How Corporate
Firewalls Work
 week14 WEB POSTER
       group E
   January 22, 2008
proxy server
Proxy Server (Proxy Server) is a substitute meaning, and it is a
representation server serving as interagency...
Proxy Server


In computer networks, a proxy server is a server which services the requests of its clients by
forwarding r...
FTP
File Transfer Protocol (The file transfer protocol and abbreviation: FTP) is a c
ommunications protocol (protocol) to ...
What is protocol?
In the communication of the computer mutually by the network,
they are sets of promised things decided m...
Firewalls Work
Firewalls make it possible to filter incoming and outgoing traffic that flows through your system. A
firewa...
http://e-words.jp/w/FTP.html
Upcoming SlideShare
Loading in …5
×

Pre Week13

340 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
340
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Pre Week13

  1. 1. How Corporate Firewalls Work week14 WEB POSTER group E January 22, 2008
  2. 2. proxy server Proxy Server (Proxy Server) is a substitute meaning, and it is a representation server serving as interagency with a client and the objective server. When a client PC connects with the Internet, I receive an access demand, and Proxy Server connects with a target server in the Internet as substitution of the client, and it is the server which it carried a function to return the information to a client on. It is installed on the inside (the LAN side) of a physical firewall or a firewall in a company network and accesses a Web server (or, server) of the Internet. Proxy Server manages the Internet connection of the client PC 1 yuan and admits connection, and it is used by unjust access from the outside to protect an internal network. Sake to save information (data) that I reply to a client PC as a merit with Proxy Server and am connected and acquired on a physics disk of Proxy Server (I do cash), plural client PCs can contribute to improvement of the speed of the Internet connection cash forwards a done file, and to reply when I carried out the same access demand.
  3. 3. Proxy Server In computer networks, a proxy server is a server which services the requests of its clients by forwarding requests to other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it would 'cache' the first request to the remote server, so it could save the information for later, and make everything as fast as possible. A proxy server that passes all requests and replies unmodified is usually called a gateway or sometimes tunneling proxy .A proxy server can be placed in the user's local computer or at specific key points between the user and the destination servers or the Internet. Risks In using a proxy server, all data sent to the service being used must pass through the proxy server before being sent to the service, mostly in unencrypted form. It is therefore possible, and has been demonstrated, for a malicious proxy server to record everything sent to the proxy: including unencrypted login and passwords. By chaining proxies which do not reveal data about the original requester, it is possible to obfuscate activities from the eyes of the user's destination. However, more traces will be left on the intermediate hops, which could be used or offered up to trace the user's activities. If the policies and administrators of these other proxies are unknown, the user may fall victim to a false sense of security just because those details are out of sight and mind. The bottom line of this is to be wary when using proxy servers, and only use proxy servers of known integrity, and never use proxy servers of unknown integrity. If there is no choice but to use unknown proxy servers, do not pass any private information through the proxy. In what is more of an inconvenience than a risk, proxy users may find themselves being blocked from certain Web sites, as numerous forums and Web sites block IP addresses from proxies known to have spammed or trolled the site.
  4. 4. FTP File Transfer Protocol (The file transfer protocol and abbreviation: FTP) is a c ommunications protocol (protocol) to forward the file on the network. In the protocol that exists since the Internet initial, it is one of the protoco ls often still used by the Internet. On the protocol, it is usually used for for warding between the client and the server connecting it though the file transfer warding between the client and the server connecting it though the file transfer between arbitrary hosts can be done. Anonymous (anonymity) FTP server that can be accessed by anonymity might be used to distribute the file (chiefly free, free software etc.) entirely though the a ttestation is needed when connecting to the server usually. However, an anonymou s access is necessary the attestation on the form, and, in this case, specifies "Anonymous" or "Ftp" for a user. The password is usually good, and anything it h as been made the specification of user's E-mail address for the server manager t o contact when there is a wound in the distributed software manners (Withershins , when it is clear, the domain in the mail address omits the domain from the pul l etc. about Internet Protocol address of the client like "Foo@"). If the passwo rd doesn't fill the form of the mail address according to the server, it is not likely to be able to use it.
  5. 5. What is protocol? In the communication of the computer mutually by the network, they are sets of promised things decided mutually. It might be called the communication procedure and the communications protocol, etc. It is possible to think dividing into two hierarchies which language use when man communicates mutually, and transmitted by using what kind of medium, and it thinks in the computer communication dividing the role of the protocol into two or more communications protocol, etc. It is possible to think dividing into two hierarchies which language use when man communicates mutually, and transmitted by using what kind of medium, and it thinks in the computer communication dividing the role of the protocol into two or more hierarchies.it doesn't worry whether stay up of what in the under from it at all and a high-ranking protocol (software that mounts) can be communicated by hierarchizing it if it knows.
  6. 6. Firewalls Work Firewalls make it possible to filter incoming and outgoing traffic that flows through your system. A firewall can use one or more sets of “rules” to inspect the network packets as they come in or go out of your network connections and either allows the traffic through or blocks it. The rules of a firewall can inspect one or more characteristics of the packets, including but not limited to the protocol type, the source or destination host address, and the source or destination port. There are several classifications of firewalls depending on where the communication is taking place, where the communication is intercepted and the state that is being traced. *Network layer and packet filters, *Application-layer, *Proxies, *Network address translation REFERENCE http://srd.yahoo.co.jp/IMG/r=1/ig=465x342/id=94894e2710642f4c/l=ri/da=g/tid=MMSI02_01/q=pro xy%20server/SIG=11r2hkuao/EXP=1200987756/*-http%3A//www.inode.gr/img/proxy_small.jpg http://ja.wikipedia.org/wiki/%E3%83%97%E3%83%AD%E3%82%AD%E3%82%B7 http://www.secomtrust.net/secword/proxyserver.html http://img.zdnet.com/techDirectory/LAN2.GIF http://ja.wikipedia.org/wiki/File_Transfer_Protocol http://www.jnutella.org/docs/gnutella/Firewalls.html http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/firewalls.html
  7. 7. http://e-words.jp/w/FTP.html

×