increased security is worth the sometimes increased hassle accompanying the change. To help you weigh the benefits and drawbacks of each step we’ve divided them up into relative order of importance as well as highlighted the benefits, the drawbacks, and the tools or resources you can use to stress test your own security. Don’t rely on our word that something is useful; grab the available tools and try to kick down your own virtual door.

保護Wi-Fi網絡安全是一個多步驟的過程。 您需要權衡每一步,并確定增加安全性是否值得(有時伴隨變更而增加的麻煩)值得。 為了幫助您權衡每個步驟的利弊,我們將它們分為重要性的相對順序,并重點介紹了利弊,以及可用于壓力測試自己的安全性的工具或資源。 不要依靠我們的話說有用的東西; 抓住可用工具,然后嘗試打開自己的虛擬門。

Note: It would be impossible for us to include step-by-step instructions for every brand/model combination of routers out there. Check the brand and model number on your router and download the manual from the manufacturer’s website in order to most effectively follow our tips. If you have never accessed your router’s control panel or have forgotten how, now is the time to download the manual and give yourself a refresher.

注意:我們不可能為每個品牌/型號的路由器組合都提供分步說明。 檢查路由器上的品牌和型號,然后從制造商的網站下載手冊,以最有效地遵循我們的提示。 如果您從未訪問過路由器的控制面板,或者忘記了操作方法,那么現在該下載手冊并重溫一下自己了。

Update Your Router and Upgrade to Third Party Firmware If Possible: At minimum you need to visit the web site for the manufacture of your router and make sure there are no updates. Router software tends to be pretty stable and releases are usually few and far between. If your manufacturer has released an update (or several) since you purchased your router it’s definitely time to upgrade.

更新路由器并升級到第三方固件(如果可能) :至少您需要訪問制造路由器的網站,并確保沒有更新。 路由器軟件往往非常穩定,發布的版本通常很少。 如果您的制造商自購買路由器以來發布了一個(或多個)更新,那么絕對是時候進行升級了。

Even better, if you’re going to go through the hassle of updating, is to update to one of the awesome third-party router firmwares out there like DD-WRT or Tomato. You can check out our guides to installing DD-WRT here and Tomato here.? The third party firmwares unlock all sorts of great options including an easier and finer grain control over security features.

更好的是,如果您要經歷更新的麻煩,那就可以更新到其中一種出色的第三方路由器固件,例如DD-WRT或Tomato 。 您可以在此處查看有關安裝DD-WRT的指南,在此處查閱番茄的指南。 第三方固件可解鎖各種出色的選擇,包括對安全功能進行更輕松,更精細的控制。

The hassle factor for this modification is moderate. Anytime you flash the ROM on your router you risk bricking it. The risk is really small with third-party firmware and even smaller when using official firmware from your manufacturer. Once you’ve flashed everything the hassle factor is zero and you get to enjoy a new better, faster, and more customizable router.

此修改的麻煩因素是中等的。 每當您刷新路由器上的ROM時,您都有可能對其進行砌塊。 使用第三方固件的風險確實很小,而使用制造商提供的官方固件的風險則更小。 刷新所有內容后,麻煩因素為零,您將可以享用新的更好,更快,更可定制的路由器。

Change Your Router’s Password: Every router ships with a default login/password combination. The exact combination varies from model to model but it’s easy enough to look up the default that leaving it unchanged is just asking for trouble. Open Wi-Fi combined with the default password is essentially leaving your entire network wide open. You can check out default password lists here, here, and here.

更改路由器的密碼:每臺路由器都附帶默認的登錄名/密碼組合。 確切的組合因模型而異,但是可以很容易地查找默認值,即保持不變只是自找麻煩。 與默認密碼結合使用的開放式Wi-Fi本質上使整個網絡保持開放狀態。 您可以在此處,此處和此處簽出默認密碼列表。

The hassle factor for this modification is extremely low and it’s foolish not to do it.

修改的麻煩因素非常低,不這樣做是很愚蠢的。

2011-07-19_143620

Turn On and/or Upgrade Your Network Encryption: In the above example we gave, Mr. Kolstolnik had turned on the encryption for his router. He made the mistake of selecting WEP encryption, however, which is the lowest encryption on the Wi-Fi encryption totem pole. WEP is easy to crack using freely available tools such as WEPCrack and BackTrack. If you happened to read the entire article about Mr. Kolstolnik’s problems with his neighbors you’ll note that it took his neighbor two weeks, according to the authorities, to break the WEP encryption. That’s such a long span of time for such a simple task we have to assume that he also had to teach himself how to read and operate a computer too.

打開和/或升級您的網絡加密:在上面給出的示例中,Kolstolnik先生為其路由器打開了加密。 他選擇了WEP加密時犯了一個錯誤,這是Wi-Fi加密圖騰柱上最低的加密。 使用WEPCrack和BackTrack等免費工具可以輕松破解WEP。 如果您偶然閱讀了整篇有關Kolstolnik先生與鄰居的問題的文章,您會注意到,根據當局的說法,他的鄰居花了兩個星期才破解WEP加密。 對于這樣一個簡單的任務來說,這是很長的時間,我們必須假設他也必須自學如何閱讀和操作計算機。

Wi-Fi encryption comes in several flavors for home use such as WEP, WPA, and WPA2. In addition WPA/WPA2 can be further subdivided as WPA/WPA2 with TKIP (a 128-bit key is generated per packet) and AES (a different 128-bit encryption). If possible you want to use WP2 TKIP/AES as AES is not as widely adopted as TKIP. Allowing your router to use both will enable to use the superior encryption when available.

Wi-Fi加密具有多種家用用途,例如WEP , WPA和WPA2 。 此外,WPA / WPA2可以進一步細分為具有TKIP (每個數據包生成128位密鑰)和AES (不同的128位加密)的WPA / WPA2。 如果可能的話,您想使用WP2 TKIP / AES,因為AES沒有像TKIP那樣被廣泛采用。 如果允許路由器同時使用這兩種功能,則可以使用高級加密(如果可用)。

The only situation where upgrading the encryption of your Wi-Fi network may pose a problem is with legacy devices. If you have devices manufactured before 2006 it’s possible that, without firmware upgrades or perhaps not at all, they will be unable to access any network but an open or WEP encrypted network. We’ve phased out such electronics or hooked them up to the hard LAN via Ethernet (we’re looking at you original Xbox).

升級Wi-Fi網絡的加密可能會造成問題的唯一情況是舊設備。 如果您的設備在2006年之前制造,則可能沒有固件升級,或者根本沒有升級,則它們將無法訪問任何網絡,但不能訪問開放或WEP加密的網絡。 我們已經淘汰了此類電子設備,或者通過以太網將它們連接到了硬LAN(我們正在尋找原始的Xbox)。

The hassle factor for this modification is low and–unless you have a legacy Wi-Fi device you can’t live without–you won’t even notice the change.

進行此修改的麻煩性很低,并且-除非您擁有無法缺少的傳統Wi-Fi設備-您甚至都不會注意到這一變化。

Changing/Hiding Your SSID: Your router shipped with a default SSID; usually something simple like “Wireless” or the brand name like “Netgear”. There’s nothing wrong with leaving it set as the default. If you live in a densely populated area, however, it would make sense to change it to something different in order to distinguished it from the 8 “Linksys” SSIDs you see from your apartment. Don’t change it to anything that identifies you. Quite a few of our neighbors have unwisely changed their SSIDs to things like APT3A or 700ElmSt . A new SSID should make it easier for you to identify your router from the list and not easier for everyone in the neighborhood to do so.

更改/隱藏您的SSID :您的路由器附帶默認的SSID; 通常是簡單的“無線”或品牌名稱“ Netgear”。 將其設置為默認值沒有錯。 但是,如果您居住在人口稠密的地區,則可以將其更改為其他名稱,以區別于您在公寓中看到的8個“ Linksys” SSID。 請勿將其更改為可以識別您身份的任何內容。 我們的一些鄰居不明智地將其SSID更改為APT3A或700ElmSt之類的東西。 新的SSID應該更容易讓從列表中找到您的路由器,而不是更容易為大家在附近這樣做。

Don’t bother hiding your SSID. Not only does it provide no boost in security but it makes your devices work harder and burn more battery life. We debunked the hidden SSID myth here if you’re interested in doing more detailed reading. The short version is this: even if you “hide” your SSID it is still being broadcast and anyone using apps like inSSIDer or Kismet can see it.

不要麻煩隱藏您的SSID。 它不僅不能提高安全性,而且可以使您的設備更努力地工作,并消耗更長的電池壽命。 如果您有興趣進行更詳細的閱讀,我們在這里揭穿了隱藏的SSID神話。 簡短的版本是這樣的:即使您“隱藏” SSID,它仍在廣播,并且使用inSSIDer或Kismet之類的應用程序的任何人都可以看到它。

The hassle factor for this modification is low. All you’ll need to do is change your SSID once (if at all) to increase recognition in a router-dense environment.

此修改的麻煩因素很低。 您需要做的就是一次更改SSID(如果有的話),以在路由器密集的環境中提高識別度。

2011-07-19_143659

Filter Network Access by MAC Address:

通過MAC地址過濾網絡訪問

Media Access Control addresses, or MAC address for short, is a unique ID assigned to every network interface you’ll encounter. Everything you can hook up to your network has one: your XBOX 360, laptop, smartphone, iPad, printers, even the Ethernet cards in your desktop computers. The MAC address for devices is printed on a label affixed to it and/or on the box and documentation that came with the device. For mobile devices you can usually find the MAC address within the menu system (on the iPad, for example, it’s under the Settings –> General –> About menu and on Android phones you’ll find it Settings –> About Phone –> Status menu).

媒體訪問控制地址(簡稱MAC地址)是分配給您將遇到的每個網絡接口的唯一ID。 您可以連接到網絡的所有內容都有一個:XBOX 360,筆記本電腦,智能手機,iPad,打印機,甚至臺式計算機中的以太網卡。 設備的MAC地址印在其粘貼的標簽上和/或設備隨附的包裝盒和說明文件上。 對于移動設備,通常可以在菜單系統內找到MAC地址(例如,在iPad上,位于“設置”->“常規”->“關于”菜單下,而在Android手機上,則可以找到“設置”->“關于手機”->“狀態”菜單)。

One of the easiest ways to check the MAC addresses of your devices, besides simply reading the label on them, is to check out the MAC list on your router after you’ve upgraded your encryption and logged all your devices back in. If you’ve just changed your password you can be nearly certain the iPad you see attached to the Wi-Fi node is yours.

除了簡單地閱讀設備上的標簽外,檢查設備MAC地址的最簡單方法之一就是在升級加密并重新登錄所有設備后檢查路由器上的MAC列表。剛剛更改了密碼,您幾乎可以肯定看到連接到Wi-Fi節點的iPad是您的。

Once you have all the MAC addresses you can set up your router to filter based on them. Then it won’t be enough for a computer to be in range of the Wi-Fi node and have the password/break the encryption, the device intruding on the network will also need to have the MAC address of a device on your router’s whitelist.

擁有所有MAC地址后,您可以設置路由器以基于它們進行過濾。 這樣一來,只要計算機位于Wi-Fi節點的范圍內并擁有密碼/破壞加密是不夠的,侵入網絡的設備還需要將設備的MAC地址列入路由器的白名單中。

Although MAC filtering is a solid way to increase your security it is possible for somebody to sniff your Wi-Fi traffic and then spoof the MAC address of their device to match one on your network. Using tools like Wireshark, Ettercap, and Nmap as well as the aforementioned BackTrack. Changing the MAC address on a computer is simple. In Linux it’s two commands at the command prompt, with a Mac it’s just about as easy, and under Windows you can use a simple app to swap it like Etherchange or MAC Shift.

雖然MAC過濾是增加你的安全可能有人嗅您的Wi-Fi流量,然后欺騙他們的設備的MAC地址匹配一個網絡上的可靠的方法。 使用Wireshark , Ettercap和Nmap等工具以及上述BackTrack 。 在計算機上更改MAC地址很簡單。 在Linux中,命令提示符下有兩個命令,在Mac上則非常簡單,而在Windows下,您可以使用簡單的應用程序來交換它,例如Etherchange或MAC Shift 。

The hassle factor for this modification is moderate-to-high. If you use the same devices on your network over and over with little change up then it’s a small hassle to set up the initial filter. If you frequently have guests coming and going that want to hop on your network it’s a huge hassle to always be logging into your router and adding their MAC addresses or temporarily turning off the MAC filtering.

此修改的麻煩因素是中等到很高。 如果您一遍又一遍地在網絡上使用相同的設備而幾乎沒有變化,那么設置初始過濾器將很麻煩。 如果您經常有來來去去的來賓希望跳入網絡,那么總是登錄到路由器并添加其MAC地址或暫時關閉MAC過濾非常麻煩。

One last note before we leave MAC addresses: if you’re particularly paranoid or you suspect someone is messing around with your network you can run applications like AirSnare and Kismet to set up alerts for MACs outside your white list.

在我們離開MAC地址之前,請注意的最后一點是:如果您特別偏執狂,或者您懷疑有人在與您的網絡糾纏不清,則可以運行AirSnare和Kismet之類的應用來為白名單之外的MAC設置警報。

Adjust the Output Power of Your Router: This trick is usually only available if you’ve upgraded the firmware to a third party version. Custom firmware allows you to dial up or down the output of your router. If you’re using your router in a one bedroom apartment you can easily dial the power way down and still get a signal everywhere in the apartment. Conversely if the nearest house is 1000 feet away, you can crank the power up to enjoy Wi-Fi out in your hammock.

調整路由器的輸出功率:僅當將固件升級到第三方版本時,此技巧通常才可用。 自定義固件允許您向上或向下撥打路由器的輸出。 如果您在一間臥室的公寓中使用路由器,則可以輕松撥掉電源,仍然可以在公寓中的任何地方獲得信號。 相反,如果最近的房子在1000英尺外,您可以啟動電源以在吊床上享受Wi-Fi的服務。

The hassle factor for this modification is low; it’s a one time modification. If your router doesn’t support this kind of adjustment, don’t sweat it. Lowering the output power of your router is just a small step that makes it necessary for someone to be physically closer to your router to mess with it. With good encryption and the other tips we’ve shared, such a small tweak has a relatively small benefit.

此修改的麻煩因素很低; 這是一次修改。 如果您的路由器不支持這種調整,請不要費力。 降低路由器的輸出功率只是一小步,這使得必須有人在物理上更接近路由器才能將其弄亂。 通過良好的加密和我們分享的其他技巧,進行這樣的小調整將帶來相對較小的收益。



Once you’ve upgraded your router password and upgraded your encryption (let alone done anything else on this list) you’ve done 90% more than nearly every Wi-Fi network owner out there.

升級路由器密碼并升級加密功能(更不用說執行此列表上的其他任何操作)后,您完成的工作幾乎比幾乎每個Wi-Fi網絡所有者都要多90%。

Congratulations, you’ve hardened your network enough to make almost everyone else look like a better target! Have a tip, trick, or technique to share? Let’s hear about your Wi-Fi security methods in the comments.

恭喜,您已經加強了網絡,可以使幾乎所有其他人看起來像是更好的目標! 有技巧,竅門或技巧可以分享嗎? 讓我們在評論中了解您的Wi-Fi安全方法。

翻譯自: https://www.howtogeek.com/68403/how-to-secure-your-wi-fi-network-against-intrusion/

wi-fi共享大師免廣告

本文來自互聯網用戶投稿,該文觀點僅代表作者本人,不代表本站立場。本站僅提供信息存儲空間服務,不擁有所有權,不承擔相關法律責任。
如若轉載,請注明出處:http://www.pswp.cn/news/279040.shtml
繁體地址,請注明出處:http://hk.pswp.cn/news/279040.shtml
英文地址,請注明出處:http://en.pswp.cn/news/279040.shtml

如若內容造成侵權/違法違規/事實不符,請聯系多彩編程網進行投訴反饋email:809451989@qq.com,一經查實,立即刪除!

相關文章

MongoDb分片集群認證

本文主要基于已經搭建好的未認證集群,結合上篇Mongodb副本集分片集群模式環境部署(https://www.cnblogs.com/woxingwoxue/p/9875878.html), MongoDb分片集群認證幾個主要流程1.在分片集群環境中,副本集內成員之間需要用…

漢克爾變換matlab,HankelTransform

HankelTransform所屬分類:matlab例程開發工具:matlab文件大小:135KB下載次數:66上傳日期:2011-09-17 13:41:39上 傳 者:甜頭說明: Matlab Hankel變換源代碼,可以直接當做MATLAB too…

【材質】色彩基礎

RBG顏色空間 目前,絕大部分顯示器采用的是RGB顏色標準,因此幾乎所有軟件也采用此標準,UE4也不例外。 R、G、B這三個字母分別代表紅色(red)、綠色(green)、藍色(blue)三條…

使用mintty(_如何使用Mintty改善Cygwin控制臺

使用mintty(Cygwin’s great for getting some Linux command-line goodness in Windows, but using the Windows Shell to access it kills some of that magic. Using Mintty and a few other methods, you can make the experience much more luxurious. Cygwin非常適合在Wi…

18.phpmyadmin 4.8.1 遠程文件包含漏洞(CVE-2018-12613)

phpmyadmin 4.8.1 遠程文件包含漏洞(CVE-2018-12613) phpMyAdmin是一套開源的、基于Web的MySQL數據庫管理工具。其index.php中存在一處文件包含邏輯, 通過二次編碼即可繞過檢查,造成遠程文件包含漏洞。 受影響版本: phpMyAdmin 4.…

開源php面板,寶塔面板nginx安裝終于搞定了

server{listen 80;server_name lvyou.yssknet.com;index index.php index.html index.htm default.php default.htm default.html;root ***********/public;#SSL-START SSL相關配置,請勿刪除或修改下一行帶注釋的404規則#error_page 404/404.html;#SSL-END#ERROR-PA…

[Erlang 0004] Centos 源代碼編譯 安裝 Erlang

由于最終部署的生產環境是Centos,所以我需要在Centos中安裝Erlang B13R04 ,第一次做這件事情破費周折,主要是對Erlang依賴的庫不熟悉,總是編譯不過;這里梳理一下安裝過程中的細節: Erlang依賴哪些庫&#x…

關于“Python”的核心知識點整理大全38

14.1.1 創建 Button 類 由于Pygame沒有內置創建按鈕的方法,我們創建一個Button類,用于創建帶標簽的實心矩形。 你可以在游戲中使用這些代碼來創建任何按鈕。下面是Button類的第一部分,請將這個類保存為 文件button.py: button.py …

同步您的Google Chrome書簽,主題等

Do you regularly use Google Chrome on multiple computers? Here’s how you can keep almost everything in your browser synced easily in Google Chrome. 您是否經常在多臺計算機上使用Google Chrome? 您可以通過以下方法在Google Chrome瀏覽器中輕松同步瀏…

Python中函數的參數傳遞與可變長參數

轉自旭東的博客原文 Python中函數的參數傳遞與可變長參數 Python中傳遞參數有以下幾種類型: (1)像C一樣的默認缺省函數 (2)根據參數名傳參數 (3)可變長度參數 示例如下: &#xff08…

matlab的plot沒有反應,用plot畫圖沒有反應

本帖最后由 躺著看雨 于 2018-6-7 10:35 編輯0.0854232732222489 -1.47227270375083e-08 17.0844721322814 17.08465464444980.0854232767446789 -1.41282430199396e-08 17.0844728367686 17.08465534893580.0854232802671089 …

轉]MATLAB 與 C 語言的接口

MATLAB 到 C 語言程序的轉換可以由兩種途徑完成,其一是 MATLAB 自己提供的 C 語言翻譯程序 mcc, 另一種是原第 3 方公司 MathTools 開發的 MATCOM。后者出現較早,功能遠比 MATLAB 自己的翻譯程序強大,所以 MathTools 公司已經被 MathWorks 公…

找call寫call_如何將Google Call Widget添加到任何網頁

找call寫callAdding a Google Call Widget to your website or blog allows visitors to contact you using your Google Voice number. The widget provides an easy and cost-effective way to provide live customer support without the customer knowing your real number…

XML與web開發-01- 在頁面顯示和 XML DOM 解析

前言: 關于 xml 特點和基礎知識,可以菜鳥教程進行學習:http://www.runoob.com/xml/xml-tutorial.html 本系列筆記,主要介紹 xml 在 web 開發時需要了解的知識 XML 在頁面顯示數據 XML 指可擴展標記語言(eXtensible Mar…

酷安應用市場php源碼,酷安應用市場 v11.0.3-999 去廣告極限精簡版

酷安,真實有趣的數碼社區。酷安app,國內安卓應用市場客戶端,應用資源豐富,應用開發者水準高,應用無首發Logo,原汁原味上架,得到了安卓用戶群廣泛認可。有人說現在的酷安市場(酷安網)沒有以前那么…

再戰android-語音識別2(修改配置)

可怕的半桶水一直在晃。程序中需要根據用戶的選擇設置語音識別的語言(目前科大訊飛支持英文、普通話、粵語),不想每次要用戶去IatSetting中去改,需要能直接修改IatSetting的設置。之前移植的IatSetting頁面沒有細究,直…

chromebook刷機_如何將網站添加到您的Chromebook架子上

chromebook刷機Bookmarks are great to keep your favorite sites nearby, but they aren’t the fastest option out there. Instead, why not add shortcuts for your favorite websites right on the Chromebook shelf? 書簽可以很好地將您喜歡的網站保留在附近&#xff0c…

php判斷外鏈,php檢查字符串中是否有外鏈的方法

這篇文章主要介紹了php檢查字符串中是否有外鏈的方法,涉及php針對字符串的正則匹配的相關技巧,具有一定參考借鑒價值,需要的朋友可以參考下本文實例講述了php檢查字符串中是否有外鏈的方法。分享給大家供大家參考。具體實現方法如下:/*** is_external_link 檢測字符…

【經驗分享】產品、運營人如何告別重復的數據分析工作?

我是一名互聯網的運營打雜MM,除了每天繁忙的工作,每周、每月的數據匯報也是我頭疼的東東。因為本身我不聰明,數學也不是太好,對數據不那么愛,而且還要做數據分析,對于我這種數據小白分分鐘崩潰。每周、每月…

JVM虛擬機調參

JVM虛擬機調參 一、堆大小設置JVM 中最大堆大小有三方面限制:相關操作系統的數據模型(32-bt還是64-bit)限制;系統的可用虛擬內存限制;系統的可用物理內存限制。32位系統下,一般限制在1.5G~2G;64…