SlideShare a Scribd company logo
1 of 12
SERVIDOR WEB
Y CRON
(APACHE)
INSTALACION DEL SERVIDOR DNS
What is a Firewall?
A firewall is a network security device that monitors incoming and outgoing network traffic and
decides whether to allow or block specific traffic based on a defined set of security rules.
Firewalls have been a first line of defense in network security for over 25 years. They establish a
barrier between secured and controlled internal networks that can be trusted and untrusted
outside networks, such as the Internet.
A firewall can be hardware, software, or both.
What is DNS?
Domain Name Server (DNS) is a standard protocol that helps Internet users discover websites
using human readable addresses. Like a phonebook which lets you look up the name of a person
and discover their number, DNS lets you type the address of a website and automatically discover
the Internet Protocol (IP) address for that website.
Without DNS, the Internet would collapse - it would be impossible for people and machines to
access Internet servers via the friendly URLs they have come to know.
For example, the domain name www.exampleweb.com you are viewing now, translates to the IP
address 104.20.48.182 (in the old IPv4 format) or 2002:6814:30b6:0:0:0:0:0 (in the newer IPv6
format).
What is the difference between a Domain and a
Workgroup?
Domain : Domain is a client/server network where user can login from any device of the office. Also
known as Remote login. It has a centralized administration and all devices can be managed from a
centralized device. It prefers a centralized storage and all the users data is stored at a centralized
storage device which can be NAS or SAN.
Workgroup : Workgroup is a peer to peer windows computer network, where users can use his login
credentials only on his or her system and not others. It holds an distributed administration
wherein each user can manage his machine independently. Most storage is distributed. Each device
has its own dedicated storage.
What is a Proxy Server and how do they protect
the computer network?
A proxy server acts as a gateway between you and the internet. It’s an intermediary server
separating end users from the websites they browse. Proxy servers provide varying levels of
functionality, security, and privacy depending on your use case, needs, or company policy.
Proxy servers act as a firewall and web filter, provide shared network connections, and cache data
to speed up common requests. A good proxy server keeps users and the internal network
protected from the bad stuff that lives out in the wild internet. Lastly, proxy servers can provide a
high level of privacy.
What are IP classes and how can you identify
the IP class of given an IP address?
IP addressing is the most popular way to identify a device on the network. The address has 32 bits
which can be broken into four octets(1 octet=8 bit). These octets provide an addressing method
through which we can accommodate large and small networks. Accordingly, there are 5 classes of
the network
Class A Class B Class C Class D Class E
from 10.0.0.0 to
10.255.255.255.
Used by large
private networks,
such as a
multinational.
from 172.16.0.0 to
172.31.255.255.
Used by medium-
sized networks,
such as an SME or
a study center.
192.168.0.0 to
192.168.255.255.
Used by medium
networks, such as
home.
Class D has IP
address range
from 224.0.0.0 to
239.255.255.255.
Class D is
reserved for
Multicasting
Reserved for
future use, or
research and
development
purposes.,IP
addresses in this
class ranges from
240.0.0.0 to
255.255.255.254.
Like Class D
What is meant by 127.0.0.1 and localhost?
When you call an IP address on your computer, you try to contact another computer on the
internet but when you call the IP address 127.0.0.1 then you are communicating with the localhost.
Localhost is always your own computer.
Localhost is always your own computer. Your computer is talking to itself when you call the
localhost. Your computer not always directly identifies the local host. Within your personal
network localhost has a separate IP address like 192.168.0.1.(for most cases) which is different to
the one you use on the internet. This is usually dynamically assigned by the internet service
provider (ISP). Localhost can be seen as a server that is used on your own computer.
What is NIC?
A network interface card (NIC) is a hardware component, typically a circuit board or chip,
which is installed on a computer so that it can connect to a network. Modern NICs provide
functionality to computers such as support for I/O interrupt, direct memory access (DMA)
interfaces, data transmission, network traffic engineering and partitioning
A NIC provides a computer with a dedicated, full-time connection to a network by
implementing the physical layer circuitry necessary for communicating with a data link layer
standard, such as Ethernet or Wi-Fi
What is Data Encapsulation?
Data Encapsulation is an Object Oriented Programming concept that
bind a group of related properties, functions, and other members are
treated as a single unit. Class is the best example of Data
Encapsulation. It sometimes referred to as data hiding that prevents
the user to access the implementation details. Encapsulation
therefore guarantees the integrity of the data contained in the
Object.
What is the difference between the Internet,
Intranet, and Extranet?
Internet: The Internet is a global interconnection of computer systems. It is a massive collection of
networks sharing information publicly in the form of interlinked web pages. IP or Internet Protocol
defines a site’s unique location on the World Wide Web.
Intranet: An intranet network is only accessible to a small group of people. Intranets are mainly used
within businesses and organizations to provide access to files and applications on networked
computers and servers. Intranets are sometimes defined as a private Internet.
Extranet: An extranet is comparable to an intranet, but is accessible via a Web portal. An intranet
resides behind a firewall, and is accessible only to people who are members of the same group,
company or organization. Extranets are becoming a very popular means for business partners to
exchange information securely.
Thanks for
your attention
:v

More Related Content

Similar to English ._..pptx

Case1–NetworkDesignAbstractThecompanyinthisc.docx
Case1–NetworkDesignAbstractThecompanyinthisc.docxCase1–NetworkDesignAbstractThecompanyinthisc.docx
Case1–NetworkDesignAbstractThecompanyinthisc.docx
wendolynhalbert
 

Similar to English ._..pptx (20)

Basic lecture
Basic lectureBasic lecture
Basic lecture
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
Report on intranet
Report on intranetReport on intranet
Report on intranet
 
Firewall
FirewallFirewall
Firewall
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Info scince pp
Info scince ppInfo scince pp
Info scince pp
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
Case1–NetworkDesignAbstractThecompanyinthisc.docx
Case1–NetworkDesignAbstractThecompanyinthisc.docxCase1–NetworkDesignAbstractThecompanyinthisc.docx
Case1–NetworkDesignAbstractThecompanyinthisc.docx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

English ._..pptx

  • 3. What is a Firewall? A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet. A firewall can be hardware, software, or both.
  • 4. What is DNS? Domain Name Server (DNS) is a standard protocol that helps Internet users discover websites using human readable addresses. Like a phonebook which lets you look up the name of a person and discover their number, DNS lets you type the address of a website and automatically discover the Internet Protocol (IP) address for that website. Without DNS, the Internet would collapse - it would be impossible for people and machines to access Internet servers via the friendly URLs they have come to know. For example, the domain name www.exampleweb.com you are viewing now, translates to the IP address 104.20.48.182 (in the old IPv4 format) or 2002:6814:30b6:0:0:0:0:0 (in the newer IPv6 format).
  • 5. What is the difference between a Domain and a Workgroup? Domain : Domain is a client/server network where user can login from any device of the office. Also known as Remote login. It has a centralized administration and all devices can be managed from a centralized device. It prefers a centralized storage and all the users data is stored at a centralized storage device which can be NAS or SAN. Workgroup : Workgroup is a peer to peer windows computer network, where users can use his login credentials only on his or her system and not others. It holds an distributed administration wherein each user can manage his machine independently. Most storage is distributed. Each device has its own dedicated storage.
  • 6. What is a Proxy Server and how do they protect the computer network? A proxy server acts as a gateway between you and the internet. It’s an intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy depending on your use case, needs, or company policy. Proxy servers act as a firewall and web filter, provide shared network connections, and cache data to speed up common requests. A good proxy server keeps users and the internal network protected from the bad stuff that lives out in the wild internet. Lastly, proxy servers can provide a high level of privacy.
  • 7. What are IP classes and how can you identify the IP class of given an IP address? IP addressing is the most popular way to identify a device on the network. The address has 32 bits which can be broken into four octets(1 octet=8 bit). These octets provide an addressing method through which we can accommodate large and small networks. Accordingly, there are 5 classes of the network Class A Class B Class C Class D Class E from 10.0.0.0 to 10.255.255.255. Used by large private networks, such as a multinational. from 172.16.0.0 to 172.31.255.255. Used by medium- sized networks, such as an SME or a study center. 192.168.0.0 to 192.168.255.255. Used by medium networks, such as home. Class D has IP address range from 224.0.0.0 to 239.255.255.255. Class D is reserved for Multicasting Reserved for future use, or research and development purposes.,IP addresses in this class ranges from 240.0.0.0 to 255.255.255.254. Like Class D
  • 8. What is meant by 127.0.0.1 and localhost? When you call an IP address on your computer, you try to contact another computer on the internet but when you call the IP address 127.0.0.1 then you are communicating with the localhost. Localhost is always your own computer. Localhost is always your own computer. Your computer is talking to itself when you call the localhost. Your computer not always directly identifies the local host. Within your personal network localhost has a separate IP address like 192.168.0.1.(for most cases) which is different to the one you use on the internet. This is usually dynamically assigned by the internet service provider (ISP). Localhost can be seen as a server that is used on your own computer.
  • 9. What is NIC? A network interface card (NIC) is a hardware component, typically a circuit board or chip, which is installed on a computer so that it can connect to a network. Modern NICs provide functionality to computers such as support for I/O interrupt, direct memory access (DMA) interfaces, data transmission, network traffic engineering and partitioning A NIC provides a computer with a dedicated, full-time connection to a network by implementing the physical layer circuitry necessary for communicating with a data link layer standard, such as Ethernet or Wi-Fi
  • 10. What is Data Encapsulation? Data Encapsulation is an Object Oriented Programming concept that bind a group of related properties, functions, and other members are treated as a single unit. Class is the best example of Data Encapsulation. It sometimes referred to as data hiding that prevents the user to access the implementation details. Encapsulation therefore guarantees the integrity of the data contained in the Object.
  • 11. What is the difference between the Internet, Intranet, and Extranet? Internet: The Internet is a global interconnection of computer systems. It is a massive collection of networks sharing information publicly in the form of interlinked web pages. IP or Internet Protocol defines a site’s unique location on the World Wide Web. Intranet: An intranet network is only accessible to a small group of people. Intranets are mainly used within businesses and organizations to provide access to files and applications on networked computers and servers. Intranets are sometimes defined as a private Internet. Extranet: An extranet is comparable to an intranet, but is accessible via a Web portal. An intranet resides behind a firewall, and is accessible only to people who are members of the same group, company or organization. Extranets are becoming a very popular means for business partners to exchange information securely.