Sie sind auf Seite 1von 5

NAME: Mohanpriaya

REGNO: BM09533

TOPIC: firwall

SUBJECT: LIC

DATE: 2.10.2009

PHASE: 3

REPORT

www.marratech.com/support/network.html

Configuring your network is often not needed. If you are at home, or behinda small
office/home office gateway, chances are you do not need to configure anything to use the
software. If you do run into firewalls or have other network related problems, please use
the following resources to learn more about setting up your network to work well with
Marratech!

• Marratech Client Firewall Guide


• Marratech Manager Firewall Configuration
• Marratech Security Overview (PDF, Letter or A4)
• Configuring Microsoft ISA 2004 (PDF, 600kb)
• User Forum

www.ipcop.org/

The Unknown Firewalls

(This story appeared in ‘Shockwave and other Cyber Stories’


published by Puffin India, last year.)

Mana broke through firewalls that his dad had installed on the family computer, like a
samurai warrior slicing through an imperial army. Unlike the samurai though, he quickly
restored the dismantled software without leaving any bloody trails. His dad never ever
guessed. In fact, he smiled complacently – always giving a reassuring look to Mana’s
mother – whenever his son was on the computer.
totaldata.biz/sectips.html(rejected)

www.allacademic.com/meta/p364506_index.html(rejected)

If you have a valuable www.linuxjournal.com/article/1204 -


or fragile network to
protect, you may want to protect it with a very strong, well-proven firewall. In this
article, Benjamin Ewy explains very thoroughly how to build your own 'bastion
host' firewall with Linux.

www.pcmag.com/category2/0,2806,4722,00.asp

Kerio's WinRoute 6.5 software firewall delivers many features of high-end security
appliances for a fraction of the cost.

www.linuxjournal.com/article/6903

The Cisco ASA firewall appliance provides great security protection out-of-the box with its
default configuration. However, to increase the security protection even further, there are
several configuration enhancements that can be used to implement additional security
features. Two of these features are IP Spoofing protection and basic Intrusion Prevention (IPS)
support.
ILC::: Technology:::MCA (2009_2012)

Locating Resources: Internet

Reg.NO. BM09533 Name: Mohanpriaya Title: Firewalls

Ren URL Located Information Selected/ Reason for Sel./Rej


o Rejected

www.marratech.com/support/network.html -
1 Definition selected It is suitable for my
topic

2 www.agnitum.com/ Images Selected It is suitable for my


topic

3 www.airoots.org/2008/07/the-unknown- Definition rejected Another definition


firewalls

samspade.org/d/firewalls.html
4 Brief introduction of rejected Over all idea
firewalls
totaldata.biz/sectips.html
5 Types, components, rejected It is suitable for my
advantages. topic

6 www.allacademic.com/meta/p364506_index.html Introduction and rejected More idea of fw


main content

0
Magazines Locating Resources: Mag/Journals

Reg.NO. BM09533Name: Title: fairwalls

R.N Magazine/Journal Details Located Information Selected/ Reason for Sel./Rej


o (Name, and Issue) Rejected

1 www.pcmag.com/category2/0,2806,4722,00 What is firewall Selected Related my topic


.asp

2 Abstract Selected Easily understand


www.linuxjournal.com/article/1204

3 en.wikipedia.org/wiki/Sentry_Firewall Definition Selected Nice

0
ILC: Technology:: MCA (2009-2012)

Locating Resources: Books

Reg.NO. BM09533Name: Mohanpriaya Title: firewalls

R.N Book Details Located Information Selected/ Reason for


o (Name, Author, and Publisher) Rejected Sel./Rej

Handbook by Dave Hucaby


1 Brief introduction about the Selected All the
firewalls information
available

2 Richard Bryant. Types and images Selected Related my topic

Das könnte Ihnen auch gefallen