SlideShare a Scribd company logo
1 of 33
Net Defender  By: Krishna Maddikara  Tuesday, May 2, 2001 SC 546
Synopsis of Presentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Issues Today: ,[object Object],[object Object],[object Object]
What are the Issues & Problems? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Who are the intruders? ,[object Object],[object Object],[object Object],[object Object]
Motives: ,[object Object],[object Object],[object Object],[object Object]
Possible Attacks: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Example of  DoS attack: Intruder Target ICMP request with spoofed IP of target
Example of  DoS attack: Intruder Target Flood Target with replies
[object Object],[object Object]
Net Defenders
What is Net Defender? ,[object Object],[object Object]
Net defender Problem Statement Developing a simple Firewall for securing Personal Computer from unauthorized access through Internet or network by  novice and advanced users.
Objective of Net defender  Net Defender software is being designed keeping in mind a novice user (those who knows very less about networking or computers).  We had laid a great deal of stress in providing a sound user interface so that a general user should learn how to use and control this firewall in simple and easy steps.
REQUIREMENT ANALYSIS ,[object Object],[object Object],[object Object]
General System and Interface Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Main Screen Firewall has a simple user interface that gives you instant access to all your security features
Add Rule : This dialog box will help in adding new rules to Firewall. To create a rule, you must first specify the kind of traffic that should be affected by the rule. There are several different characteristics of traffic, each of which you can use to specifythe kind of traffic that you  want to control .
Port Scanner: ,[object Object]
Well-known ports used by  TCP Port Protocol Description     7 Echo Echoes a received datagram back to the sender      9 Discard Discards any datagram that is received    11 Users Active users    13 Daytime Returns the date and the time    17 Quote Returns a quote of the day    19 Chargen Returns a string of characters    20 FTP, Data File Transfer Protocol (data connection)    21 FTP, Control File Transfer Protocol (control connection)    23 TELNET Terminal Network    25 SMTP Simple Mail Transfer Protocol    53 DNS Domain Name Server     67 BOOTP Bootstrap Protocol    79 Finger Finger     80 HTTP Hypertext Transfer Protocol 111 RPC Remote Procedure Call
How do Firewalls work? ,[object Object],[object Object],  Courtesy  http://www.vicomsoft.com/knowledge/reference/firewalls1.html
Filtering based on Port ,[object Object],[object Object],[object Object],  Courtesy  http://www.vicomsoft.com/knowledge/reference/firewalls1.html
Filtering Based on Address ,[object Object],[object Object]
How Net Defender prevent ,[object Object]
Preventing Compromises and Vulnerabilities ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Port Scanner: ,[object Object],[object Object],[object Object],[object Object]
Working of the filter: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Prevention: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Direction of Internet Vulnerabilities ,[object Object],[object Object],[object Object],[object Object]
Direction of Internet Security ,[object Object],[object Object],[object Object],[object Object]
Future Improvements: ,[object Object],[object Object]
We would like to thank: ,[object Object],[object Object],[object Object],[object Object],Thank you

More Related Content

What's hot

Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Firewall management introduction
Firewall management introductionFirewall management introduction
Firewall management introductionRaghava Sharma
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeleyjoebeone
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purposeRohit Phulsunge
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - IIITAMBEMAHENDRA1
 
Chapter 12
Chapter 12Chapter 12
Chapter 12cclay3
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilitiesG Prachi
 
Network Security
Network SecurityNetwork Security
Network Securityphanleson
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...skpatel91
 

What's hot (20)

Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
 
Firewall management introduction
Firewall management introductionFirewall management introduction
Firewall management introduction
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Fire wall security
Fire wall securityFire wall security
Fire wall security
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
Firewall
FirewallFirewall
Firewall
 
Network Security
Network SecurityNetwork Security
Network Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
 

Viewers also liked

We b development trends
We b  development  trendsWe b  development  trends
We b development trendsRajib Ahmed
 
Kulturkartläggnings processen
Kulturkartläggnings  processenKulturkartläggnings  processen
Kulturkartläggnings processenLina Ydrefelt
 
From research student to academic: thinking about and preparing for academic ...
From research student to academic: thinking about and preparing for academic ...From research student to academic: thinking about and preparing for academic ...
From research student to academic: thinking about and preparing for academic ...Joss Winn
 
Nostaljik Reklamlar
Nostaljik ReklamlarNostaljik Reklamlar
Nostaljik Reklamlarhalid şen
 
Zima sisljavic
Zima sisljavicZima sisljavic
Zima sisljavicGavranica
 
Sharing Data Sets to Personalize Learning
Sharing Data Sets to Personalize LearningSharing Data Sets to Personalize Learning
Sharing Data Sets to Personalize LearningHendrik Drachsler
 
Повышение эффективности медийных рекламных кампаний — Юлия Микеда
Повышение эффективности медийных рекламных кампаний  — Юлия МикедаПовышение эффективности медийных рекламных кампаний  — Юлия Микеда
Повышение эффективности медийных рекламных кампаний — Юлия МикедаMaria Podolyak
 
Android Abc2009 Fall Shima091130 1
Android Abc2009 Fall Shima091130 1Android Abc2009 Fall Shima091130 1
Android Abc2009 Fall Shima091130 1shimay
 
Online Masterclass Learning Analytics
Online Masterclass Learning Analytics Online Masterclass Learning Analytics
Online Masterclass Learning Analytics Hendrik Drachsler
 
Eurocham PSI seminar Hong Kong
Eurocham PSI seminar Hong KongEurocham PSI seminar Hong Kong
Eurocham PSI seminar Hong Kongvalrit
 
Hoe ontwerp je een effectief leernetwerk?
Hoe ontwerp je een effectief leernetwerk?Hoe ontwerp je een effectief leernetwerk?
Hoe ontwerp je een effectief leernetwerk?Hendrik Drachsler
 

Viewers also liked (20)

Unit 2.6
Unit 2.6Unit 2.6
Unit 2.6
 
London magento
London magentoLondon magento
London magento
 
M02 un07 p02
M02 un07 p02M02 un07 p02
M02 un07 p02
 
We b development trends
We b  development  trendsWe b  development  trends
We b development trends
 
Kulturkartläggnings processen
Kulturkartläggnings  processenKulturkartläggnings  processen
Kulturkartläggnings processen
 
From research student to academic: thinking about and preparing for academic ...
From research student to academic: thinking about and preparing for academic ...From research student to academic: thinking about and preparing for academic ...
From research student to academic: thinking about and preparing for academic ...
 
Nostaljik Reklamlar
Nostaljik ReklamlarNostaljik Reklamlar
Nostaljik Reklamlar
 
Zima sisljavic
Zima sisljavicZima sisljavic
Zima sisljavic
 
Sharing Data Sets to Personalize Learning
Sharing Data Sets to Personalize LearningSharing Data Sets to Personalize Learning
Sharing Data Sets to Personalize Learning
 
Real time web
Real time webReal time web
Real time web
 
Повышение эффективности медийных рекламных кампаний — Юлия Микеда
Повышение эффективности медийных рекламных кампаний  — Юлия МикедаПовышение эффективности медийных рекламных кампаний  — Юлия Микеда
Повышение эффективности медийных рекламных кампаний — Юлия Микеда
 
Unit 2.1 Part 4
Unit 2.1 Part 4Unit 2.1 Part 4
Unit 2.1 Part 4
 
Android Abc2009 Fall Shima091130 1
Android Abc2009 Fall Shima091130 1Android Abc2009 Fall Shima091130 1
Android Abc2009 Fall Shima091130 1
 
M02 un10 p01
M02 un10 p01M02 un10 p01
M02 un10 p01
 
Online Masterclass Learning Analytics
Online Masterclass Learning Analytics Online Masterclass Learning Analytics
Online Masterclass Learning Analytics
 
Eurocham PSI seminar Hong Kong
Eurocham PSI seminar Hong KongEurocham PSI seminar Hong Kong
Eurocham PSI seminar Hong Kong
 
Chapter2
Chapter2Chapter2
Chapter2
 
Hoe ontwerp je een effectief leernetwerk?
Hoe ontwerp je een effectief leernetwerk?Hoe ontwerp je een effectief leernetwerk?
Hoe ontwerp je een effectief leernetwerk?
 
We love Aso!
We love Aso!We love Aso!
We love Aso!
 
2.4 Text in HTML
2.4 Text in HTML2.4 Text in HTML
2.4 Text in HTML
 

Similar to Net Defender (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall
FirewallFirewall
Firewall
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Network security
Network securityNetwork security
Network security
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
 
Day4
Day4Day4
Day4
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Net Defender

  • 1. Net Defender By: Krishna Maddikara Tuesday, May 2, 2001 SC 546
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Example of DoS attack: Intruder Target ICMP request with spoofed IP of target
  • 9. Example of DoS attack: Intruder Target Flood Target with replies
  • 10.
  • 12.
  • 13. Net defender Problem Statement Developing a simple Firewall for securing Personal Computer from unauthorized access through Internet or network by novice and advanced users.
  • 14. Objective of Net defender Net Defender software is being designed keeping in mind a novice user (those who knows very less about networking or computers). We had laid a great deal of stress in providing a sound user interface so that a general user should learn how to use and control this firewall in simple and easy steps.
  • 15.
  • 16.
  • 17. Main Screen Firewall has a simple user interface that gives you instant access to all your security features
  • 18. Add Rule : This dialog box will help in adding new rules to Firewall. To create a rule, you must first specify the kind of traffic that should be affected by the rule. There are several different characteristics of traffic, each of which you can use to specifythe kind of traffic that you want to control .
  • 19.
  • 20. Well-known ports used by TCP Port Protocol Description     7 Echo Echoes a received datagram back to the sender      9 Discard Discards any datagram that is received    11 Users Active users    13 Daytime Returns the date and the time    17 Quote Returns a quote of the day    19 Chargen Returns a string of characters    20 FTP, Data File Transfer Protocol (data connection)    21 FTP, Control File Transfer Protocol (control connection)    23 TELNET Terminal Network    25 SMTP Simple Mail Transfer Protocol    53 DNS Domain Name Server    67 BOOTP Bootstrap Protocol    79 Finger Finger    80 HTTP Hypertext Transfer Protocol 111 RPC Remote Procedure Call
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.

Editor's Notes

  1. Frequently, presenters must deliver material of a technical nature to an audience unfamiliar with the topic or vocabulary. The material may be complex or heavy with detail. To present technical material effectively, use the following guidelines from Dale Carnegie Training®.   Consider the amount of time available and prepare to organize your material. Narrow your topic. Divide your presentation into clear segments. Follow a logical progression. Maintain your focus throughout. Close the presentation with a summary, repetition of the key steps, or a logical conclusion.   Keep your audience in mind at all times. For example, be sure data is clear and information is relevant. Keep the level of detail and vocabulary appropriate for the audience. Use visuals to support key points or steps. Keep alert to the needs of your listeners, and you will have a more receptive audience.