Explain the concepts of nat and ipv6

Assignment Help Operating System
Reference no: EM1379565

Question: At present we have a huge problem with advertising corporations which are making profiles of people by collecting their information. With IPv6, this task would be much easier because if they found the user's identity of a specific IP address, then they would use the IP address to collect the information easier. Imagine if they know the IP addresses of your home connection, of your mobile phone, the IP address of the PC in your work. They would be able to know almost any electronic action you make.

Do you think that this scenario would be true or would be other ways to hide our identity?

 

Reference no: EM1379565

Questions Cloud

Designing and coding : Prepare a database with a table called tblNames and tbl Login. The tbl Names table should have the following columns.
Implementing a data warehouse project : Assume you are implementing a data warehouse project for a consumer and require to evaluate the many tools available for extracting, transforming, and loading data into the data warehouse from several sources.
Dns security measurements : Having a Domain Name Server available to the public can be a tool in the hand for attackers. If anyone is able to use your Domain Name Server, they can use it to send a huge amount of traffic to their victim.
Multicast service model in the internet : Those applications that do not need a high level of reliability for operations can use the Minimalist Internet Multicast service model, like streaming of continues information in the forms of audio or video
Explain the concepts of nat and ipv6 : At present we have a huge problem with advertising corporations which are making profiles of people by collecting their information.
Finding server side software : Find the Internet to search server side software that is needed to be installed on the hospital's servers to support access by your local hospital doctors to patients' data using their cellular phones or PDAs.
Performing the maintenance : A hard drive must be managed to be used most efficiently. This maintenance with deleting old files, defragmenting a drive so that it does not waste space, as well as, from time to time, discovering and attempting to correct disk failures.
Explaining the type of firewall : Can you think of conditions that call for multiple firewalls on the similar network or similar network segment? Discuss why might you firewall off two or more connections into a subnetwork?
Stateful inspection packet filtering routers : Name two benefits of Stateful Inspection Packet Filtering Routers. Name two benefits that firewalls add to a network

Reviews

Write a Review

Operating System Questions & Answers

  Design virtual memory system for new operating system

You are asked to design the virtual memory system for a new operating system working on small mobile devices. The memory operates at 333 MHz with a word size of 4 bytes.

  Discuss and provide examples of mutual exclusion

Discuss and provide examples of the following concurrency issues associated with an OS: 1. Mutual exclusion 2. Deadlock 3. Starvation

  Explaining first-in-first-out scheduling

Qqueue for service (if the server process is busy servicing another request). Requests in queue are served according to the scheduling policy in use: First-In-First-Out (FIFO) scheduling.

  Assessing security risks

In your new position at XYZ Company, you have been asked to lead a risk assessment group. As part of your assignment to assess security risks for the computing infrastructure.

  Describe three solutions to critical section problem

Describe three solutions to critical section problem Explain the different methods used to handle deadlocks Distinguish between "No preemption" and "circular wait" in deadlocks prevention

  Discuss five computer forensics tools

Use Library and internet resources to analyze five computer forensics tools. For each tool, list the vendor and its functions.

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Explian wired and wireless media

Discuss and explian wired and wireless media along with the drawbacks and benefits of each also Discuss the channel signaling systems used in voice communication along with the drawbacks and benefits of each.

  Explain basic network security concepts

Explain an example of the Public Key Infrastructure that would describe the differing usages of symmetric and asymmetric encryption and how these encryption technique might use either a substitution or a transposition cipher.

  How unix administrator distribute the message

I was recently working on our mainframe UNIX system, and suddenly I received a message that the server required to be rebooted on my screen.

  Productivity across an organization

Explain how does an company weigh the require to share data to the maximum extent to fully utilize this resource for productivity across an organization.

  Database statistics

In an RDBMS, how are the three phases parsing, execution, and fetching carried out? In general, in which phase would you tune a database? Determine database statistics and why are they important.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd