What Is a Cyber Cafe?
Internet cafes are open to the public and provide profitable places for Internet access. Internet cafes provide computer-related hardware, and consumers can freely control software facilities. Charging methods generally include hourly charges and overnight charges.
- Application Notes
- On September 1, 1994, Eva Pascoe, a Polish girl who is pursuing a doctorate in cognitive psychology at the University of London, opened the world's first Internet cafe, Cyberia, in the West End of the United Kingdom. In May 1996, China's first Internet cafe was born in Shanghai-"Gate".
- Before 1995, Shanghai's first Internet cafe 3C + T, imitating Taiwan and abroad. The price is about 20 yuan / hour.
- From 1995 to 1998, the first peak of the development of Internet cafes, Internet cafes not only went online, they began to become gaming venues. Stand-alone games are mainly priced at 10 to 15 yuan.
- The number began to expand rapidly from 1998 to 2000, and large-scale competition within the industry began. Lax management has created some social problems.
- From 2000 to 2002, Internet cafes began to accept online game users. After the Internet cafes battle, chain Internet cafes appeared. In June 2002,
- Only knowing Internet cafe technology can ensure the safe and normal operation of Internet cafes. There are several ways to technically prevent Internet cafes from being attacked:
- ARP attack
- Because the mature solution is implemented through ARP bidirectional binding, that is, the IP <-> MAC address of each other is bound to the PC and the egress router respectively, to achieve the purpose of preventing ARP. The configuration is as follows:
- 1. If the IP / MAC binding table is imported on the ER router, the IPMAC-bound PC statically generates ARP entries, and at the same time, select "Allow only IP / MAC-bound clients to access the external network" to prevent the device from learning ARP dynamically. Table to completely prevent ARP attacks.
- 2. The PC uses static ARP entries to bind the gateway to prevent ARP attacks.
- Multi-line ISP access
- Before configuring multiple WANs, you must first understand the purpose of Internet cafes accessing multiple lines:
- 1. If it is to achieve telecommunications, telecommunications, China Netcom, China Netcom. It is recommended to use manual load balancing;
- 2. If there are two links in the Internet cafe, and one of the lines uses the Internet for charging, it is recommended to use the active / standby mode.
- ER Series Router Multi-WAN Mode Description
- Active / standby mode: Only one line works normally at a time. By default, only the primary link is used to forward data. When the primary link is abnormal, all data is automatically switched to the backup link.
- Intelligent load balancing mode: If a telecommunication network path routing table is imported into the device, packets are preferentially forwarded according to the telecommunication network path routing table; if the data packet does not match the (Telecom Netcom) routing table, it is automatically forwarded according to the WAN bandwidth ratio; When the device detects that a link is abnormal, all data on that link will be automatically switched to another link. When the link is restored, the data will automatically switch back to the link. Manual load balancing: In this mode, you need to import the telecom network routing table and set the default link. 1.4 Anti-NAT table, routing table, and abnormal traffic attacks. The three types of attacks are also common in Internet cafes. Most Internet cafes will encounter such problems.
- NAT attack
- The attacks can be divided into the following categories: one is abnormal or poisoned by the PC, sending packets with changed source IP addresses, causing the device to lose packets when there is no available port when establishing a NAT connection; the other is the abnormal or poisoned PC, sending The source IP (or destination IP, or source port, or destination port) is constantly changing and reported, consuming NAT entries on the device, causing the device to lose packets.
- Routing attack: It is mainly for the attack of routing buffer. The PC is abnormal or poisoned. It sends packets with constantly changing source IP or destination IP. As a result, the routing cache of the device is fully configured, which reduces the forwarding performance of the device.
- Abnormal traffic: The PC is abnormal or poisoned. It sends packets to the Internet for a large amount of traffic, which excessively consumes the bandwidth of the Internet cafe, causing the Internet cafe to go offline.
- Enable IP traffic restrictions and NAT restrictions as required. Recommended NAT limit: 300 ~ 500.
- At the end of November 2014, the Ministry of Culture, the General Administration of Industry and Commerce, the Ministry of Public Security and the Ministry of Industry and Information Technology jointly issued a notice to adjust the management policy of the Internet cafe industry, fully liberalize the approval of Internet cafes, and promote the transformation and upgrading of the Internet cafe industry. The new regulations have "four major" aspects: the total amount is "unbundled", the admission is "unbundled", the business scope is "unbundled", and the approval of "unbundled" supervision is not lax. The approval of Internet cafes will be liberalized and chain operations will be encouraged. The Ministry of Culture, the General Administration of Industry and Commerce, the Ministry of Public Security and the Ministry of Industry and Information Technology issued notices to adjust the management policy of the Internet cafe industry, comprehensively liberalize the approval of Internet cafes, and vigorously promote the transformation and upgrading of the Internet cafe industry. [5]
- The notice clearly stated that the cultural administration departments at all levels should abolish the total number and layout requirements of Internet cafes, and lift the restrictions on the number of Internet cafe computers. The minimum business area of the site is adjusted to not less than 20 square meters, and the area of the single computer is not less than 2 square meters. Any application that meets the above establishment conditions shall be accepted and approved by the cultural administration department at or above the county level.
- In the Internet cafe approval process, first-licensed and later-licensed management will be implemented to encourage the diversified operation of Internet cafes and the abolition of the establishment of chain enterprises. The chain mode and chain scale will be determined independently by online service companies, reducing government departments' interference in the company's independent operation. [6]