ITS 370

Nan Hu


Chapter 6 Exercises

1.      Using the Web, search for “software firewalls.” Examine the various alternatives available and compare their functionality, cost, features, and type of protection. Create a weighted ranking according to your own evaluation of the features and specifications of each software package.


                      I think different people have their different own best firewall software, it depends on the price you are willing to pay, the frequency you going online, the website you always visit and the software you are using, all the things depends, but for me, I have use Norton for two years and it works best for me. 


2.     Using figure 6-18, create one or more rules necessary for both the internal and external firewalls to allow a remote user to access an internal machine from the Internet using the Timbuktu software. Your answer requires researching the ports used by this software packet.

One rule should be added is: All ports for Timbuktu Pro Windows should be opened and run in the control under your firewall software, because we can never ensure whether it will be safe or not or containing some vires, and that might be easily transport to all devices in your personal network whenever you connect it on.

3.     Suppose management wants to create a “server farm” for the configuration in Figure 6-18 that allows a proxy firewall in the DMZ to access an internal Web server (rather than a Web server in the DMZ). Do you foresee any technical difficulties in deploying this architecture? What are the advantages and disadvantages to this implementation?

                 It’s a great solution. It will place the proxies in the DMZ and also protecting the web servers.

                 That can also in a way giving the HTTP traffic to get in to the webserver and protect the web

                  Server not been arrived by those non-HTTP traffic.  The disadvantages might be it might

                 Slow down the speed of the access.

4.     Using the Internet, determine what applications are commercially available to enable secure remote access to a PC.

1.     GoToMyPC

2.    LogMeIn

3.    TeamViewer

4.    PCnow

5.    Radmin

6.    Anyplace Control

7.  Splash.

5.     Using a Microsoft Windows system, open Internet Explorer. Click Internet Options on the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: a) content filtering and b) protection from unwanted items like cookies?

a)   you can change the options that will change all the setting that you might use in your daily browsing and other thing that you might use in you access configure.

b)    you can set the privacy and the cookies setting in some extension called “ edit this cokkie’ or just simply press F12 and change it.