azi_asmar.tripod.com
[My Personal Site]
(Laman ini bukan untuk tatapan umum, hanya untuk diriku saja... tapi kalau nak baca.. suka hatilah, tak siapa tanggung kalau wrong information atau sebaliknya)


                                                                                                                                     Copyright © 1996
Menu
Biodata
Bola Oh Bola....
Virus .. kenapa kau...
Kota London
Malunya aku..Malangnya aku...
Letihnya aku...
Anugerah Khidmat Cemerlang
Anugerah Kualiti RTM
Definasi Virus Vs Worm
Senyum
User Policy
Mesyuarat ASEAN COCI
Transcending The Divide
Transforming M'sia into K
Anugerah HP
Politik..oh politik
Masalah Dalam Era Komputer
Tracing-IP
ICT in Agriculture
Semoga Allah cucuri rahmat..
Technological change
Langkah Menuju Kesempurnaan Iman
Bagaimana nak buat Neon Glow
Communication is more than email.
Perkamusan Melayu Dalam Era IT
Pembelajaran Bahasa Melayu SMART
Securing the Corporate Network: Internet Firewalls
Security: Keeping Hackers Out
Merdeka..Merdeka...
Sukom 98....letihnya
What Is Firewall
Apa itu Rangkaian?
Syukur
Good Security Usage Policy
Ya Rasulullah
Access to Intenet : an example Policy
WWW -definasi
ISDN
Internet - definasi
Alamat Internet boleh guna nama sendiri
Rumah Pintar
Bagaimana Internet Berfungsi
Bridge
Cipher
Cryptography
Digital Certificate
Dilema Eksploitasi melalui Internet
DMZ
Denial of Service
Encryption
FTP
Gateway
Antara Gembar-Gembur Dan Realiti Internet
Ghost imaging
HTTP
Hub
Invasion of Privacy
Destruction of Properties
Infrared radiation
Internet: Dunia Tanpa Sempadan
Siapa Yang Patut Disalahkan? Internet, maklumat atau manusia?
Kafe Siber: Pengusaha, Remaja dan Internet
Melindungi katalaluan
Apa itu Komuniti Maya?
Layer 3
Masalah pentadbir teknologi maklumat
NAT
NFS
Penyalahgunaan Siber
PKI (public key infrastructure)
Proxy Server
Kecenderungan remaja sekolah memilih hiburan di Internet
Repeater
Risiko Kesihatan dalam Penggunaan Komputer
Router

 

DMZ

 

In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network. It prevents outside users from getting direct access to a server that has company data. (The term comes from the geographic buffer zone that was set up between North Korea and South Korea following the UN "police action" in the early 1950s.) A DMZ is an optional and more secure approach to a firewall and effectively acts as a proxy server as well.
In a typical DMZ configuration for a small company, a separate computer (or host in network terms) receives requests from users within the private network for access to Web sites or other companies accessible on the public network. The DMZ host then initiates sessions for these requests on the public network. However, the DMZ host is not able to initiate a session back into the private network. It can only forward packets that have already been requested.

Users of the public network outside the company can access only the DMZ host. The DMZ may typically also have the company's Web pages so these could be served to the outside world. However, the DMZ provides access to no other company data. In the event that an outside user penetrated the DMZ host's security, the Web pages might be corrupted but no other company information would be exposed. Cisco, the leading maker of routers, is one company that sells products designed for setting up a DMZ.