SlideShare a Scribd company logo
Using an Intranet Within a Company
                Group C Presentation

●   CGI
●   Intranet
●   Exterior router
●   Firewall
CGI
●   CGI is a mechanism to run a program from Web
    browser's demand.
●   It actually tends for Perl etc. to be often used
    though CGI can use any development
    language.
Intranet
●   Intranet (Intranet) is an approach to which it
    tries to raise lowering the cost and vender
    independence by using standard technology of
    the Internet when computer network in limited
    range such as in-house is constructed.
Exterior router
●   Exterior router is a router connected with the
    AURP tunnel.
●   The AppleTalk packet is done and
    encapsulation and the opposite operation are
    done to other protocol headers.
Firewall
●   The firewall is system's that prevents it from
    invading the computer network in the
    organization from the outside.
●   Computer moreover which such a system is
    built in.
Citation
●   E-Word
http://e-words.jp/
●   Wikipedia
http://ja.wikipedia.org/wiki/
●   CISCO
http://www.cisco.com/japanese/warp/public/3/jp/s
  ervice/info/tips/terms/index.shtml

More Related Content

PDF
Владимир Махитко - Automotive security. New challenges
PDF
Week13pre
PDF
Embedded government espionage
PPT
Ppt Amenta
PPTX
2003 g7 energia nuclear 2003
PDF
PPT
G9 energia nuclear e biomassa(turma 3002)
PDF
Владимир Махитко - Automotive security. New challenges
Week13pre
Embedded government espionage
Ppt Amenta
2003 g7 energia nuclear 2003
G9 energia nuclear e biomassa(turma 3002)

Similar to Gp4 (20)

PDF
week13-EP3
PDF
Shape your remote connection to your GCE instance
PDF
Presentation 13all
PDF
Week13
PDF
Week13pre
PDF
English Week13
PDF
Week13
PDF
platform without vendor lock-in
PDF
Platform without vendor lock-in
PDF
L2 B Embedded Systems
PDF
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
PPTX
A Kernel of Truth: Intrusion Detection and Attestation with eBPF
PDF
IoT em tempo real com Firebase e JavaScript
PPTX
21 Network Programmability and Automation (1).pptx
PDF
Autoencoders
PDF
OWASP Poland Day 2018 - Dani Ramirez - IPMI hacking
PDF
Week14
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
Pluggable Infrastructure with CI/CD and Docker
PPTX
Aymeric Weinbach - IoT et Azure - Global Azure Bootcamp 2016 Paris
week13-EP3
Shape your remote connection to your GCE instance
Presentation 13all
Week13
Week13pre
English Week13
Week13
platform without vendor lock-in
Platform without vendor lock-in
L2 B Embedded Systems
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
A Kernel of Truth: Intrusion Detection and Attestation with eBPF
IoT em tempo real com Firebase e JavaScript
21 Network Programmability and Automation (1).pptx
Autoencoders
OWASP Poland Day 2018 - Dani Ramirez - IPMI hacking
Week14
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
Pluggable Infrastructure with CI/CD and Docker
Aymeric Weinbach - IoT et Azure - Global Azure Bootcamp 2016 Paris
Ad

Recently uploaded (20)

PDF
Hybrid model detection and classification of lung cancer
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Hybrid model detection and classification of lung cancer
WOOl fibre morphology and structure.pdf for textiles
Zenith AI: Advanced Artificial Intelligence
Chapter 5: Probability Theory and Statistics
Heart disease approach using modified random forest and particle swarm optimi...
Digital-Transformation-Roadmap-for-Companies.pptx
Hindi spoken digit analysis for native and non-native speakers
SOPHOS-XG Firewall Administrator PPT.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Tartificialntelligence_presentation.pptx
Programs and apps: productivity, graphics, security and other tools
Enhancing emotion recognition model for a student engagement use case through...
A novel scalable deep ensemble learning framework for big data classification...
MIND Revenue Release Quarter 2 2025 Press Release
Group 1 Presentation -Planning and Decision Making .pptx
Assigned Numbers - 2025 - Bluetooth® Document
A comparative study of natural language inference in Swahili using monolingua...
A comparative analysis of optical character recognition models for extracting...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Ad

Gp4

  • 1. Using an Intranet Within a Company Group C Presentation ● CGI ● Intranet ● Exterior router ● Firewall
  • 2. CGI ● CGI is a mechanism to run a program from Web browser's demand. ● It actually tends for Perl etc. to be often used though CGI can use any development language.
  • 3. Intranet ● Intranet (Intranet) is an approach to which it tries to raise lowering the cost and vender independence by using standard technology of the Internet when computer network in limited range such as in-house is constructed.
  • 4. Exterior router ● Exterior router is a router connected with the AURP tunnel. ● The AppleTalk packet is done and encapsulation and the opposite operation are done to other protocol headers.
  • 5. Firewall ● The firewall is system's that prevents it from invading the computer network in the organization from the outside. ● Computer moreover which such a system is built in.
  • 6. Citation ● E-Word http://e-words.jp/ ● Wikipedia http://ja.wikipedia.org/wiki/ ● CISCO http://www.cisco.com/japanese/warp/public/3/jp/s ervice/info/tips/terms/index.shtml