answersLogoWhite

0

given that a firewall is allows the elements in the transmission layer i.e tcp and udp this only gives the programmer one choice either set a maximum number of accesses at a time of a maximum at a particular time frame

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What would be a possible vulnerability or exploit that may lead to an attacker by passing the firewall?

Social engineering would not be a possible vulnerability or exploit that may lead to an attacker bypassing the firewall.


Suggest a way to control traffic during peak hours?

I had some suggestion on how to control the traffic. They can build an expressway that is convenient to the drivers. But this does not control the traffic. So ERP is the best way to control traffic. Other than that, the government could try putting some traffic police there.


Suggest a way to control traffic flow during peak hours.?

I had some suggestion on how to control the traffic. They can build an expressway that is convenient to the drivers. But this does not control the traffic. So ERP is the best way to control traffic. Other than that, the government could try putting some traffic police there.


What could the parliament not do?

Parliament could not effectively tax and control the colonies.


How can one find out what the function is of a firewall?

One can find the function of a firewall on various websites like Wikipedia and Dummies. One could also check his firewall in control panel and read what the function of a firewall is.


Can cruise control be dangerous?

Cruise control could be dangerous if used on wet/slippery roads or in heavy traffic.


Should a firewall policy only be concerned with in-bound traffic?

No. Concerning yourself with just the outside threats is one-sided - an infected computer could join the network or a networked computer could be infected through means other than the Internet itself (like inserting an infected pendrive), and that computer would then become a threat not just to the network behind the firewall, but also the Internet at large. Monitoring inbound traffic is a way to stop incoming infections, but a firewall should be configured to catch threats inside (and outbound) as well, in order to help stop the infection from spreading when it's already "in".


What can automatically detect and deny network access to a host whose traffic patterns appear suspicious?

well, a firewall could do it, but an Intrusion Prevention System is the more obvious answer.


Why cant you get spark in your 1992 Chevy s10 blazer?

Could be the ESC (Electronic Spark Control) mounted to the center of the firewall under the hood.


How do you get out of a traffic ticket for disobeying traffic control device that is not specified?

You probably don't. You could try going to court and hoping the officer who issued the citation doesn't show up.


How do you block webinars on your router's firewall?

As you have probably noticed, is it not easy anymore with a standard firewall to block these kinds of applications. A few years a new trend has been launched so that most appliacations will pass port 80 (http) or 443 (https) . A good example for this is skype. In 2010 you could block the Skype service by blocking a port on your firewall. Now these days skype works on port 443 (Https). So with a regular firewall you can't see iif the HTTPS legimate or not.You have newer firewalls ( brands like Palo Alto, Juniper Networks, Barracuda Networks, ...) who have build a new kind of firewall (they call it the next generation firewall). It gives you the possibilty to define traffic and create policies for these kind of traffic depending on your LDAP structure.Conclusion:If you have a standard firewall: noIf you have a NG firewall: Yes


What does a firewall do?

Firewall is a piece of software that creates a barrier between Internet and your PC. In short, Firewall analyzes the traffic that goes from and to your computer and blocks such packets (traffic) that could hurt your computer.