Network - Firewall

Card Puncher Data Processing


The firewall analyzes network traffic and decides whether to ACCEPT or DROP IP packets. At this layer we are talking about:

  • packets and port numbers
  • not applications or sockets.


Recommended Pages
Thomas Bayes
Data Mining - Intrusion detection systems (IDS) / Intrusion Prevention / Misuse

Classical security mechanisms, i.e. authentication and encryption, and infrastructure components like firewalls cannot provide perfect security. Therefore, intrusion detection systems (IDS) have been...
Windows Internet Properties Proxy
HTTP - Forward Proxy

A forward proxy is a proxy application that is configured to intercept and forward every internal Http request to an destination website, hence the name Forward Proxy. It's also known as man-in-the-middle...
Linux Firewall
Linux - Firewall

Firewall on Linux GUI You can manage the firewall and secure linux through the gui: Gnome. System > Administration > Security Level and Firewall. Kde. Applications > System Settings > Security...
Card Puncher Data Processing
Network - Open Port

How to know from a localhost which port are open on a remote host (ie that a firewall is not used or that the process is up and listen) When the scanner sends a SYN packet to open a TCP connection...
Card Puncher Data Processing
IP - Packet

packet is the name of a data unit for the network layer (level 3 of the OSI model) (ie IP). TCP/IP communication a TCP segment is carried in one or more IP packets, which are each carried in...
Card Puncher Data Processing
Network - Traffic

The network traffic is all network packet that goes through a certain interface in the network. for HTTP traffic tcTraffic Control Simulate Latency Remove the rule
Card Puncher Data Processing
Ngrok (tunnel as a service)

ngrok exposes local servers (usually a web server) behind NATs and firewalls to the public internet over secure tunnels. Authentication Choose a region Conf file ngrok provides a real-time...
Software Security
Software Security

Security regroups many subject area. The most known are: Identity management with: authentication (user/password) and its method (ldap, table, ...) authorization (group, privileges and role, object...
Default Windows Firewall Rule
Windows - Firewall

in Windows Windows has a built-in firewall that blocks inbound connections. One liner to get the config for all profiles with Configuration Properties for a rule inbound traffic or...
Card Puncher Data Processing
Windows - netsh (Netshell)

Netsh is a command-line scripting utility that allows you to, either locally or remotely, display or modify the network configuration of a windows computer. advfirewall - Windows firewall branchcache...

Share this page:
Follow us:
Task Runner