A proxy device (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input packets (connection requests, for example) in the manner of an application, whilst blocking other packets. Proxies make tampering with an internal system from the external network more difficult and misuse of one internal system would not necessarily cause a security breach exploitable from outside the firewall (as long as the application proxy remains intact and properly configured). Conversely, intruders may hijack a publicly-reachable system and use it as a proxy for their own purposes; the proxy then masquerades as that system to other internal machines. While use of internal address spaces enhances security, crackers may still employ methods such as IP spoofing to attempt to pass packets to a target network.
A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their own website accessible via the World Wide Web. Web hosts are companies that provide space on a server they own or lease for use by their clients as well as providing Internet connectivity.
Blog Archive
-
▼
2009
(30)
-
▼
November
(24)
- web servers...
- Overload causesAt any time web servers can be over...
- web hosting
- web hosting Service scope
- web hosting uptime
- types of web hosting
- types of web hosting cont'd...
- Obtaining web hosting
- Firewall
- types of firewall
- function of firewall
- history of firewall
- history of firewall First generation - packet filters
- firewall-other generations
- firewall types
- proxy
- Network address translation
- what is spam ?
- E-Mail Spam
- spam overview
- types
- Spam techniques
- What Is a Yahoo Domain?
- server overview
-
▼
November
(24)
12:46 PM
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment