Question about Microsoft Windows XP Professional

1 Answer

Controlling IP spoofing through inter domain packet filters

Please help me..
i am doing the above project for my final year in college..
if any one doing the same project ,please send me the source codes through mail..
dineshraj45@gmail.com
thanks in advance.

Posted by on

  • sona0102 Feb 18, 2009

    want to know if this topic is good and how things work here.

  • Anonymous May 08, 2009

    hi.. i gotta submit this project at my coll. i needed the detail reports of this project.can anyone pls???

×

1 Answer

  • Level 1:

    An expert who has achieved level 1.

    Mayor:

    An expert whose answer got voted for 2 times.

  • Contributor
  • 2 Answers

I have this project. I sell ieee projects. if u want i can give source code and all other related things.

contact me to pandi512@gmail.com

Posted on May 04, 2009

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

Pingtest.net


I will help you to know what is Ping!!!!
Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests.

Ping is used diagnostically to ensure that a host computer the user is trying to reach is actually operating. Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request to a specified interface on the network and waiting for a reply. Ping can be used for troubleshooting to test connectivity and determine response time.

As a verb, ping means "to get the attention of" or "to check for the presence of" another party online. The computer acronym (for Packet Internet or Inter-Network Groper) was contrived
to match the submariners' term for the sound of a returned sonar pulse.

Tip: To find out the dot address (such as 205.245.172.72) for a given domain name, Windows users can go to their command prompt screen (start/run/cmd) and enter ping xxxxx.yyy (where xxxxx is the second-level domain name like "whatis" and yyy is the top-level domain name like "com").


You can check the ping test in http://pingtest.net/ also you can check that here www.whoisxy.com

Nov 20, 2011 | Computers & Internet

Tip

Firewall Configuration


A firewall is a type of security mechanism used for preventing security threat in both incoming and outgoing computer traffic. It protects your computer system and/or the private network from intrusions.
It acts as a barrier, which checks all the incoming and outgoing information to and from your computer or a network based on the firewall settings. Firewalls can be customized according to the level of security required. It filters the messages based on some conditions, such as the IP address, ports, protocols, domain names etc.
These can be implemented in the hardware, software or sometimes both and scan the entire messages passing through it and veriy whether each block or packet of the message meets the specified security criteria.
Some operating systems like Microsoft Windows offers built-in firewalls, which are by default turned on to block incoming threats from the Internet. You can also look for any third-party software or hardware firewall to replace the default Windows firewall.
Types of firewall
There are various types of firewalls like:
1. Packet filtering firewall
2. Application-level gateways
3. Circuit-level gateways
4. Hybrid firewall
The role of packet filtering firewall is to examine the information available in the header of the message packets. The Application-level gateway firewall works on the application layer of the protocol stack. It works in a more intelligent way as compared to the packet filtering firewall.
Mentioned below are some of the conditions, which help in adding or removing the filters from the firewall:
1. IP address: Every machine connected to Internet has a unique IP address. You can customize the firewall to block any IP address, if it seems to show an uneven or unauthorized attempt or nature.
2. Protocols: You can decide which protocols to be included in your firewall’s filters. Some of the commonly used protocols, which can be included in the firewall are: IP, HTTP, TCP, FTP, SMTP etc.
3. Ports: You can configure the firewall to allow or block any port number.
Similarly, there are various other conditions which can be used to configure the firewall.

on Jan 27, 2010 | Computers & Internet

1 Answer

Sir, we are doing final year B.E project.Title of the project is "mapping pixels to letters using image steganography".But the matlab coding is not clear my paper.we have short time for doing...


It will be good at this stage to visit and get help from a Project center near to your place as the coding must apply with the project , secondly you are supposed to do the project which means you can get help from a guide , from your college tutors or from a professional project center.
Please approach a guide and show your workings or to obtain a coding for the sequence.

Feb 15, 2011 | Health & Beauty

1 Answer

I am have passthrough issues with Procurve MSM710 Controller. I have to allow mac based authentication for let say Xbox live or PS3 to be able to go online. Is there a way I can define ports (port...


Hi Perry653,

If you do not want to use mac authentication - are you using an AP that supports VLANs? If so - then create an SSID tagged to a VLAN, with WPA security - and have these PS2 type of devices connect to that SSID - then create a VSC with that VLAN as ingress, and disable authentication.

If that is not an option, then your login web server can detect the UserAgent of the device, and do a NOC based login - this is subject to spoofing of UserAgent (but MAC is also subject to spoofing).

Finally, you could disable authentication, and use Tools/Trace to capture the packets that the Xbox uses, and whitelist in the ACL those ports, then re-enable authentication. I suspect the Xbox also uses port 80 (http) and if so, this method defeats the entire login page redirection.

So mac authentication really is the best method. We operate / manage / installed over 2000 of these type of devices, perhaps we can help you with your project.

Regards
Murray
http://wireless.deepcoolclear.com/

Feb 10, 2011 | HP MSM710 MOBILITY CONTROLLER (J9325AABA)...

1 Answer

Controlling IP spoofing through interdomain packet filters


No. FIXYA is not the place to "cheat" on your school-work.

Nov 08, 2009 | Microsoft Windows XP Professional

1 Answer

Plz send me the current status of contolling ip spoofing through inter domain packet filters


The current status is "operational" -- packet filtering is being used so that "outgoing" IP-addresses originating from a network are required to be IP-addresses that are valid within that network.

Nov 05, 2009 | Microsoft Windows XP Professional

1 Answer

Explanation about the project title


dude google it, you are looking dozens of pages, not going to happen here.

Mar 31, 2009 | Computers & Internet

1 Answer

Need Source Code


well i'm working on the same project. I also have a problem

Jan 22, 2009 | Computers & Internet

2 Answers

First packet in connection is not a SYN packet:


Verizon blocks port 80 traffic to residential customers. If you want to host a website, they expect you to pay for the business service and a static IP.

I am monkeying around with my DNS records on goDaddy to see if I can get http traffic to go to port 8080 instead of port 80. So far, I have not had any success.

I did find no-ip.com, which, for $25/year, will "host" a simple redirect for you, so that when people type in http://yourdomain.com, it actually gets redirected to http://yourdomain.com:8080. That :8080 does show up in the address bar, but I think that's okay. Especially for $25/year.

Nov 08, 2007 | Actiontec (5GE583000-01) Router

Not finding what you are looking for?
Microsoft Windows XP Professional Logo

Related Topics:

694 people viewed this question

Ask a Question

Usually answered in minutes!

Top Microsoft Computers & Internet Experts

micky dee

Level 3 Expert

2642 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18344 Answers

Brian Sullivan
Brian Sullivan

Level 3 Expert

27725 Answers

Are you a Microsoft Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...