Notes It
Notes It
A firewall is a device installed between the internet network of an organization and the rest of
Internet. When a computer is connected to Internet, it can create many problems for corporate companies.
Most companies put a large amount of confidential information online. Such an information should not be
disclosed to the unauthorized persons. Second problem is that the virus, worms and other digital pests can
breach the security and can destroy the valuable data.
The main purpose of a firewall is to separate a secure area from a less secure area and to control
communications between the two. Firewall also controlling inbound and outbound communications on
anything from a single machine to an entire network.
On the Other Hand Software firewalls, also sometimes called personal firewalls, are designed to run on a
single computer. These are most commonly used on home or small office computers that have broadband
access, which tend to be left on all the time.
A software firewall prevents unwanted access to the computer over a network connection by identifying
and preventing communication over risky ports. Computers communicate over many different recognized
ports, and the firewall will tend to permit these without prompting or alerting the user.
As
shown
1.
Incoming
2.
3.
Incoming
in
fig.
the
packets
packets
Incoming
packets
from
destined
packets
are
filtered
network
for
for
any
according
124.56.0.2
internal
internal
to
are
TELNET
host
following
block
server
(port
156.255.7.8.8
specifications
(*
means
23)
are
are
any).
blocked.
blocked.
4. Outgoing packets destined for an HTTP server (port 80) are blocked i.e. employees of organization are
not allowed to browse the internet and cannot send any HTTP request.
Application-Level Firewalls
These firewalls handle packets for each Internet service separately, usually by running a program called
a proxy server, which accepts e-mail, Web, chat, newsgroup, and other packets from computers on the
intranet, strips off the information that identifies the source of the packet, and passes it along to the
Internet.
When the replies return, the proxy server passes the replies back to the computer that sent the original
message. A proxy server can also log all the packets that pass by, so that you have a record of who has
access to your intranet from the Internet, and vice versa.
PROXY SERVER
A proxy server is a dedicated computer or a software system running on a computer that acts as an
intermediary between an endpoint device, such as a computer, and another server from which a user or
client is requesting a service. The proxy server may exist in the same machine as a firewall server or it
may be on a separate server, which forwards requests through the firewall.
An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are
frequently requested, these are likely to be in the proxy's cache, which will improve user response time. A
proxy can also log its interactions, which can be helpful for troubleshooting.
Proxy servers offers the following basic functionalities:
Data caching
Proxy servers allow to hide, conceal and make your network id anonymous by hiding your IP address.
Improving performance
Translation
Security
Type of Proxies
Following table briefly describes the type of proxies:
Forward Proxies
In this the client requests its internal network server to forward to the internet.
Open Proxies
Open Proxies helps the clients to conceal their IP address while browsing the web.
Reverse Proxies
In this the requests are forwarded to one or more proxy servers and the response from the proxy server is
retrieved as if it came directly from the original Server.
Gopher
The Gopher protocol /ofr/ is a TCP/IP application layer protocol designed for distributing, searching,
and retrieving documents over the Internet. The Gopher protocol was strongly oriented towards a menudocument design and presented an alternative to the World Wide Web in its early stages, but
ultimately HTTP became the dominant protocol. The Gopher ecosystem is often regarded as the effective
predecessor of the World Wide Web.
Gopher was an Internet application in which hierarchically-organized text files could be brought from
servers all over the world to a viewer on your computer. Especially in universities, Gopher was a step
toward the World Wide Web's Hypertext Transfer Protocol (HTTP), which effectively replaced it within a
short time. With hypertext links, the Hypertext Markup Language (HTML), and the arrival of a
graphical browser, Mosaic, the Web quickly transcended Gopher. Gopher was developed at the University
of Minnesota, whose sports teams are called "the Golden Gophers."
Although most Gopher browsers and files are text-based, Gopher browsers, notably HyperGopher, were
developed that displayed graphic images (GIF and JPEG files) that were included in Gopher file
directories. Two tools for searching Gopher file hierarchies were Veronica and Jughead.
Mosaic
Mosaic was the first widely-distributed graphical browser or viewer for the World Wide Web. It is usually
considered to have been the software that introduced the World Wide Web and the Internet to a wide
general audience. Once Mosaic was available, the Web virtually exploded in numbers of users and content
sites. The success of Mosaic depended on the recent invention and adoption of Hypertext Transfer Protocol
by Tim Berners-Lee.)
Mosaic arrived in 1993. Marc Andreessen, then in his early 20s, is credited with inventing or leading the
development of Mosaic. He developed it at the National Center for Supercomputing Applications (NCSA)
at the University of Illinois in Urbana, Illinois. Andreessen and others went on to become part of Netscape
Communications, originally called Mosaic Communications. Netscape then produced what was, for a
while, the world's most popular browser, Netscape Navigator.
The original Mosaic, now in a later version, has since been licensed for commercial use and is provided to
users by several Internet access providers.
INTERNET
A means of connecting a computer to any other computer anywhere in the world via dedicated routers and
servers. When two computers are connected over the Internet, they can send and receive all kinds of
information such as text, graphics, voice, video, and computer programs. The Internet is the global system
of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices
worldwide. It is a network of networks that consists of private, public, academic, business, and government
networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking
technologies. The Internet carries an extensive range of information resources and services, such as the
inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic
mail, telephony, and peer-to-peer networks for file sharing.
intranet
An intranet is a private network that is contained within an enterprise. It may consist of many interlinked
local area networks and also use leased lines in the wide area network. Typically, an intranet includes
connections through one or more gateway computers to the outside Internet. The main purpose of an
intranet is to share company information and computing resources among employees. An intranet can also
be used to facilitate working in groups and for teleconferences. An intranet uses TCP/IP, HTTP, and other
Internet protocols and in general looks like a private version of the Internet. With tunneling, companies can
send private messages through the public network, using the public network with special
encryption/decryption and other security safeguards to connect one part of their intranet to another.
Typically, larger enterprises allow users within their intranet to access the public Internet
through firewall servers that have the ability to screen messages in both directions so that company
security is maintained. When part of an intranet is made accessible to customers, partners, suppliers, or
others outside the company, that part becomes part of an extranet.
extranet
An extranet is a private network that uses Internet technology and the public telecommunication system to
securely share part of a business's information or operations with suppliers, vendors, partners, customers,
or other businesses. An extranet can be viewed as part of a company's intranet that is extended to users
outside the company. It has also been described as a "state of mind" in which the Internet is perceived as a
way to do business with other companies as well as to sell products to customers. An extranet requires
security and privacy. These can include firewall server management, the issuance and use of digital
certificates or similar means of user authentication, encryption of messages, and the use of virtual private
networks (VPNs) that tunnel through the public network.
Internet
It
is
a Global
system of
interconnected
computer network.
Intranet
It
is
a Private
networkspecific to an
organisation.
Extranet
It is a Private network that
uses public network to share
information with suppliers and
vendors.
It is regulated by an
organization.
It is regulated by multiple
organization.
It is largest in terms of
number of connected
devices.
It is small network
with minimal number
of connected devices.
The
number
of
devices
connected is comparable with
Intranet.
It is owned by no one.
It is owned by single
organization.
It is owned by single/multiple
organization.
It
is
means
of sharing
information through
out the world.
It is means of sharing
sensitive
informationthrougho
ut organization.
It is means of sharing
information between
members
and
externalmembers.
Security is dependent
of the user of device
connected to network.
Security is enforced
via a firewall.
Example: What
we
are normally using is
internet.
Users
can
access
Internet anonymously.
Users
should
have
valid
username/password to access
Extranet.
Internet
is unregulated
uncensored.
But
Intranet
regulated
the organization
policies.
and
is
by
union
struct s_tag
{
int ival;
float fval;
char *cptr;
}s;
union u_tag
{
int ival;
float fval;
char *cptr;
}u;
Structure
Union
Call by value
Call by reference
function
function
location
What is a Macro?
A macro is a shortcut to a task you do repeatedly. Think about the Centre align operation. You first
highlight the word you want centred, then click the centre icon in the toolbar. This is a macro. It's the short
way of performing the centre task.
But you don't have to do it that way. There is a longer way. You can centre your text by clicking
on Format from the menu bar. When the menu drops down, click Paragraph. You'll get a dialogue box
popping up. Click the down arrow in the Alignment box, and then click on centre. Click OK on the
dialogue box and your text is centred. That's the long way round.
Clicking the centre icon on the toolbar is much easier - it's a very useful Macro built in to Microsoft Word.
A Macro is a way to create a shortcut for a task that you do a lot.
You can create your own macros. The macro we're going to create in the next section is a very simple one,
but macros don't have to be simple. You can open up the Visual Basic editor and create a very complex
macro indeed. Some malicious people even create Word macros that can do very nasty things to your
computer!
So, after that little scare story, let's create our very own macros. This one is very simple, and definitely
won't set off the alarm bells in your Anti-Virus software.
2.
3.
To use this macro in any new documents you make, be sure the Store macro in box says All
Documents (Normal.dotm).
4.
5.
Click the new macro (its named something like Normal.NewMacros.<your macro name>), and
click Add.
6.
Click Modify.
7.
Choose a button image, type the name you want, and click OK twice.
8.
Now its time to record the steps. Click the commands or press the keys for each step in the task.
Word records your clicks and keystrokes.
NOTE: Use the keyboard to select text while youre recording your macro. Macros dont record
selections made with a mouse.
9.
The button for your macro appears on the Quick Access Toolbar.
2.
3.
To use this macro in any new documents you make, be sure the Store macro in box says All
Documents (Normal.dotm).
4.
To run your macro when you press a keyboard shortcut, click Keyboard.
5.
6.
Check to see whether that combinations already assigned to something else. If it's already assigned,
try a different combination.
7.
To use this keyboard shortcut in any new documents you make, be sure the Save changes in box
says Normal.dotm.
8.
Click Assign.
9.
Now its time to record the steps. Click the commands or press the keys for each step in the task.
Word records your clicks and keystrokes.
NOTE: Use the keyboard to select text while youre recording your macro. Macros dont record
selections made with a mouse.
10.
2.
In the list under Macro name, click the macro you want to run.
3.
Click Run.
Make a macro available in all documents
To make a macro from one document available in all new documents, add it to the Normal.dotm template.
1.
2.
3.
Click Organizer.
4.
Click the macro you want to add to the Normal.dotm template, and click Copy.
Add a macro button to the ribbon
1.
2.
3.
4.
Under Customize the ribbon, click the tab and custom group where you want to add the macro.
If you don't have a custom group, click New Group. Then click Rename and type a name for your custom
group.
1.
Click Add.
2.
Click Rename to choose an image for the macro and type the name you want.
3.
Click OK twice.
Mail Merge is a powerful tool for writing and sending a personalized letter or e-mail to many different
people at the same time. You can also use it to create envelopes or labels with each recipient'
information. Mail Merge imports data from another source such as Excel and then uses that data to
replace placeholders throughout your message with the relevant information for each individual you are
messaging. You can use it to quickly create personalized messages for hundreds of people at once.
Text
Text on a worksheet can represent bits of information or be used to name a column or row. The use of text
on your business worksheet provides clarity in the worksheet's purpose so anyone else in the business can
look at the spreadsheet and understand the information represented there. Different types of text used on a
worksheet can range from names of people to product names to customer addresses. Some spreadsheet
programs allow the user to enter up to 32,000 characters in a text cell, but for the purpose of efficiency it's
probably better to be concise.
Values
Values, or numbers, are used in many different ways on a business worksheet. You can use whole-number
values to represent how many of a certain product you have in your stock or how much of something
you've sold. Decimal number values are commonly used to enter employees' hourly wages or percentages.
The use of values on a worksheet is helpful in business accounting, as well as simple tracking of such
things as sales and revenue.
Formulas
Formulas are vital to many accounting worksheets, as well as payroll. The use of formulas in your
business worksheet allows you to add, subtract, multiply or divide information in one cell by the values in
another cell. More complicated formulas that use algebraic expressions and other mathematical equations
can also be used if that's what's best for your worksheet. The purpose of a formula in your worksheet is to
help you combine data from one or more other category in your worksheet in the manner designed by the
formula.