Protection and restriction to the internet

Size: px
Start display at page:

Download "Protection and restriction to the internet"

Transcription

1 Dear wireless users, To allow all our users to enjoy quality browsing experience, our firewall has been configured to filter websites/applications to safeguards the interests of our student community in ensuring uninterrupted access to the Internet for academic purposes. In the process of doing this, the firewall will block access to the applications listed in the table below during peak hours (Weekdays: 8:30am to 5pm) which: o o o may potentially pose security hazards result in excessive use of bandwidth, thereby reducing access to online and educational resources by the larger student community could potentially result in violation of Malaysian Laws relating to improper and illegal use of the Internet Nevertheless, you may access the restricted websites/applications if they do not potentially pose any security hazards or violation of Malaysian law from our lab computers during our operation hours (Weekdays: 8:30am 9:30pm) or you may access via the wireless@ucti or wireless@apu network from your mobile devices after the peak hours. Internet services provided by the University should mainly be used for collaborative, educational and research purposes in support of academic activities carried out by students and staff. However, if there are certain web services which are essential to students' learning, please approach Technology Services to discuss how access could be granted by ing to network@apu.edu.my from your university with the following details: Restricted website/application that proposed to be unblocked Justification/reason for the website/application to be unblocked Thank you. Technology Services, Manager Asia Pacific University (APU) Technology Park Malaysia Bukit Jalil, Kuala Lumpur Malaysia Tel:

2 Restricted websites/applications Category Application Bypass Proxies and Tunnels Wujie/UltraSurf Battle.net Beanfun Game Call of Duty 4 Cga.com Chinagame CS Game Diablo GameTea/GameABC Hangame Legend Lineage MapleStory Nobol Our Game PK Game Pogo PopKart POPO Game QQ Farm QQ Game Realgame Sina Web Game Sohugame TEN Game Valve Steam Wolfenstein WOW Game Xbox LIVE 9158 Alicall BaiduHi Caihong Camfrog Dii ECP Etnano

3 Fetion Gadu-Gadu Google Talk Heyyo ICQ/AIM/iIM Imi IMVU Instan-t IPMSG IRC ISPQ Jctrans Kltx Kubao Lava-Lava Message Send Protocol MySpaceIM Netcall PaltalkScene PiIM POPO Qeshow QQ/TM Rediff BOL RenRen SOQ TELTEL Tlen UcTalk Userplane WinpopupX Wlt Xfire Yahoo Messenger Yoics AOL Mail Comcast COX

4 Network Protocols(2) Network Protocols(3) Excite Fastmail Gmx Mail Hushmail IlohaMail IMAP4 InfoSeek Mail Livedoor Mail.com Mail.ru MS Exchange Server NETEASE Mail NNTP Open Mail Optimum POP3 Roundcub Secureserver Sina Mail SMTP SquirrelMail Usermin Mail Yandex Service Status update (Sterling Software) Appletalk Update-Based Routing Pro. 100bao amule Anatomic ApexDC++ Ares Azureus BCDC++ Bearshare BitAnarch BitLord BitTorrent Series BT++ Btbbt Cabos CFos Speed

5 ClubBox DAAP Deepnet Explorer DianLei DirectConnect edonkey Series emule emule MorphXT emule Plus emulebt FastTrack FilePipe FileScope Foxy FreeWire G3 Torrent GNUnet Gnutella GoGoBox GreedBT Hydranode Kazaa Kazaa Lite Tools K++ Kceasy Lphant Maze MlDonkey MooPolice Morpheus mymusic MyNapster NEoNapster Pando Phex Poco PP365 PTC QQDownload RevConnect Rufus

6 SababaDC Share Shareaza Shareaza Plus Soulseek Thunder Series Torrentflux TorrentStorm TorrentTopia TrustyFiles Turbo Torrent TurboBT utorrent Vagaa Vuze Winny XBT Client XNap Yet ABC Zultrax Beinsync Danware Fastviewer GoToMyPC IBM Remote monitoring and Control MS Remote Desktop Protocol (RDP) Netviewer PCAnywhere Radmin Remote Secure Shell (SSH) Synergy Techinline Telnet VNC X11 Adobe Apple Avast AVG Avira

7 Social Network Duba Emsisoft F-Secure InstallAnyWhere Jiangmin Kaspersky Mcafee Mircosoft Windows Update NOD32 Norton Outpost Panda PCTools Sophos Spybot TrendMicro Yum Facebook Game 3TV 56.com ASF ASFV1 AVI Babelgum BARKS BBC-iplayer CNTV Cradio CSlive.tv Dailymotion FLV Freecast FreeeTV Funshion GVOD GYAO GysofTV Hulu ITVSky Justin.tv Ku6

8 KuGo TV LastFM Letv Live365 Livestation Meabox Metacafe Miro MMS MoodAmp Mop MOV MoveNetworks MP3 mp4 MPD Napster Netflix Netpd.org NicoNicoDouga Ooyala Orb Pandora Photobucket Player365 PPfilm PPStream PPVod QQLive QuickTime Qyule RealPlayer RMVB Rtlgemist SeeTV Shoutcast SinaTV SiriusXM Sohu TV SopCast Spotify

9 Voice over IP Web / Web 2.0 Web / Web 2.0 Web IM SqueezeCenter Stickam Streamaudio SWF Thunderkankan TTlive Tudou TudouVa TVUPlayer Uitzendinggemist Ustream.tv UUSee Vakaka X-TV Veetle VeohTV Vizrt System VLC Winamp Windows Media Player WMA WMV XiaoTV Yahoo Douga Youku Youtube Skype Evernote Google-earth Yahoo Web Messenger

1. Built-In SPI Firewall to Protect Your Enterprise Network 2. Multi-Spam-Filtering Function Providing High Spam-Filtering Accuracy

1. Built-In SPI Firewall to Protect Your Enterprise Network 2. Multi-Spam-Filtering Function Providing High Spam-Filtering Accuracy 1. Built-In SPI Firewall to Protect Your Enterprise Network BroadScan UTM core design is based on its Stateful Packet Inspection ( SPI ) firewall, providing complete firewall protection. By default, the

More information

22nd May 2008 GENEVA. THE NATIONAL COST OF VoIP BYPASS

22nd May 2008 GENEVA. THE NATIONAL COST OF VoIP BYPASS 3 rd Facilitation Meeting for WSIS Action Line C5 Building confidence and security in the use of ICT s 22nd May 2008 GENEVA VOICE OVER IP (VoIP) Presented by Graham Butler President & C.E.O Bitek International

More information

Voice over IP (VoIP)

Voice over IP (VoIP) Commission on Science and Technology for Development Eleventh session 26 30 May 2008 Voice over IP (VoIP) by Graham Butler President & C.E.O Bitek International Inc. The views expressed are those of the

More information

How To Control Your Computer With Watchguard Application Control

How To Control Your Computer With Watchguard Application Control Take Back Control: Increase Security, Empower Employees, Protect the Business Application Control White Paper October 2010 Introduction: Balancing Productivity with Security As workers find new and creative

More information

INTERNET USAGE GUIDE Revised 06/05/2014

INTERNET USAGE GUIDE Revised 06/05/2014 INTERNET USAGE GUIDE Revised 06/05/2014 Introduction Many of the Prime Student Housing, Inc. buildings are being supplied with Internet connectivity. We hope you will enjoy the always-on Internet connection.

More information

Take Back Control: Increase Security, Empower Employees, Protect the Business

Take Back Control: Increase Security, Empower Employees, Protect the Business Take Back Control: Increase Security, Empower Employees, Protect the Business Application Control White Paper October 2010 Introduction: Balancing Productivity with Security As workers find new and creative

More information

AscenFlow - P2P Solution

AscenFlow - P2P Solution AscenFlow - P2P Solution Background P2P (Peer-to-Peer) technology was firstly designed and widely used by file-sharing applications which allows users to download, share, and search files among one another.

More information

More information >>> HERE <<<

More information >>> HERE <<< More information >>> HERE http://dbvir.com/pcpandora/pdx/cc131/ Tags: pc pandora scam or work?-- vmware

More information

Safe internet: Getting Started Guide

Safe internet: Getting Started Guide Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

Supported Anti Virus from ESAP 2-6-1

Supported Anti Virus from ESAP 2-6-1 Supported Anti Virus from ESAP 2-6-1 avast! Antivirus (4.8.x) avast! Antivirus (4.x) avast! Antivirus (managed) (4.x) avast! Antivirus Professional (4.8.x) avast! Antivirus Professional (4.x) avast! Business

More information

Controlling the Use of Instant Messaging and Peer-to-Peer Applications with the Proventia Intrusion Prevention Appliances

Controlling the Use of Instant Messaging and Peer-to-Peer Applications with the Proventia Intrusion Prevention Appliances An Internet Security Systems White Paper Controlling the Use of Instant Messaging and Peer-to-Peer Applications with the Proventia Intrusion Prevention Appliances Updated August 2004 Controlling the Use

More information

Get In Control: Introducing XTM 11.4

Get In Control: Introducing XTM 11.4 Get In Control: Introducing XTM 11.4 Terry Leung Regional Director Southern China Agenda What s wrong with today s network security Users and applications are out of control WatchGuard s solution XTM 11.4

More information

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel Gregory Fresnais Director of International Business Development Email: gfresnais@bpointsys.com,

More information

From ISP/ICP Business Models to Internet Economics. Dah Ming Chiu Chinese University of Hong Kong

From ISP/ICP Business Models to Internet Economics. Dah Ming Chiu Chinese University of Hong Kong From ISP/ICP Business Models to Internet Economics Dah Ming Chiu Chinese University of Hong Kong Self introduction ~20 years in industry (Bell Labs, DEC, Sun Labs) in US and ~10 years as a professor in

More information

Architecture de Réseaux et Dimensionnement du Trafic

Architecture de Réseaux et Dimensionnement du Trafic Architecture de Réseaux et Dimensionnement du Trafic Isocore Europe Paris, France Téléphone : 33 (0) 1 72 81 34 09 www.isocore.com Bijan Jabbari, PhD bjabbari@isocore.com Sommaire/Outline Architecture

More information

æ æœ èªž English Deutsch Español Franà ais Italiano Polski æ æœ èªž æ± è - OS Windows OS Windows OS Mac App Manager ã ムã ンãƒ-ームã ã OS Windows

æ æœ èªž English Deutsch Español Franà ais Italiano Polski æ æœ èªž æ± è - OS Windows OS Windows OS Mac App Manager ã ムã ンãƒ-ームã ã OS Windows æ æœ èªž English Deutsch Español Franà ais Italiano Polski æ æœ èªž æ± è - OS Windows OS Windows OS Mac App Manager ã ムã ンãƒ-ームã ã OS Windows OS Mac TechBeatムムー㠹 TechBeatã ã æœ æ ã æš

More information

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent

More information

Approved Anti-Virus Software

Approved Anti-Virus Software Approved Anti-Virus Software AEC, spol. s.r.o. TrustPort Antivirus 2.x AhnLab, Inc. AhnLab Security Pack 2.x AhnLab V3 Internet Security 2007 Platinum 7.x AhnLab V3 Internet Security 7.0 Platinum Enterprise

More information

Help System. Table of Contents

Help System. Table of Contents Help System Table of Contents 1 INTRODUCTION 1.1 Features 2 GETTING STARTED! 2.1 Installation 2.2 Registration 2.3 Updates 3 VIEWING RECORDED DATA 3.1 Snapshots 3.2 Programs 3.3 Websites 3.4 Keystrokes

More information

Managing Ports and System Services using BT NetProtect Plus firewall

Managing Ports and System Services using BT NetProtect Plus firewall Managing Ports and System Services using BT NetProtect Plus firewall To work properly, certain programs (including web servers and file-sharing server programs) must accept unsolicited connections from

More information

List of Common TCP/IP port numbers

List of Common TCP/IP port numbers List of Common TCP/IP port numbers For those of you who configure firewalls, routers, port forwarding, and applications connectivity, this regularly updated document lists all standard, common, well known,

More information

User's voice. Safe Eyes. User 1: I was surprised how the tool was easy to install and configure. Comprehensibility:

User's voice. Safe Eyes. User 1: I was surprised how the tool was easy to install and configure. Comprehensibility: NAME Safe Eyes Company McAfee Version 6.0.244 Type of product Devices supported Operating systems Client Computer Windows XP Windows 7 Vista Mac OS (with some limitations on functionalities) Price* 1 year,

More information

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall 70 Lab #5 Lab #5 Assessment Spreadsheet A Review the default settings for Windows Firewall on your student workstation and indicate your settings below: GENERAL Recommended (Firewall On/Off) Don t Allow

More information

How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32)

How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32) NAME Windows Live Family Safety Company Microsoft Version 2012 Type of product Devices supported Operating systems Price* Client Computer Windows 7 (32 or 64 bit edition) Windows Vista Service Pack 2 Windows

More information

Verizon Family Protection Powered by McAfee. User Guide

Verizon Family Protection Powered by McAfee. User Guide Verizon Family Protection Powered by McAfee User Guide ii Contents Welcome to Verizon Family Protection Powered by McAfee User Guide 3 Setting up Family Protection 5 Managing your family's protection...6

More information

Products supported by ESAP 1.3.8 FIREWALL PRODUCTS: Product Name. AOL Firewall (1.x) AOL Privacy Wall (2.x) AVG 8.0 [Firewall] (8.

Products supported by ESAP 1.3.8 FIREWALL PRODUCTS: Product Name. AOL Firewall (1.x) AOL Privacy Wall (2.x) AVG 8.0 [Firewall] (8. Products supported by ESAP 1.3.8 FIREWALL PRODUCTS: Product Name AOL Firewall (1.x) AOL Privacy Wall (2.x) AVG 8.0 [Firewall] (8.x) AVG Firewall (7.x) AhnLab Security Pack (2.x) AhnLab V3 Internet Security

More information

Global Endpoint Security Market 2015-2019

Global Endpoint Security Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3097865/ Global Endpoint Security Market 2015-2019 Description: About Endpoint Security Endpoint security is a methodology that

More information

Towards the Detection of Encrypted Peer-to-Peer File Sharing Traffic and Peer-to-Peer TV Traffic Using Deep Packet Inspection Methods

Towards the Detection of Encrypted Peer-to-Peer File Sharing Traffic and Peer-to-Peer TV Traffic Using Deep Packet Inspection Methods Towards the Detection of Encrypted Peer-to-Peer File Sharing Traffic and Peer-to-Peer TV Traffic Using Deep Packet Inspection Methods August 2009! David Alexandre Milheiro de Carvalho Towards the Detection

More information

Global Security Software Market 2015-2019

Global Security Software Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3129404/ Global Security Software Market 2015-2019 Description: About Security Software Security software comprise a suite of security

More information

Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or

Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or desktop for their use while in training. If a recruit

More information

Kerio Control. User Guide. Kerio Technologies

Kerio Control. User Guide. Kerio Technologies Kerio Control User Guide Kerio Technologies 2016 Kerio Technologies s.r.o. Contents Viewing activity reports in Kerio Control Statistics............................. 5 Overview.................................................................

More information

Fully supported Antivirus software (Managed Antivirus)

Fully supported Antivirus software (Managed Antivirus) You are here: Antivirus > Managed Antivirus Vendors Fully supported Antivirus software (Managed Antivirus) Antivirus (AV) vendors often release software updates. We hard-code the update into our RMM agent

More information

Ad-Aware Total Security [Firewall] (3.x) Ad-Aware Total Security [Firewall] (3.x)

Ad-Aware Total Security [Firewall] (3.x) Ad-Aware Total Security [Firewall] (3.x) Host Checker - Security software recognition Products supported (by ESAP 1.7.6, Juniper terminology FIREWALL PRODUCTS: Marketing Name Display Name ALYac (2.x) ALYac (2.x) AOL Firewall (1.x) AOL Firewall

More information

Valid Anti-Spyware Packages as of 8/4/2015

Valid Anti-Spyware Packages as of 8/4/2015 Valid Anti-Spyware Packages as of 8/4/2015 360-Safe-Internet-Security 360-Safe-Total-Security AVG-2011 AVG-2012 AVG-2013 AVG-2014 AVG-2015 AVG-8.0 AVG-8.5 AVG-9.0 AVG-Anti-Spyware Ad-Aware-2007 Ad-Aware-2008

More information

F-SECURE INTERNET SECURITY 2012

F-SECURE INTERNET SECURITY 2012 NAME F-SECURE INTERNET SECURITY 2012 Company F-Secure Corporation Version 1.62 Type of product Devices supported Operating systems Client Computer Windows 7 (all editions) Windows Vista Windows XP Home,

More information

Products supported by ESAP 1.4.7 FIREWALL PRODUCTS:

Products supported by ESAP 1.4.7 FIREWALL PRODUCTS: Products supported by ESAP 1.4.7 FIREWALL PRODUCTS: Product Name AOL Firewall (1.x) AOL Privacy Wall (2.x) AVG 8.0 [Firewall] (8.x) AVG Firewall (7.x) AhnLab Security Pack (2.x) AhnLab V3 Internet Security

More information

Products supported by ESAP 1.4.8

Products supported by ESAP 1.4.8 Products supported by ESAP 1.4.8 FIREWALL PRODUCTS: Product Name AOL Firewall (1.x) AOL Privacy Wall (2.x) AVG 8.0 [Firewall] (8.x) AVG Firewall (7.x) AhnLab Security Pack (2.x) AhnLab V3 Internet Security

More information

What is Outlook.com and how can I use it?

What is Outlook.com and how can I use it? What is Outlook.com and how can I use it? Blog Post Date: August 6 th, 2012 Category: Technology made easy Author: Ulrika Hedlund Source: http://www.businessproductivity.com/ what-is-outlook-com-and-how-can-i-use-it

More information

Unit 4 Evaluating Web Mail Services

Unit 4 Evaluating Web Mail Services Unit 4 Evaluating Web Mail Services Traditional email is anything but cloud based. The type of email program you probably have installed on your PC uses a protocol called the Post Office Protocol (POP).

More information

Special Applications - Port List. Special Application Port List

Special Applications - Port List. Special Application Port List Search The Site! Power Search Tips Get the Newsletter! my@email HTML Text Home Networking Backgrounders Internet Sharing Security HowTo Troubleshooting Reviews News About Tools Forums Special Applications

More information

Controlling SSL Decryption. Overview. SSL Variability. Tech Note

Controlling SSL Decryption. Overview. SSL Variability. Tech Note Controlling Decryption Tech Note Overview Decryption is a key feature of the PA-4000 Series firewall. With it, -encrypted traffic is decrypted for visibility, control, and granular security. App-ID and

More information

Access 2013 55 4h15. Access 2010 55 4h10. Access 2007 36 2h14. Access 2007 (UK) 58 4h42. ACDSee 15 37 3h35. Acrobat Pro Extended 9 30 2h36

Access 2013 55 4h15. Access 2010 55 4h10. Access 2007 36 2h14. Access 2007 (UK) 58 4h42. ACDSee 15 37 3h35. Acrobat Pro Extended 9 30 2h36 Access 2013 55 4h15 Access 2010 55 4h10 Access 2007 36 2h14 Access 2007 (UK) 58 4h42 ACDSee 15 37 3h35 Acrobat Pro Extended 9 30 2h36 Acrobat Reader Pro XI 56 6h06 Adobe Reader X 19 1h33 Android 4.1 41

More information

ESAP 2.7.4 Release Notes

ESAP 2.7.4 Release Notes ESAP 2.7.4 Release Notes SDK Version: Mac and Windows 3.6.9845.2 (V2 Unified + V3). Note: The SDK embedded in this ESAP version has been tested and qualified to interoperate with a limited list of end

More information

Sagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services

Sagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services Sagari Ltd Service Catalogue and Service Level Agreement For Outsource IT Services Managed Services Service Level Agreement 1 Introduction This Service Catalogue and Service Level Agreement (SLA) constitutes

More information

EHLANZENI DISTRICT MUNICIPALITY PROXY FILTERING AND INTERNET ACCESS POLICY FOR 2012

EHLANZENI DISTRICT MUNICIPALITY PROXY FILTERING AND INTERNET ACCESS POLICY FOR 2012 EHLANZENI DISTRICT MUNICIPALITY PROXY FILTERING AND INTERNET ACCESS POLICY FOR 2012 1. OBJECT OF THE POLICY The purpose of this policy is to define standards for systems that monitor and limit web use

More information

This white paper is for informational purposes only. FaceTime makes no warranties, express or implied, in this document.

This white paper is for informational purposes only. FaceTime makes no warranties, express or implied, in this document. FaceTime RTG500 Real-time Security for the Real-time Enterprise White Paper This white paper is for informational purposes only. FaceTime makes no warranties, express or implied, in this document. Complying

More information

How To Secure Your Email From Being Hacked On A Pc Or Mac Or Ipad (For Free) For A Long Time (For A Long Period Of Time) For Free (For Commercial) For Your Money (For Business) For The Long Term

How To Secure Your Email From Being Hacked On A Pc Or Mac Or Ipad (For Free) For A Long Time (For A Long Period Of Time) For Free (For Commercial) For Your Money (For Business) For The Long Term CYBER-ATLAS TOOLKIT TOOLKIT: REFERENCES FREE EMAIL ENCRYPTION SOFTWARE BEFORE YOU START Limited functionality, limited capacity, limited usage, limited platforms or restrictions disallowing commercial

More information

State of the Art in Peer-to-Peer Performance Testing. European Advanced Networking Test Center

State of the Art in Peer-to-Peer Performance Testing. European Advanced Networking Test Center State of the Art in Peer-to-Peer Performance Testing European Advanced Networking Test Center About EANTC The European Advanced Networking Test Center (EANTC) offers vendor independent network quality

More information

Assuring Your Business Continuity

Assuring Your Business Continuity Assuring Your Business Continuity Q-Balancer Range Offering Business Continuity, Productivity, and Security Q-Balancer is designed to offer assured network connectivity to small and medium business (SME)

More information

How To Use The Dfl-M510 On A Network With A Dfl51 On A Pc Or Mac Or Ipa (Dfl) On A Pnet 2 (Dlf51) On An Ipa 2 (Net 2) On

How To Use The Dfl-M510 On A Network With A Dfl51 On A Pc Or Mac Or Ipa (Dfl) On A Pnet 2 (Dlf51) On An Ipa 2 (Net 2) On DFL-M510 FAQ D-Link Nordic Technical Support 1 FAQ Q: Why does the device memory usage exceed 80% right after start-up? Q: Why does D-Link strongly suggest not managing DFL-M510 from the Internet? Q: Do

More information

Henry Ford Health System Remote Access Support Details

Henry Ford Health System Remote Access Support Details Henry Ford Health System Remote Access Support Details Last Updated: March 5 th, 2014 Access Disclaimer: This document assumes that you already have an ID to access the Henry Ford Health System (HFHS)

More information

A Brief History of the Internet. Chris Brooks Computing, Python, and Robots

A Brief History of the Internet. Chris Brooks Computing, Python, and Robots A Brief History of the Internet Chris Brooks Computing, Python, and Robots Outline Prehistory Birth of the Internet The Web is Born The Dot-Com Gold Rush Web 2.0 - everything old is new again The future?

More information

Welcome to the UVU IT Help Desk

Welcome to the UVU IT Help Desk Welcome to the UVU IT Help Desk Agenda 1. Getting Procedures Help 2. Network & EMail 3. UVLink Portal 4. Professional Web Pages 5. Security 6. Outages & Emergencies 7. Software Getting Help Phone 863-8888

More information

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief App-ID Application Protocol Detection / Decryption Application Protocol Decoding Application Signature Heuristics App-ID uses as many as four identification techniques to determine the exact identity of

More information

Products supported by ESAP 1.5.3 FIREWALL PRODUCTS:

Products supported by ESAP 1.5.3 FIREWALL PRODUCTS: Products supported by ESAP 1.5.3 FIREWALL PRODUCTS: Product Name AOL Firewall (1.x) AOL Privacy Wall (2.x) AVG 8.0 [Firewall] (8.x) AVG Firewall (7.x) AhnLab Security Pack (2.x) AhnLab V3 Internet Security

More information

The Future of IP. As value shifts from connectivity to content

The Future of IP. As value shifts from connectivity to content The Future of IP As value shifts from connectivity to content Martin J. Steinmann Venture Partner Vesbridge Partners, LLC March 15, 2005 The Stupid Network is a Stupid Idea Stupid Networks lead to stupid

More information

BRING YOUR WORLD TOGETHER FEEL THE MUSIC EVERYWHERE - IP MULTIROOM AUDIO A NEW DIMENSION OF HOME ENTERTAINMENT

BRING YOUR WORLD TOGETHER FEEL THE MUSIC EVERYWHERE - IP MULTIROOM AUDIO A NEW DIMENSION OF HOME ENTERTAINMENT PRODUCT SPECIFICATIONS 2013 BRING YOUR WORLD TOGETHER ISIMPLEX HOME SERVER A NEW DIMENSION OF HOME ENTERTAINMENT ISIMPLEX MEDIA CENTER SPECIFICATIONS - HOME SERVER BRING YOUR WORLD TOGETHER HOME AUTOMATION

More information

List of Products supported by ESAP 2.2.1

List of Products supported by ESAP 2.2.1 List of Products supported by ESAP 2.2.1 Table of Contents Products supported on:... 2 Junos Pulse Secure Access Service 7.2Rx / Junos Pulse Access Control Service 4.2Rx... 2 Products supported on:...

More information

Catalogue de formations

Catalogue de formations Évaluation Play & g M u Pl COR ry S / LMS Directo ve Acti A Skillsoft Company 27 000 formations sur plus de 350 logiciels Catégories Nouveautés Tous Bureautique E-mail Internet Multimédia Périphérique

More information

Catalogue de formations

Catalogue de formations Prêt pour Windows 8.1 Office 365 20 000 formations sur plus de 450 logiciels Catégories Nouveautés Tous Bureautique E-mail Internet Multimédia Périphérique Sécurité Sites Internet Tchat Évaluation Catalogue

More information

Equipment Needed. Connecting to the Internet

Equipment Needed. Connecting to the Internet All resident students are provided with access to a high-speed Internet connection. Connection to this network is done at the students own risk. The College is not responsible for material viewed or downloaded

More information

Smart Radio Monitor (SRM) Mobile Raw Data Format

Smart Radio Monitor (SRM) Mobile Raw Data Format SMART RADIO MONITOR (SRM) Smart Radio Monitor (SRM) Mobile Raw Data Format By CLEMENT Francis, FOLLONI Gianluca, LUZARDI Stefano, MANDA Costin Version 2.0.1 Date: 13 April 2015 Smart Radio Monitor (SRM)

More information

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill david.idol@unc.edu http://www.cs.unc.edu/~mxrider

More information

GUESTGATE INTERNET ACCESS DEVICE USER MANUAL

GUESTGATE INTERNET ACCESS DEVICE USER MANUAL GUESTGATE INTERNET ACCESS DEVICE USER MANUAL MODEL 523240 INT-523240-UM-0606-02 TABLE OF CONTENTS section page 1. Introduction...3 Function Description......3 Installation Examples...5 GUESTGATE Function

More information

Protecting a Corporate Network with ViPNet. Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network

Protecting a Corporate Network with ViPNet. Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network Protecting a Corporate Network with ViPNet Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network Introduction Scope ViPNet technology protects information systems by means

More information

Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009

Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009 Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009 Gregory Fresnais gfresnais@bpointsys.com +33672510922 Director of International Business Development BreakingPoint Systems

More information

P2P Traffic Manager. L7 Internet Security. IP Appliance Products

P2P Traffic Manager. L7 Internet Security. IP Appliance Products IP Appliance Products P2P Traffic Manager L7 Internet Security Headquarter 13 Fl., Eunsung Bldg., 53-8 Cheongdamdong Kangnamgu Seoul, Korea 135-763 Tel +822-3446-6070 Fax +822-3445-9099 R&D Center 34 Gajeongdong,

More information

Three short case studies

Three short case studies Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.

More information

COMPUTER POLICIES AND SUPPORT

COMPUTER POLICIES AND SUPPORT COMPUTER POLICIES AND SUPPORT EMPLOYEE AGREEMENT ON USE OF EMAIL AND THE INTERNET I have read, understand, and agree to comply with the policies, rules, and conditions governing the use of Lindenwood University

More information

Peer-to-Peer Networks Status 2008 13th Week

Peer-to-Peer Networks Status 2008 13th Week Peer-to-Peer Networks Status 2008 13th Week Department of Computer Science 1 Peer to Peer Networks Situation 2008 2 2 Internet Traffic 1993-2004 3 3 Main Protocols 2004 Main protocols edonkey BitTorrent

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG Publishing RD Web Access with RD Gateway Part one Abstract In this short

More information

USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com

USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com 06-06-2008 1 2 CONTENTS 1. INTRODUCTION... 6 2. INSTALLATION STEPS... 7 3. SET-UP... 10 3.1. Filter status: Activating/ Deactivating...10

More information

Tunnels and Redirectors

Tunnels and Redirectors Tunnels and Redirectors TUNNELS AND REDIRECTORS...1 Overview... 1 Security Details... 2 Permissions... 2 Starting a Tunnel... 3 Starting a Redirector... 5 HTTP Connect... 8 HTTPS Connect... 10 LabVNC...

More information

Comparing BlackBerry Solutions

Comparing BlackBerry Solutions Comparing Solutions solution comparison chart Messaging features Enterprise Express Cloud s Supported messaging environments Microsoft Exchange, IBM Lotus Domino, and Novell GroupWise Microsoft Exchange

More information

Controlling P2P File-Sharing Networks Traffic

Controlling P2P File-Sharing Networks Traffic Controlling P2P File-Sharing Networks Traffic Miguel Garcia, Mohammed Hammoumi, Alejandro Canovas and Jaime Lloret Integrated Management Coastal Research Institute, Polytechnic University of Valencia C/

More information

The new popular Internet communication tools and the risks for the company information system

The new popular Internet communication tools and the risks for the company information system The new popular Internet communication tools and the risks for the company information system Jean-Luc Archimbaud CNRS/UREC http://www.urec.cnrs.fr EUROSEC 3 april 2006 Technical talk, not a CNRS official

More information

Cyber Essentials PLUS. Common Test Specification

Cyber Essentials PLUS. Common Test Specification Cyber Essentials PLUS Common Test Specification Page 1 Version Control Version Date Description Released by 1.0 07/08/14 Initial Common Test Specification release SR Smith 1.1 19/08/14 Updated Scope SR

More information

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security

More information

TCP/UDP # General Name Short Description

TCP/UDP # General Name Short Description This appendix is designed to provide general information about service ports that are discovered on IP networks. Outlined are ports 1-80, along with many other common higher ports and specific ports found

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Host Checker Security software requirements

Host Checker Security software requirements Host Checker Security software requirements In this document we describe requirements on security software in computers that are to be used together with the feature Host Checker in Telia Secure Remote

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink rvandenbrink@metafore.ca

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink rvandenbrink@metafore.ca VPNSCAN: Extending the Audit and Compliance Perimeter Rob VandenBrink rvandenbrink@metafore.ca Business Issue Most clients have a remote access or other governing policy that has one or more common restrictions

More information

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common

More information

Figure 41-1 IP Filter Rules

Figure 41-1 IP Filter Rules 41. Firewall / IP Filter This function allows user to enable the functionality of IP filter. Both inside and outside packets through router could be decided to allow or drop by supervisor. Figure 41-1

More information

Enterprise K12 Network Security Policy

Enterprise K12 Network Security Policy Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,

More information

Quality of Service (QoS)

Quality of Service (QoS) Net Neutrality Scott Jordan Department of Computer Science University of California, Irvine Quality of Service (QoS) more interactive less interactive telephone calls video conferencing Internet radio

More information

Distributed Systems. 2. Application Layer

Distributed Systems. 2. Application Layer Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social

More information

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012 Teleworking Technology Guide and Checklist UW Information Technology November 2012 1 Contents Teleworking Technology Guide for UW Faculty and Staff... 3 UW Information Technology Service Catalog and IT

More information

Internet Traffic and Content Consolidation

Internet Traffic and Content Consolidation Internet Traffic and Content Consolidation Craig Labovitz Chief Scientist, Arbor Networks S. Iekel-Johnson, D. McPherson Arbor Networks, Inc. J. Oberheide, F. Jahanian University of Michigan Talk Outline

More information

Configuring Your Gateman Proxy Server

Configuring Your Gateman Proxy Server Configuring Your Gateman Proxy Server A proxy server acts as an intermediary between a workstation users and the Internet to ensure security, administrative control, distribution of bandwidth and caching

More information

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF

More information

A Study of Technology in Firewall System

A Study of Technology in Firewall System 2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA), Langkawi, Malaysia A Study of Technology in Firewall System Firkhan Ali Bin Hamid Ali Faculty of Science Computer & Information

More information

Instant Messaging Service Reference

Instant Messaging Service Reference IceWarp Unified Communications Instant Messaging Service Reference Version 10.4 Printed on 16 April, 2012 Contents Instant Messaging 1 Reference... 2 General... 2 Services... 2 Trusted Hosts... 8 Archive/History...

More information