You are on page 1of 2

Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients.

Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging. An email message consists of three components, the message envelope, the message header, and the message body. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp. = Email and its uses - Email allows individuals and groups to communicate with one another. Imagine that you've been asked to coordinate work on a proposal to address a problem in your dorm or Greek organization. You need to get information and ideas from people living in your dorm or house, from members of the surrounding community, from university officials, and perhaps other groups. Once you've established contact with these groups and individuals, you can gather and share information as well as elicit reactions to on-going proposals through email rather than face-to-face meetings or repetitive telephone calls. Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). = Telnet was developed in 1969 beginning with RFC 15, extended in RFC 854, and standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of the first Internet standards. = Historically, Telnet provided access to a command-line interface (usually, of an operating system) on a remote host. Most network equipment and operating systems with a TCP/IP stack support a Telnet service for remote configuration (including systems based on Windows NT). = Telnet is a clientserver protocol, based on a reliable connection-oriented transport. Typically this protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23, where a Telnet server application (telnetd) is listening. Telnet, however, predates TCP/IP and was originally run over Network Control Program (NCP) protocols. = advantages - Accessing Remote Computers,Saves Time,Easy to Use ,Universal A web page or webpage is a document or information resource that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device. This information is usually in HTML or XHTML format, and may provide navigation to other web pages via hypertext links. Web pages frequently subsume other resources such as style sheets, scripts and images into their final presentation. Types of Firewall Network layer or packet filters - Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. The firewall administrator may define the rules; or default rules may apply. Application-layer - Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application. They block other packets (usually dropping them without acknowledgment to the sender). Proxie- A proxy server (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input packets (connection requests, for example) in the manner of an application, while blocking other packets. Network address translation - Firewalls often have network address translation (NAT) functionality, and the hosts protected behind a firewall commonly have addresses in the "private address range", as defined in RFC 1918. Firewalls often have such functionality to hide the true address of protected hosts. Ad - Disadvantages of use 1. Firewalls evolve due to cracker's ability to circumvent them increases.

2.

3.

"Always on" connections created by Cable and DSL connections create major problems for firewalls. This can be compared to leaving you car running with the keys in it and the doors unlocked which a thief may interpret as an invitation to "Please steal me". Firewalls cannot protect you from internal sabotage within a network or from allowing other users access to your PC.

Firewalls Advantages and Disadvantages 1. 2. 3. 4. 5. A feeling of increased security that your PC and contents are being protected. Relatively inexpensive or free for personal use. New releases are becoming user friendly. You can monitor incoming and outgoing security alerts and the firewall company will record and track down an intrusion attempt depending on the severity. Some firewalls but not all can detect viruses, worms, Trojan horses, or data collectors.

You might also like