Science topic
Firewalls - Science topic
Explore the latest questions and answers in Firewalls, and find Firewalls experts.
Questions related to Firewalls
Research Aim: Most data transmission is monitored by a firewall, which can also recognise and restrict undesirable traffic. The goal of this study is to highlight the potential features of a firewall while preventing cyber-attacks. The study aims to provide a detailed overview of the various categories of current and contemporary firewalls. The study uses a secondary research methodology to complete the research.
There are some famous corollaries of the equivalence principle:
1. Unruh effect is locally equivalent to Hawking radiation near the horizon, therefore "static" observer outside a blackhole will see radiation, while a free-fall observer will not.
2. Firewall, i.e., a free-fall observer will be evaporated at the horizon, is forbidden by the equivalence principle.
However, there is no physical law saying that no inertial observer will see thermal radiation or Firewall (it is bizarre, but not forbidden) in flat spacetime. The problem is the equivalence principle only restricts the evolution rule of the system but has no hint on boundary conditions. When people are using the above corollaries, are they assuming some particular boundary conditions?
How can we apply the equivalence principle in general?
Usecase- To provide the security of the data by building Next-generation firewalls or Is there any better firewall type to handle the normal systems. Please do suggest me any answers!!.
I have tried to run Autodock by following youtube video ( https://www.youtube.com/watch?v=llaVCIfH0sA ) but when I run AutoDock the error message comes. I have pasted the error message below please help me to fix this.
............................................................................................................................................
Python 2.5.2 (r252:60911, Feb 21 2008, 13:11:45) [MSC v.1310 32 bit (Intel)] on win32
Type "copyright", "credits" or "license()" for more information.
****************************************************************
Personal firewall software may warn about the connection IDLE
makes to its subprocess using this computer's internal loopback
interface. This connection is not visible on any external
interface and no data is sent to or received from the Internet.
****************************************************************
IDLE 1.2.2 ==== No Subprocess ====
>>> adding gasteiger charges to 3ec5
3ec5 already has gasteiger charges
3ec5 already has gasteiger charges
ERROR *********************************************
Traceback (most recent call last):
File "C:\Program Files\MGLTools-1.5.6\lib\site-packages\ViewerFramework\VF.py", line 898, in tryto
result = command( *args, **kw )
File "C:\Program Files\MGLTools-1.5.6\lib\site-packages\AutoDockTools\autostartCommands.py", line 964, in doit
ps = subprocess.Popen(args)
File "C:\Program Files\MGLTools-1.5.6\lib\subprocess.py", line 594, in __init__
errread, errwrite)
File "C:\Program Files\MGLTools-1.5.6\lib\subprocess.py", line 816, in _execute_child
startupinfo)
WindowsError: [Error 740] The requested operation requires elevation
Tcpreplay use to replay network traffic
Dear All,
I am interested in exploring open source firewall software for computer network laboratory. Can you please share a good open source firewall software with its download URL?
Thanking you,
Is a Policy Document for Next Generation Data Center? for level hardware security such as firewall policy, WAF, WSUS and others...
There are several ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls are setup and configured properly. Researchers, What are the best deeper options to handle this security and management?
How do I setup the firewall configuration at a node? Are there options for access control list? If yes, is code modification required for this?
What is the best solution at Gateway between the Internet (Public) and the Intranet (Vast LAN/VLAN (Private)) for the intruder detection, drop or deny, stopping spam emails and viruses/malwares, protect from exploiting vulnerabilities, flood a targets in application and communication protocol etc. and a best monitoring, evaluation and analysis tool for the better safeguard. Normally we intend to implement either a software or hardware firewall which enforces a set security policies that needs to be fine-tuned according to the recent advancement and race.
We can take all possible measures for the security of databases servers, web servers, systems servers with a set of inbuilt security mechanism and secure travel of transactions over the net based on encryption & VPN as choices are available.
I am using seqinr package in R. But when I am giving the command choosebank() to find out the existing databases or commands like choosebank('swissport") to open any specific database, R is showing error msg. -
Error in socketConnection(host = host, port = port, server = server, blocking = blocking, :
cannot open the connection
In addition: Warning message:
In socketConnection(host = host, port = port, server = server, blocking = blocking, :
pbil.univ-lyon1.fr:5558 cannot be opened
Error in choosebank() : I wasn't able to open the socket connection:
o Check that your are connected to the internet.
o Check that port 5558 is not closed by a firewall.
o Try to increase timeout value (current is 5 seconds).
How can I overcome this issue!!!!
I am currently working on a project where I am testing the security of a network.
I was wondering if it was able to scan the internal network of an organization.
This network seems to be protected by a DMZ, which uses stateless firewalls.
Hello,
Iam trying to perform a protein -protein docking using ADT tools in mac and in first step it gives following error,
Python 2.5.6 (r256:88840, Oct 26 2012, 16:44:06)
[GCC 4.0.1 (Apple Inc. build 5465)] on darwin
Type "copyright", "credits" or "license()" for more information.
****************************************************************
Personal firewall software may warn about the connection IDLE
makes to its subprocess using this computer's internal loopback
interface. This connection is not visible on any external
interface and no data is sent to or received from the Internet.
****************************************************************
IDLE 1.2.6 ==== No Subprocess ====
>>> dlopen(/Library/MGLTools/1.5.6/MGLToolsPckgs/UTpackages/UTvolrend/_UTVolumeLibrary.so, 2): Symbol not found: _glGetColorTableEXT
Referenced from: /Library/MGLTools/1.5.6/MGLToolsPckgs/UTpackages/UTvolrend/_UTVolumeLibrary.so
Expected in: /usr/X11/lib/libGL.1.dylib
Cannot import grid3DCommands. Disabling grid3DCommands...
ERROR *********************************************
Traceback (most recent call last):
File "/Library/MGLTools/1.5.6/MGLToolsPckgs/ViewerFramework/VF.py", line 898, in tryto
result = command( *args, **kw )
File "/Library/MGLTools/1.5.6/MGLToolsPckgs/Pmv/APBSCommands.py", line 4034, in checkDependencies
from Volume.Renderers.UTVolumeLibrary import UTVolumeLibrary
File "/Library/MGLTools/1.5.6/MGLToolsPckgs/Volume/Renderers/UTVolumeLibrary/UTVolumeLibrary.py", line 2, in <module>
from UTpackages.UTvolrend.UTVolumeLibrary import *
File "/Library/MGLTools/1.5.6/MGLToolsPckgs/UTpackages/UTvolrend/UTVolumeLibrary.py", line 7, in <module>
import _UTVolumeLibrary
ImportError: dlopen(/Library/MGLTools/1.5.6/MGLToolsPckgs/UTpackages/UTvolrend/_UTVolumeLibrary.so, 2): Symbol not found: _glGetColorTableEXT
Referenced from: /Library/MGLTools/1.5.6/MGLToolsPckgs/UTpackages/UTvolrend/_UTVolumeLibrary.so
Expected in: /usr/X11/lib/libGL.1.dylib
WARNING: dependency check failed for command APBSVolumeRender
The router is to be used without a firewall. Or is there a way to configure bandwidth of FE port without using a router?
Does anyone have experience with FIREMAN toolkit. I need to know how to install it, and how to use it to analyse the efficiency of my firewall?
Or, what tools you using to analyse and test the efficiency of your Firewall?
How to find exactly the number of users from outside that are passing through edge router , firewall and connecting to the LAN servers currently or in specific time . I dont have access to servers for using IIS Logs to determine number of hits, please guide me how can I find the exact number of users via cisco edge router or cisco firewall
(BY REQUEST, RE-OPENED). This is a social question, with immediate technical relevance. Cybersecurity, for example, depends on this question, and trust as "reliance on expected behavior" [1,2].
A positive answer can be reached through control, you just turn-off the offending user. But, when control is not possible (example, the Internet), or as when central control does not even exist, trust evaporates if it is based solely on control (or, better yet, fear of control). However, can trust be based on other factors in addition to control, or even fear of control? Does that pose a better future for a society that accepts it?
What is your experience, reasoned expectations, or theory?
[2] Kaplan, R. A matter of trust. https://www.researchgate.net/publication/290815512_A_Matter_of_Trust
Hi all. I have successfully created and simulated a network with 2 scenarios: with and without firewall.
When i try to compare/view the results it seems the system cannot locate my current project file.
Please, anyone can help me? Many thanks.
How Can I provide the required support and guidance as an IT OPERATIONS MANAGER and What are some of the duties and Responsibilities for me to Administer on Window 2008/2012/2016 Servers with respect to the process of Installation, Maintenance and Troubleshooting likewise for SQL 2000/2007/2012 Server and Exchange 2000/2007/2013 administration Skills, and Network Management (TCP/IP, LAN/WAN, VLAN, VPN, DHCP, DNS, Firewall, Fibre Optic) Group Policy 2008+, Kaspersky Antivirus and Mime Cast, Pure Message System Back-up and Recovery in a disciplined approach?
In March 2012, Joseph Polchinski claimed that the following three statements cannot all be true [1]: (i) Hawking radiation is in a pure state, (ii) the information carried by the radiation is emitted from the region near the horizon, with low energy effective field theory valid beyond some microscopic distance from the horizon, (iii) the infalling observer encounters nothing unusual at the horizon. Joseph Polchinski argue that the most conservative resolution is that [1]: the infalling observer burns up at the horizon. In Polchinski's account, quantum effects would turn the event horizon into a seething maelstrom of particles. Anyone who fell into it would hit a wall of fire and be burned to a crisp in an instant. As pointed out by physics community such firewalls would violate a foundational tenet of contemporary physics known as the equivalence principle [2], it states in part that an observer falling in a gravitational field --- even the powerful one inside a black hole --- will see exactly the same phenomena as an accelerated observer floating in empty space [3].
[1] Almheiri, A., Marolf, D., Polchinski, J.,Sully, J. http://arxiv. org/abs/1207.3123 (2012). [2] Ginzburg V.L.,Eroshenko, Yu.N.,Once again about the equivalence principle, 1996 Phys.-Usp. 39 1275 [3] Merali, Z., 4 April 2013,Vol 496,Nature,23
Hi EveryOne?
Thanks for your precious time.kindly help me to understand which is
best firewall or NIDS (Network Intrusion Detection System ) in today's world (Private and Government sector) ?
Furthermore; is this figure correct means which thing comes first firewall or IDS ?
Your prompt response will be highly appreciated .
I don't know how to collect data or simulate these things . How to simulate server , router etc . I am new in this area , so please help me . please give me any link , by reading which ,i can simulate these things.
I am working on Master dissertation and I need to use a simulator that I can create the Data Network for Industrial control system and add the firewall with a certain rules in order to test how the well designed network security for ICS can mitigate the cyber attack risk.
- How difficult is it to do such research for our major project?
- To mitigate Injections flaws like SQL injection, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions.We like to introduce an approach to dissect the HTTP traffic and inspect complex SQL injection attacks which uses both a machine learning classifier and a pattern matching inspection engine based on reduced sets of security rules. Our Web Application Firewall architecture aims to optimize detection performances by using a prediction module that excludes legitimate requests from the inspection process.
If I can configure my router with different filters then why would I use firewall. If the router can block my network from intruder and my OS has its own soft firewall then why do we need a physical firewall?
Is there a list of attributes or checkpoints to evaluate?
Is there a list of attributes to evaluate when measuring a network firewall weaknesses and vulnerabilities?
Current flow solutions are content-unaware, DPI faces problem of encryption, DFI uses both.