🔥 Burn Fat Fast. Discover How! 💪

Computer hardware and networking

Logo of telegram channel rudrajangraitsolution — Computer hardware and networking C
Logo of telegram channel rudrajangraitsolution — Computer hardware and networking
Channel address: @rudrajangraitsolution
Categories: Technologies
Language: English
Subscribers: 5.24K
Description from channel

RUDRA JANGRA IT SOLUTION (PANIPAT)

Ratings & Reviews

3.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

0

1 stars

1


The latest Messages 18

2021-10-16 05:46:09 The best firewall is a hardware firewall that is completely separate from your operating system. It need not be a dedicated router, could be an old pentium box running Linux. Below I have found some sites that have How To's on setting up an outside hardware router using an old computer and using a little linux program that fits on a single floppy disk.

Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.

floppyfw


h#tp://www.zelow.no/floppyfw/



Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.

@rudrajangraitsolution. &. @rudrajangraitsolution2021

The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.

Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.

Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.

All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.


Sentry Firewall


ht*p://www.sentryfirewall.com/docs.html#overview
136 viewsRudra Jangra, 02:46
Open / Comment
2021-10-15 14:24:14 *होती जीत सत्य की और असत्य की हार,*

*यही संदेश देता है दशहरे का त्यौहार..!!*

* जय श्री राम *

*अन्याय पर न्याय, दुराचार पर सदाचार एवं असुरत्व पर देवत्व के विजयपर्व विजयदशमी की हार्दिक शुभकामनायें l*

@rudrajangraitsolution. &. @rudrajangraitsolution2021
234 viewsRudra Jangra, 11:24
Open / Comment
2021-10-14 11:45:46 DMasti- Entertainment Portal
http://ent.net.pk/all-movies.html
444 viewsRudra Jangra, 08:45
Open / Comment
2021-10-14 05:31:08 J.S fortnight virus spread by e-mail....
509 viewsRudra Jangra, 02:31
Open / Comment
2021-10-13 20:21:35
@rudrajangraitsolution. &. @rudrajangraitsolution2021
550 viewsRudra Jangra, 17:21
Open / Comment
2021-10-13 18:40:17 TROJAN HORSE
Trojan horse is a program that acts as a malicious or harmful code.it
designed to cause some malicious activity or to provide a backdoor to your
system.
Example- Beast ,Rat, Net bus ,Girlfriend etc.
527 viewsRudra Jangra, 15:40
Open / Comment
2021-10-13 17:35:30
@rudrajangraitsolution. &. @rudrajangraitsolution2021
495 viewsRudra Jangra, 14:35
Open / Comment
2021-10-13 16:38:11 @rudrajangraitsolution. &. @rudrajangraitsolution2021



Windows Defender Advanced Threat Protection offers nine primary security features and capabilities. These include:

Threat and Vulnerability Management – A software inventory is performed on endpoints in real time. This information is used to detect, prioritize, and mitigate security vulnerabilities related to installed applications and missing patches.
Attack Surface Reduction – The overall attack surface of a system is reduced through hardware isolation and application control. Applications are no longer considered trustworthy by default, and only trusted applications are allowed to run.
Next Generation Protection – ATP performs continuous scanning to detect and block threats. Machine learning and Security Graph are used to spot new and emerging threats.
Endpoint Detection and Response – ATP groups related attacks into incidents. This type of aggregation makes it easier for security professionals to prioritize, investigate, and respond to threats.
Automated Investigation and Remediation – If left unchecked, network endpoints can generate an overwhelming number of security alerts. Windows Defender ATP uses an Automated Investigations feature to examine the alerts, and eliminate the “noise” alerts. This allows security professionals to focus on more pertinent alerts.
Secure Score – ATP uses a security score to rate the current security configuration. Prescriptive guidance is given to help security professionals to improve the security score.
Microsoft Threat Experts – Microsoft Threat Experts is a managed hunting service that uses artificial intelligence to detect and prioritize attacks.
Management and APIs – A collection of APIs allow Windows Defender ATP to be integrated into an organization’s workflow.
Microsoft Threat Protection – ATP is designed to work with other components in Microsoft’s Threat Protection solution in an effort to achieve end to end security. Some of the other layers of protection include Azure Advanced Threat Protection, the Azure Security Center, Azure Informational Protection, Conditional Access, Microsoft Cloud App Security, and Office 365 Advanced Threat Protection.
Installation and System Requirements
Windows Defender Advanced Threat Protection is made up of a combination of Windows 10 features and services running within the Microsoft cloud. As such, there is nothing to install, and there are no hardware requirements beyond those of the Windows 10 operating system.
498 viewsRudra Jangra, 13:38
Open / Comment
2021-10-13 16:32:54 Bandwidth control and monitoring.
Web filtering.
Internet aggregation.
Sandboxing.
VPN, Virtual Private Networks.
Deep Packet Inspection, DPI.
7) List of Firewalls
A small list of Firewalls available is provided.

CISCO
Checkpoint
Fortinet
Watchguard
Sophos
Forcepoint
Juniper
D-Link
Palo Alto
Fortinet
426 viewsRudra Jangra, 13:32
Open / Comment
2021-10-13 16:32:54 Next-Generation Firewalls(NGFW): As the threats increase, most of the bigger companies are going in for the next-generation Firewalls which provide far greater benefits of a Firewall. These NGFW types come with many high-end capabilities to provide top-end Firewall advantages to large organizations with a higher risk profile.
Software Firewalls: A software Firewall definition is that it is a software installed on a device without any additional hardware. This answers the question of what is a Firewall software as well. Is Windows Firewall enough might be a legitimate doubt regarding stand-alone or individual computers? While windows give some basic protection, the need for firewalls in the form of an anti-virus plus application is always there.
Hardware Firewalls: Hardware Firewalls comprise devices that act as the first line of defense to filter data packets before they arrive at the servers. The major disadvantages of Firewalls of the hardware type are that they are easy for insider attacks to bypass them and the hardware capabilities vary with each supplier.
These are some of the firewalls and their types. The type suitable for an organization has to be chosen after careful consideration of all factors including vulnerabilities.

3) Uses of a Firewall
The uses of a Firewall are numerous. Questions like what is the use of a forewall or what does a Firewall do or what is a Firewall and what is its function are only natural when some big investment is required.

A Firewall and its uses are given below for a better understanding.

The useful thing about a Firewall is that it prevents unauthorized remote access and remote control of your computer by a hacker for evil purposes.
Data security is ensured based on IP address and protocol.
It ensures continuity of operations and availability of information.
It blocks destructive or unsuitable or pornographic content.
It prevents ransomware, malware, and phishing attacks.
It shields older PCs with earlier versions of OS.
It is safer for online gamers.
The above points explain a Firewall adequately.

Components of a Firewall are packet filtering, application gateways, and logging, and detection of suspicious activities.

4) Advantages and Disadvantages of a Firewall
There are both advantages and disadvantages of a Firewall as is to be expected.

Advantages of Firewall
A Firewall prevents hackers and remote access.
It protects data.
It ensures better privacy and security.
It protects from Trojans.
A network-based Firewall, like a router, can offer protection to multiple systems, while an OS-based Firewall can protect individual systems.
Disadvantages of Firewall
Cost: Installation of a Firewall can be costly depending on the sophistication required.
Performance: This is affected as each packet has to be verified for authenticity before it is allowed into the network.
Virus and Malware: There are a few limitations in a Firewall like its inability to prevent virus and malware attacks for which separate applications would be required, at the individual system level.
A network-level Firewall might bring in a false sense of security in employees and make them slacken on securing individual systems. Companies need to make all employees understand the concept of a Firewall and the importance of a Firewall for information security and their responsibility.
Firewall maintenance and up-gradation require extra manpower and resources.
5) Functions of a Firewall
The main function of a Firewall is packet filtering. The other function is to act as an application proxy, commonly referred to as an application-level gateway.

Some other functions are Stateful Firewalls which are dynamic, stateless Firewalls, deep packet inspection Firewalls, management functions, and more depending on the role of Firewalls and what is the Firewall security level that is required for a company.

6) Features of a Firewall
A list given below answers the common query What are the features of a Firewall.
454 viewsRudra Jangra, 13:32
Open / Comment