NAME:
Mohanpriaya
REGNO:
BM09533
TOPIC:
firwall
SUBJECT:
LIC
DATE:
2.10.2009
PHASE:
3
REPORT www.marratech.com/support/network.html
Configuring your network is often not needed. If you are at home, or behinda small office/home office gateway, chances are you do not need to configure anything to use the software. If you do run into firewalls or have other network related problems, please use the following resources to learn more about setting up your network to work well with Marratech! • • • • •
Marratech Client Firewall Guide Marratech Manager Firewall Configuration Marratech Security Overview (PDF, Letter or A4) Configuring Microsoft ISA 2004 (PDF, 600kb) User Forum
www.ipcop.org/
The Unknown Firewalls
(This story appeared in ‘Shockwave and other Cyber Stories’ published by Puffin India, last year.) Mana broke through firewalls that his dad had installed on the family computer, like a samurai warrior slicing through an imperial army. Unlike the samurai though, he quickly restored the dismantled software without leaving any bloody trails. His dad never ever guessed. In fact, he smiled complacently – always giving a reassuring look to Mana’s mother – whenever his son was on the computer.
totaldata.biz/sectips.html(rejected) www.allacademic.com/meta/p364506_index.html(rejected)
If you have a valuable www.linuxjournal.com/article/1204 or fragile network to protect, you may want to protect it with a very strong, well-proven firewall. In this article, Benjamin Ewy explains very thoroughly how to build your own 'bastion host' firewall with Linux.
www.pcmag.com/category2/0,2806,4722,00.asp Kerio's WinRoute 6.5 software firewall delivers many features of high-end security appliances for a fraction of the cost. www.linuxjournal.com/article/6903 The Cisco ASA firewall appliance provides great security protection out-of-the box with its default configuration. However, to increase the security protection even further, there are several configuration enhancements that can be used to implement additional security features. Two of these features are IP Spoofing protection and basic Intrusion Prevention (IPS) support.
ILC::: Technology:::MCA (2009_2012) Locating Resources: Internet Reg.NO. BM09533 Ren o
Name: Mohanpriaya
URL
Title: Firewalls
Located Information
Selected/ Rejected
Reason for Sel./Rej
Definition
selected
It is suitable for my topic
Images
Selected
It is suitable for my topic
Definition
rejected
Another definition
Brief introduction of firewalls
rejected
Over all idea
Types, components, advantages.
rejected
It is suitable for my topic
Introduction and main content
rejected
More idea of fw
www.marratech.com/support/network.html -
1 2 3
www.agnitum.com/
www.airoots.org/2008/07/the-unknownfirewalls samspade.org/d/firewalls.html
4 totaldata.biz/sectips.html
5 6 7 8 0
www.allacademic.com/meta/p364506_index.html
Magazines Locating Resources: Mag/Journals Reg.NO. BM09533Name:
Title:
R.N o
Magazine/Journal Details (Name, and Issue)
1
www.pcmag.com/category2/0,2806,4722,00 .asp
2
fairwalls
Located Information
Selected/ Rejected
Reason for Sel./Rej
What is firewall
Selected
Related my topic
Abstract
Selected
Easily understand
Definition
Selected
Nice
www.linuxjournal.com/article/1204
3 4 5 6 7 8 0
en.wikipedia.org/wiki/Sentry_Firewall
ILC: Technology:: MCA (2009-2012) Locating Resources: Books Reg.NO. BM09533Name: Mohanpriaya
R.N o
Book Details (Name, Author, and Publisher)
Title: firewalls
Located Information
Selected/ Rejected
Reason for Sel./Rej
Brief introduction about the firewalls
Selected
All the information available
Types and images
Selected
Related my topic
Handbook by Dave Hucaby
1
2 3 4 5 6 7 8 0
Richard Bryant.