How you can achieve the desired telnet effect

Assignment Help Basic Computer Science
Reference no: EM131045566

Suppose you want your filter-based firewall to block all incoming Telnet connections, but to allow outbound Telnet connections. One approach would be to block all inbound packets to the designated Telnet port (23).

(a) We might want to block inbound packets to other ports as well, but what inbound TCP connections must be permitted in order not to interfere with outbound Telnet?

(b) Now suppose your firewall is allowed to use the TCP header Flags bits in addition to the port numbers. Explain how you can achieve the desired Telnet effect here while at the same time allowing no inbound TCP connections.

Reference no: EM131045566

Questions Cloud

Implements the nonlinear finite-difference method : A MATLAB function shoot.m that implements the Nonlinear Shooting method, a MATLAB function fd.m that implements the Nonlinear Finite-Difference method, and a MATLAB script main.m that solves the given BVP and plots the approximated solutions
Client sends ack, and the two proceed using stop-and-wait : How does the extra information in your revised protocol protect against arrival of late packets from prior connection incarnations, and sequence number wraparound?
What is your subjective response to the poem as a whole : What is your subjective response to the poem as a whole? Why? Highlight moments that give you a strong reaction. Why do you think these passages elicit that response?
Which usually executed the event for american : Which usually executed the event for american, " the person talked about by having a snicker. Underneath 500 months to continue!
How you can achieve the desired telnet effect : Now suppose your firewall is allowed to use the TCP header Flags bits in addition to the port numbers. Explain how you can achieve the desired Telnet effect here while at the same time allowing no inbound TCP connections.
Sixty cases of corn brown or clark : Brown, located in Knoxville, contracted to buy sixty cases of Lovely Brand canned corn from Clark in Toledo at a contract price of $1,250. Pursuant to the contract, Clark selected and set aside sixty cases of Lovely Brand canned corn and tagged th..
Explain the different types of decisions : a. What is it that managers do when they make decisions? b. Explain the different types of decisions 1000-1200 words required.
Advantages and disadvantages of minimum wage laws : Discussion of both the advantages and disadvantages of minimum wage laws - The U.S. Department of Labor has imposed a minimum wage since 1938. Most states mandate minimum hourly wage rates, too.
Scripto mechanical pencils : A college student on her way to take an exam remembers that she doesn't have a pencil with an eraser--which the instructor asked everyone to bring. The store where she stops doesn't have regular pencils--but it does sell Scripto mechanical pencils..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Convenient way to document a system events

A use case is a convenient way to document a system's events. It serves as a kind of table of contents for the business events and activities that must be supported by the system. It will be used to identify how the system will be used and which a..

  Manual park button and the application accurately

As an application tester, I want to press the manual park button and the application accurately records the location of the intended vehicle. The ratio of successes to failures will be recorded to report to the development team.

  Assignment is to use social science inquiry skills

The objective of the assignment is to use social science inquiry skills such as analyzing claims

  Perform a risk assessment of teller-s computer

Tellers at each branch use a four-digit numeric password, and each teller's computer is transaction-coded to accept only its authorized transactions. Perform a risk assessment.

  Know how to process command line arguments

Through this programming assignment, the students will learn to do the following: Know how to process command line arguments. Perform basic file I/O.

  Development tools for cloud solutions

Explain the benefits and drawbacks of using software development tools provided by cloud vendors to develop cloud-based solutions for an organization.

  Create a binary heap class in python

1. Create a binary heap class in python. 2.The Heap class should have a limited heap size.(the heap only keeps track of the n most important items) 3. pass the max heap size in the constructor. (If an element gets added to the heap that makes it grow..

  Deliver software to a schedule

You are asked by your manager to deliver software to a schedule that you know can only be met by asking your project team to work unpaid overtime.

  Describes the ideal information security system

Write a 1500 to 1750 word paper that describes the ideal information security system plan for one of the following organization types: hospital, bank, manufacturer, online wholesale enterprise, department store, state revenue agency.

  Discuss some of the various programming pitfalls and mistake

Explain why you believe the techniques do not transfer between VISUAL BASIC & C# programming languages.Give detailed example of your experiences.

  Determining the obvious brute-force algorithm

Write a program that reads N points in a plane and outputs any group of four or more colinear points (i.e., points on the same line). The obvious brute-force algorithm requires O(N4) time. However, there is a better algorithm that makes use of sort..

  How might a cio with a larger budget have an advantage

How might a CIO with a larger budget have an advantage over Sadiq Rowther at J&J Philippines?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd