Showing posts with label how firewall works. Show all posts
Showing posts with label how firewall works. Show all posts

How To Unblock Or hack Cyberoam To Access The Blocked Sites

· 0 comments

In my previous posts i have written about How Firewalls Works and Also about How To Block A Website. After that i hope you understand much about Firewall so now i will teach you How to unblock cyberoam.




Recently Our College has uploaded the Cyberoam client on the college server and we cannot access 90% sites through this ... whatever the site we want to open it says it was blocked by ur Administrator... what the f*ck sites like opera and firefox are blocked... Really ROFL... After Got fked up from this I am giving you all the Detailed and 100% working Hack for cyberoam and how to unblock any site in college as Most of the colleges have cyberoam Installed...

WHAT IS CYBEROAM ??

Cyberoam’s all-inclusive UTM solution offers a well-coordinated defense through tightly integrated best-of-breed security solutions over a single interface -Stateful inspection firewall, VPN, gateway anti-virus, gateway anti-spam, gateway anti-malware, intrusion prevention system (IPS), content filtering, bandwidth management (QoS), multiple link management and enhanced user-based reporting.
That means it maintains records "Who is Doing What" ?

HOW TO UNBLOCK CYBEROAM TO ACCESS BLOCKED SITES ??

First of all I will inform you all that cyberoam is highly secured internet client and it blocks all the types of proxies like http,CGI, socks(4/5), Ftp, highanonimity ...In short All..

As you all know that every Programmer leaves aleast a One Loop Hole in its Programming or software Design . Why I am saying this is because Cyberoam has also left this Loop Hole in its Design .. Now what is this loop Hole ??

Its HTTPS Loop HOLE...

HOW HTTPS WILL GOING TO UNBLOCK SITES ??

Https are SSL secured http clients ... and these are most secured Sites on the Network , that's why cyberoam Leaves it ..
Now the Main Point To access the Blocked sites you have to use the Https based Proxies.
Most of Https based Proxies are Paid so to search on Net for free Https Based Proxies is a Waste of Time...
I am Providing You the One Such Free Proxy service to access blocked Sites On the Cyberoam.
So feel free to surf anysite in your college ... the Best thing is that This site will not allow cyberoam Admin to track You ..


Click on the above Link and surf Freely any site in your college...You need to accept the certificate provided by the Site to Use It... As your web web browser show the Certificate accept statement at the First time you visit the Https Site.

How Firewalls Work

· 0 comments

I have also written about How To Unblock Cyberoam and How To Block A Website. But to know them you must have some knowledge about how firewall works so i made this post for my friends.

How Firewalls Work
 




Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network.


Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network.

How Firewalls Work


Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator. Most personal firewalls such as Windows firewall operate on a set of pre-configured rules that are most suitable under normal circumstances so that the user need not worry much about configuring the firewall.

Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers.  However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers. In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks. Thus in addition to security, a firewall can give the company a tremendous control over how people use the network.



Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:

1. Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.

2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.

Firewall Configuration
 


Firewalls can be configured by adding one or more filters based on several conditions as mentioned below:

1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set  filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.

2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.

3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.

4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.


Why Firewall?



Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more. The effectiveness of the security depends on the way you configure the firewall and how you set up the filter rules. However major threats such as DOS and DDOS attacks may sometimes manage to bypass the firewalls and do the damage to the server. Even though firewall is not a complete answer to online threats, it can most effectively handle the attacks and provide security to the computer up to the maximum possible extent.

Related Posts Plugin for WordPress, Blogger...

Contact Form

Name

Email *

Message *

Followers