Question about Microsoft Windows XP Professional

1 Answer

Controlling IP spoofing through inter domain packet filters

Please help me..
i am doing the above project for my final year in college..
if any one doing the same project ,please send me the source codes through mail..
dineshraj45@gmail.com
thanks in advance.

Posted by on

  • sona0102 Feb 18, 2009

    want to know if this topic is good and how things work here.

  • Anonymous May 08, 2009

    hi.. i gotta submit this project at my coll. i needed the detail reports of this project.can anyone pls???

×

1 Answer

  • Level 1:

    An expert who has achieved level 1.

    Mayor:

    An expert whose answer got voted for 2 times.

  • Contributor
  • 2 Answers

I have this project. I sell ieee projects. if u want i can give source code and all other related things.

contact me to pandi512@gmail.com

Posted on May 04, 2009

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

How to Prevent System Breakdown or Service Interruption of the MA5600 Caused by Network Attacks Through the Proper Configuration


The common improper configurations that affect the system security are as follows:
The ring network detection function and the anti-MAC address-spoofing function or anti-IP address-spoofing function are disabled. When the anti-MAC address-spoofing function or the anti-IP address-spoofing function is disabled, the ******* user sends the PPPoE and DHCP control packets by forging the MAC address or IP address of a legal user. In this case, the security of the system is affected.
Huawei MA5600
Run the ring check command to enable the ring network detection function on the user side
Run the security anti-macspoofing enable command to enable the anti-MAC address-spoofing function.
Run the security anti-ipspoofing enable command to enable the anti-IP address-spoofing function
The devices are managed by IP addresses of the public network and the access rights are not limited strictly when the ACL rule is configured. In this case, the network is attacked.
To ensure the security of devices, manage the devices by using the IP addresses of the private network. When configuring the ACL rule, you must comply with the principle of the minimum authorization to configure the accessible address segment. The accessible address segment can contain only the mandatory IP addresses of the management network segment. Other IP addresses cannot access the device management interface.
Run the acl command to create a basic ACL and enter the ACL mode. The number of a basic ACL can only be in the range of 2000-2999.
In the basic ACL mode, run the rule command to create a basic ACL rule. The parameters are as follows:
rule-id: Indicates the ACL rule ID. To create an ACL rule with a specified ID, use this parameter.
permit: Indicates the keyword for allowing the data packets that meet the related conditions to pass.
deny: Indicates the keyword for discarding the data packets that meet the related conditions.
time-range: Indicates the keyword of the time range during which the ACL rule is effective.
The packets that access the device management interface are not controlled so that the device is attacked by the packets. In this case, the system is caused to be busy and the services are affected.
Run the firewall packet-filter command to apply the packet filtering rules of the firewall to the interface to filter the packets that access the interface. In this case, the packet attack is prevented.
Huawei MA5616
Huawei MA5616 Gold Line
Huawei MA5616 Silver Line

Apr 12, 2017 | The Computers & Internet

Tip

Firewall Configuration


A firewall is a type of security mechanism used for preventing security threat in both incoming and outgoing computer traffic. It protects your computer system and/or the private network from intrusions.
It acts as a barrier, which checks all the incoming and outgoing information to and from your computer or a network based on the firewall settings. Firewalls can be customized according to the level of security required. It filters the messages based on some conditions, such as the IP address, ports, protocols, domain names etc.
These can be implemented in the hardware, software or sometimes both and scan the entire messages passing through it and veriy whether each block or packet of the message meets the specified security criteria.
Some operating systems like Microsoft Windows offers built-in firewalls, which are by default turned on to block incoming threats from the Internet. You can also look for any third-party software or hardware firewall to replace the default Windows firewall.
Types of firewall
There are various types of firewalls like:
1. Packet filtering firewall
2. Application-level gateways
3. Circuit-level gateways
4. Hybrid firewall
The role of packet filtering firewall is to examine the information available in the header of the message packets. The Application-level gateway firewall works on the application layer of the protocol stack. It works in a more intelligent way as compared to the packet filtering firewall.
Mentioned below are some of the conditions, which help in adding or removing the filters from the firewall:
1. IP address: Every machine connected to Internet has a unique IP address. You can customize the firewall to block any IP address, if it seems to show an uneven or unauthorized attempt or nature.
2. Protocols: You can decide which protocols to be included in your firewall’s filters. Some of the commonly used protocols, which can be included in the firewall are: IP, HTTP, TCP, FTP, SMTP etc.
3. Ports: You can configure the firewall to allow or block any port number.
Similarly, there are various other conditions which can be used to configure the firewall.

on Jan 27, 2010 | Computers & Internet

1 Answer

Pingtest.net


I will help you to know what is Ping!!!!
Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests.

Ping is used diagnostically to ensure that a host computer the user is trying to reach is actually operating. Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request to a specified interface on the network and waiting for a reply. Ping can be used for troubleshooting to test connectivity and determine response time.

As a verb, ping means "to get the attention of" or "to check for the presence of" another party online. The computer acronym (for Packet Internet or Inter-Network Groper) was contrived
to match the submariners' term for the sound of a returned sonar pulse.

Tip: To find out the dot address (such as 205.245.172.72) for a given domain name, Windows users can go to their command prompt screen (start/run/cmd) and enter ping xxxxx.yyy (where xxxxx is the second-level domain name like "whatis" and yyy is the top-level domain name like "com").


You can check the ping test in http://pingtest.net/ also you can check that here www.whoisxy.com

Nov 20, 2011 | Computers & Internet

1 Answer

I am have passthrough issues with Procurve MSM710 Controller. I have to allow mac based authentication for let say Xbox live or PS3 to be able to go online. Is there a way I can define ports (port...


Hi Perry653,

If you do not want to use mac authentication - are you using an AP that supports VLANs? If so - then create an SSID tagged to a VLAN, with WPA security - and have these PS2 type of devices connect to that SSID - then create a VSC with that VLAN as ingress, and disable authentication.

If that is not an option, then your login web server can detect the UserAgent of the device, and do a NOC based login - this is subject to spoofing of UserAgent (but MAC is also subject to spoofing).

Finally, you could disable authentication, and use Tools/Trace to capture the packets that the Xbox uses, and whitelist in the ACL those ports, then re-enable authentication. I suspect the Xbox also uses port 80 (http) and if so, this method defeats the entire login page redirection.

So mac authentication really is the best method. We operate / manage / installed over 2000 of these type of devices, perhaps we can help you with your project.

Regards
Murray
http://wireless.deepcoolclear.com/

Feb 10, 2011 | HP MSM710 MOBILITY CONTROLLER (J9325AABA)...

1 Answer

Controlling IP spoofing through interdomain packet filters


No. FIXYA is not the place to "cheat" on your school-work.

Nov 08, 2009 | Microsoft Windows XP Professional

1 Answer

Plz send me the current status of contolling ip spoofing through inter domain packet filters


The current status is "operational" -- packet filtering is being used so that "outgoing" IP-addresses originating from a network are required to be IP-addresses that are valid within that network.

Nov 05, 2009 | Microsoft Windows XP Professional

1 Answer

Explanation about the project title


dude google it, you are looking dozens of pages, not going to happen here.

Mar 31, 2009 | Computers & Internet

1 Answer

Need Source Code


well i'm working on the same project. I also have a problem

Jan 22, 2009 | Computers & Internet

2 Answers

First packet in connection is not a SYN packet:


Verizon blocks port 80 traffic to residential customers. If you want to host a website, they expect you to pay for the business service and a static IP.

I am monkeying around with my DNS records on goDaddy to see if I can get http traffic to go to port 8080 instead of port 80. So far, I have not had any success.

I did find no-ip.com, which, for $25/year, will "host" a simple redirect for you, so that when people type in http://yourdomain.com, it actually gets redirected to http://yourdomain.com:8080. That :8080 does show up in the address bar, but I think that's okay. Especially for $25/year.

Nov 08, 2007 | Actiontec (5GE583000-01) Router

Not finding what you are looking for?
Microsoft Windows XP Professional Logo

Related Topics:

694 people viewed this question

Ask a Question

Usually answered in minutes!

Top Microsoft Computers & Internet Experts

micky dee

Level 3 Expert

2644 Answers

Piyal Perera
Piyal Perera

Level 3 Expert

528 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18386 Answers

Are you a Microsoft Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...