Page 200 - PYTHON-12
P. 200

website on the user’s hard disk. The information is stored in the form of name value pair. Generally,
               the cookies folder is stored in c:\windows\cookies.
               Working of Cookies

               1.  The user enters the name of the website on the browser.

               2.  The browser contacts the DNS server to convert the domain name into IP address. The browser
                   looks for the cookies on the hard disk.
               3.  The IP address is used to contact the corresponding server along with cookies data.

               4.  If no cookies data is supplied, then the website comes to know that the user is visiting the
                   website for the first time.
               5.  The server creates an ID of a person which is then stored by cookies on the hard disk.

               The information which is stored by a website is known as state information. The information can
               be of the following types:

               1.  How many visitors have visited the site?
               2.  How many are new visitors?

               3.  How many are repeat visitors?
               4.  What is the frequency of a particular visitor?

                 CTM: Cookies are the messages which are stored by the website on a user’s hard disk whenever they visit
                 any website.


               8.24 FIREWALL


               A firewall  is a  software that  protects the private network  from unauthorized user access. The
               firewall filters the information coming from the internet to the network or a computer to protect
               the system. Firewall exists both as a software solution and as a hardware application. In the form
               of hardware firewall such as router, it protects the network, and in terms of software firewall, it
               helps in preventing the spread of virus from one computer to another. A firewall is a network
               security system, either hardware- or software-based, that controls incoming and outgoing network
               traffic based on a set of rules. Various examples of firewalls are CISCO firewall, NetGear firewall,
               Netscreen 25, etc.
               A firewall can use various methods for filtering the information such as:

               1.  Packet filtering: In packet filtering, the data, which is outgoing or incoming in the form of
                   packets, is filtered. Packet filter looks at each packet entering or leaving the network and accepts
           Computer Science with Python–XII  8.46 2.  Proxy service: The information which is requested is not directly sent to the person who
                   or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to
                   users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.



                   makes the request; rather, the information is first received in firewall and then sent to the
                   proxy server. The proxy server intercepts all messages entering and leaving the network and
                   effectively hides the true network addresses.

               3.  IP address blocking: If the data is coming from a network or website that contains some
                   unwanted data, then the data from that particular IP address or domain name is blocked by
                   firewall.
   195   196   197   198   199   200   201   202   203   204   205