Hoé-piah
Tī chu-sìn ki-su̍t, hoé-piah (firewall) chí 1 khoán an-choân chong-tì ia̍h ke-si, thang kin-kù só͘-iú-chiá ê su-iàu lâi ún-chún, kū-choa̍t, ia̍h tāi-lí (proxy) chu-liāu ê sio-chiap. Hoé-piah it-poaⁿ hun nńg-thé--ê (an toà tiān-náu ê kì-tî lāi-bīn) kap ngē-thé--ê (an toà to̍k-li̍p ê chong-tì lāi-bīn). Hoé-piah ê ki-pún khang-khoè sī koán-chè tiàm sìn-tiōng (trust) bô kâng ê tiān-náu bāng-lō͘ chi-kan lâi-khì ê kau-thong (traffic), chhiūⁿ kóng Internet (bē-khò--tit) kap intranet (koân-tō͘ ē sìn-khò) tiong-ng ê kau-thong.
Hoé-piah ē-tàng chó͘-tòng pháiⁿ-ì ê hacker thàm-khoàⁿ tiān-náu hē-thóng ê jio̍k-tiám. Mā ū hoé-piah kiam lia̍h pēⁿ-to̍k a̍h-sī kî-thaⁿ ê ok-chit chu-liāu.
Guā-pōo lên-ket
siu-kái- Evolution of the Firewall Industry – discusses different architectures, how packets are processed, and provides a timeline of the evolution. (Eng-gí)
- A History and Survey of Network Firewalls – provides an overview of firewalls at various ISO levels, with references to original papers where early firewall work was reported. (Eng-gí)
Pún bûn-chiuⁿ sī chi̍t phiⁿ phí-á-kiáⁿ. Lí thang tàu khok-chhiong lâi pang-chō͘ Wikipedia. |