SmartSoft Network Solutions, Inc.  Project Presentation  21/12/2005.

Slides:



Advertisements
Similar presentations
WordPress as a Platform Bangalore PHP Meetup – 30-Jan-2010 Sudar Muthu Research Engineer, Yahoo Labs
Advertisements

TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
A unique way to connect your extension cords without the traditional problems.
Hotspot Express $ One of the Pioneers of complete WiFi solutions in India $ Hardware to create HOTSPOTs  Software to secure HOTSPOTs & Manage the users.
Mod Security (Is it worth it?) By Rich Helton. Abstract (see my paper for sources)  Based on statistics, Apache is the most used web server being used.
0-1 Team # Status Report (1 of 4) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team #: Team Name.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
0-1 Team # Status Report (1 of 4) Client Contact –Status Point 1 –Status Point 2 Team Meetings –Status Point 1 –Status Point 2 Team Organization –Description.
LogMeIn.com By: Casey Davidson. What is it? Free Web-based VNC Client Remotely control any PC or Mac from anywhere in the world No network configuring.
Introduction to WEKA Aaron 2/13/2009. Contents Introduction to weka Download and install weka Basic use of weka Weka API Survey.
0-1 Team 1 Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auto-Owners.
0-1 Team ?? Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auraria.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
What is Wordpress?  WordPress has a web template processor. Users can re-arrange widgets without editing PHP of HTML code; they can also install and.
SOCIAL NETWORKING APP FACEBOOK. WHAT IS FACEBOOK Facebook was created in 2004 by Mark Zuckerburg and was first used on computers. It was one of the first.
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
SYST Web Technologies SYST Web Technologies Installing a Web Server (XAMPP)
Website Hardening HUIT IT Security | Sep
Norman SecureSurf Protect your users when surfing the Internet.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Linux Operations and Administration
Microsoft ® Official Course Module 9 Configuring Applications.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Project Proposal: Academic Job Market and Application Tracker Website Project designed by: Cengiz Gunay Client: Cengiz Gunay Audience: PhD candidates and.
Introduction: Drupal is a free and open-source content management system (CMS). A content management system(CMS) is a computer program that allows publishing,
Fluxyfox A software project hosting platform. Platform Services  Website on fluxyfox.com (Azure Websites)  Subdomain of fluxyfox.com (DNS)  Linux,
Joel Bapaga on Web Design Strategies Technologies Commercial Value.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Greg Andolshek Alex Koch Michael McCormick Team Lasso.
By: Paul Hill Technology Coordinator Gwinn Area Community Schools.
Open Web App. Purpose To explain Open Web Apps To explain Open Web Apps To demonstrate some opportunities for a small business with this technology To.
Presentation By Alex Ogden 1. What is WordPress? Free, Open-Source software created in 2003 Websites, Blogs and Portfolios 22% of Websites Easy to use,
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Review Security Hardening IPTables SELinux. Today Installations and updates – Rpm command and packages Apache “Issue Ownership”
Honeypot and Intrusion Detection System
Prestashop is an open source e-commerce application. It is written in PHP and is based on Smarty template engine. It can incorporate the advantages of.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Customer Relationship Management. Content CRM SugarCRM System Requirement Installation Process Configuration.
Security at NCAR David Mitchell February 20th, 2007.
Web 2.0 By Martin King. Features of Web 2.0 Tags: These are one word descriptions of the entire content written by the owner. Extensions: It is software.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Document Management Service MaestroTec, Inc. D ocument M anagement S ervice Improve the way you manage your critical business documents.
Content Management Systems Jenny Owens & Nick Owens.
Applying the Open Source development model ● Technologies ● Open Source? ● Drawbacks of Open Source ● Advantages of Open Source ● System outline.
LINUX F ree operating system Created by Linus Torvalds when he was a student at the University of Helsinki in 1991 First released the system to his friends,
Module 7: Advanced Application and Web Filtering.
1 The Main Event Battle Of the Sniffers. ● The Champion – Ethereal: Network Analyzer ● The Challenger – Ettercap: Network Security Suite.
Microsoft Management Seminar Series SMS 2003 Change Management.
Module 8 : Configuration II Jong S. Bok
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
A Network Security -Firewall Bruce Turin.
TOPIC 7.0 LINUX SERVICES AND CONFIGURATION. ROOT USER Root user is called “super user” because it has power far beyond those of mortal user. As root,
The Best Ecommerce Platforms & Shopping Carts for Multi-vendor Ecommerce Marketplaces
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
Virtual Directory Services and Directory Synchronization May 13 th, 2008 Bill Claycomb Computer Systems Analyst Infrastructure Computing Systems Department.
PRESENTED BY CHRIS ANDERSON MAY 12, 2008 Setting Up DansGuardian with Squid.
Top 5 Open Source Firewall Software for Linux User
Backdoor Attacks.
Welcome to Dexterity Solution We are driving Software Product Company who concentrates on most recent patterns and advances in making clone contents, giving.
HR Manager Script PHP Based HR Manager Script Human Resource Management Script
Convergence IT Services Pvt. Ltd
Wireless Spoofing Attacks on Mobile Devices
Presentation transcript:

SmartSoft Network Solutions, Inc.  Project Presentation  21/12/2005

2 SmartSoft Network Solutions, Inc. Team Members >Tayfun Şen >Özden Meren >Sedat Zelyüt >Hakan Özadam >Akın Öztürk A highly motivated team of five people:

3 SmartSoft Network Solutions, Inc. Our Outline >Problem definition >Current solutions >Our solution >What makes us different >Current progress >Contact information

4 SmartSoft Network Solutions, Inc. Problem Definition >Companies and other organisations lose/waste their resources because of wrongful internet usage >Users of the shared Internet resources abuse its use (spamming, p2p, port scanning etc.) >Security rules might be breached >Hackers may attack the system >As a result, controlling the Internet access is inevitable

5 SmartSoft Network Solutions, Inc. Current Solutions >Two products for demonstration purposes: Websense and DansGuardian. >One is a a commercial product and the other from the open-source community.

6 SmartSoft Network Solutions, Inc. Current Solutions >Websense: >Pros: Has many of the features we would like to develop >Cons: expensive, not open-source, needs high end computers, two program structure on clients and servers.

7 SmartSoft Network Solutions, Inc. Current Solutions >Dansguardian: >Pros: open-source, free. >Cons: doesn’t have much features, hard to install – maintain,

8 SmartSoft Network Solutions, Inc. Our Solution: SmartGuardian SmartGuardian Protecting your network >Protection of the network from hackers >Web content filtering >Logging user activities >Three main modules: SG Wall, SG Crawler, SG Controller

9 SmartSoft Network Solutions, Inc.

10 SmartSoft Network Solutions, Inc. Our Solution: SmartGuardian Main Properties: >To be coded in mainly C++ and PHP >The target platform is Linux systems. >Our development system is Fedora Core 4, but we will port our software to work in other systems too.

11 SmartSoft Network Solutions, Inc. Our Modules >SG Wall: Main module. Controlling the Internet access. To be coded in C++. >SG Crawler: For data mining jobs. Will be using statistics, keywords to classify websites. To be coded in C++. >SG Controller: For controlling the system & viewing actions. To be coded using PHP.

12 SmartSoft Network Solutions, Inc. What makes us different? Our main advantages: >Ease of use, >Extensive features, >Web site classification (not downloading other’s lists) >Free (as in freedom) & >open-source

13 SmartSoft Network Solutions, Inc. Current Progress >Like everyone else – Initial design is finished. >Started learning NetWib Library and network programming. >Researching about data mining. Google API? Weka Library? >Prototype and Detailed design in light of our latest explorations.

Contact Information Thanks for listening 14 Contact us at Any questions? SmartSoft Network Solutions, Inc.