(On lined paper) Objective: to learn about the fire wall

Slides:



Advertisements
Similar presentations
Mobile Lab Basics. Each of our Mobile Labs contains 24 netbooks for your students to use in the classroom. The charging cart provides wireless internet.
Advertisements

Advanced Audio Setup Troubleshooting your audio Users’ Reference.
XP Tutorial 4 New Perspectives on Microsoft Windows XP 1 Microsoft Windows XP Personalizing Your Windows Environment Tutorial 4.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
SETTING PREFERENCES MUST BE DONE THE FIRST TIME FOR EVERYONE After logging into the EMR, the initial module looks like this: On top toolbar click Tools.
This is your desktop. Open a browser and Click on this link.
DVG-N5402SP.
DHP-306AV & DHP-W306AV. Agenda: How to change Encryption on a DHP-306AV How to change the Device Password on a DHP-306AV What will happen if the Device.
COMPREHENSIVE Windows Tutorial 10 Improving Your Computer’s Performance.
Computer Networks IGCSE ICT Section 4.
XP 1 New Perspectives on Microsoft Windows XP, 2005 Service Pack 2 Update Appendix D Microsoft Windows XP, Service Pack 2 Update Appendix D – Setting Up.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Changing Internet Explorer Settings for ActiveX control Installation VirtuOx Technical Services Guides.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
© 2009 FP Mailing Solutions. All rights reserved. Customer Service Training Basic Computer Training.
What is a Network?. Definition of a computer network A computer network is a system in which computers are connected to share information and resources.
Lexmark Wireless Printer Adaptor Instructions Step 1. For a Mac, go to network preferences/ select built-in-ethernet and click on TCP/IP tab and annotate.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send.
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
Chapter 4 Server Clients Workstation Operating Systems Workstation Requirements NIC Software Setup Resolve a Resource Conflict Prepare Workstation - Windows.
Connecting To The Seattle Area Pipetrades Via ‘VPN’ Only Compatible With Computers Running ‘Windows XP or Higher’
Introduction to Computer in Technology. Internet Discovery Were going to define several terms that are common in Computers and Technology One way to find.
The need for being connected By Irum haroon And Mehwish.
Stuff By Zach and Turtle To designate a default printer, choose Start > Control Panel > Printers and Faxes. Right-click the printer, and then.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
A computer network is a connection of many computers and many devices that are connected by communication channels.
By: Maite Velasquez. A computer network is a system in which two or more computers are connected by channels for the purpose to share information and.
FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
3.3 Data Networks. Overview Identify the main differences between LAN and WAN. Identify the advantages of using a network over stand-alone computers.
Computer networks By:. Instructions Choose a network to learn about: Click each part of the network to learn what it does Click on the home button on.
ONE® Pages Training Presentation North York General Hospital.
Setting up your computer’s microphone Begin by double clicking on the volume icon within the task bar.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
TESTING THE WIRELESS NETWORK INTERFACE CARD
Setting Up a Client PC for Windows Physically install a NIC Set Up Microsoft Networking –Adapter (installed with NIC) –Protocol –Client.
A guide to file sharing on Windows XP Peer to Peer File Sharing.
Summary: Unlike WindowsXP, Windows2000 wireless client utilities are different from vendor to vendor and even within versions of a vendor’s client utility.
CHAPTER - 4 COMPUTER NETWORK Dr. BALAMURUGAN MUTHURAMAN
Optimization Written by: Tim Keyser Georgia CTAE Resource Network 2010.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
Computer networks!!!. What is a computer network? Its a type of connection of communication or anything between people such as internet.
Introduction to Networking. What is a Network? Discuss in groups.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved.
Remote Access Using a Netgear DG834 Router 1http://
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Name Your Account Type in a user name of your choice.
Windows Tutorial 5 Protecting Your Computer
How to convert a Demo to Multi-user
The permanent memory of a computer
How to install Norton Anti-Virus 2017?
1.0 COMPUTER NAME & WORKGROUP SETTING
Configuring Windows 10 for Your Studio
Lec5(Practical) Computer Security-Safe Use
مقدمة في الحاسب الآلي T. Arwa Alsarami.
Solution for Quicken Error codes OL- 296, 295, 297.
Oki Data Americas.
Firewalls Routers, Switches, Hubs VPNs
Press ESC for Startup Options © Microsoft Corporation.
Introduction to Computers
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Online Learning.
How to connect to the Internet from Home
Windows Operating System
Presentation transcript:

(On lined paper) Objective: to learn about the fire wall (On lined paper) Objective: to learn about the fire wall. Warm-up: What are LAN, MAN, and WAN? Local Area Network Metropolitan Area Network Wide Area Network

Fire Wall Mr. Sigler

Firewall Firewall – A security device that controls access from the internet to the local area network or personal computer.

Firewall Click Start > Control Panel. Choose Classic View

Firewall 3. Double-click Windows Firewall. The Windows Firewall window appears.

Firewall 4. Uncheck Don't allow exceptions and select the On radio button. Exceptions: Programs that are allowed to go through the firewall

Firewall 5. Select the Advanced tab. 6. Choose Settings .

Firewall 7. In settings check Log Dropped Packets and Log Successful connections and set size limit. . Packets: Chunks of information sent over the internet

Firewall 8. Select the Exceptions tab and select the programs that you want or don’t want connecting to your network.

Firewall 9. Click Ok and save all changes.

Vocabulary Word Meaning Picture Firewall Protects against hackers Exceptions Programs that are allowed through the firewall Packet A chunk of information that travels through the internet Hacker Someone who accesses your computer illegally Zombie A computer that has been taken over by a hacker and is used to attack another computer or network

Lab (Use the Internet to find the following) Manufacturer Manufacturer line CPU socket type FSB Speed North Bridge/South Bridge Chipset # Memory Controllers Supported Memory Standards Maximum Memory Installed Expansions Slots Storage Controller Connectors/Ports