Our space
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Clock
May 2024
MonTueWedThuFriSatSun
  12345
6789101112
13141516171819
20212223242526
2728293031  

Calendar Calendar

Pollock

bibliography

Go down

bibliography Empty bibliography

Post  juanmoreno Mon Oct 31, 2011 11:03 am

Ranum, M., Internet Firewalls: Frequently Asked Questions, Firewalls FAQ, http://www.faqs.org/faqs/firewalls-faq/, 2000/12/01.
“The Firewalls FAQ is currently undergoing revision. The maintainers welcome input and comments on the contents of this FAQ.”

“A firewall is a system or group of systems that enforces an access control policy between two networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to permit traffic.”

Ingham, K., Forrest S., A History and Survey of Network Firewalls, University of New Mexico, http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf, 2001.

“The protocols used on the Internet for these layers, as well as all other Internet
standards are speci_ed by documents known as Requests for Comments (RFCs).”

“Examples of successful or attempted intrusions around the same time include:
Cliord Stoll's discovery of German spies tampering with his system [Stoll 1988;
1989], and Bill Cheswick's \Evening with Berferd" [1992] in which he set up a simple
Electronic \jail" for an attacker. In this jail, the attacker was unable to a_ect
the real system but was left with the impression that he or she had successfully
broken in.”

In this articles have examples about the importance of firewalls in the industry and in your personal computer.

Markus, H. S. 2001. Firewall guide software reviews.
http://www.firewallguide.com/software.htm Accessed 2002 Feb 20.


“These are some of the best personal firewalls and Internet security products and services that are available free for personal use: Bots, Google Pack. , Intrusion Prevention and Detection , Phishing .
In this page you can see the best firewalls and other products of security for networking.

McKay, N. 1998. China: The great rewall. Web publication:
http://www.wired.com/news/politics/0,1283,16545,00.html Accessed 2002 Feb 20.
“"This is a protest against the treatment of Lin Hai, a man arrested for simply sending email to the US who now faces life in prison," said Bronc Buster, a cracker and computer science post-graduate student in California.”
“The crackers used bogus Unix shell accounts in Chicago, New York, Germany, and Hong Kong to cover their tracks.”
This article is about cracker, what they’re think, what they’re do and everything about they.

juanmoreno

Posts : 17
Join date : 2011-08-22

Support sheet
Support Support:
bibliography Left_bar_bleue16/200bibliography Empty_bar_bleue  (16/200)
User type: 0

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum