• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 20. Internet Explorer 4.0 and Se... > Configuring Internet Explorer to Use...

Configuring Internet Explorer to Use a Proxy Server

With ordinary dial-up Internet connections, client machines connect directly to web or FTP servers, making it possible for a would-be hacker to break into the network. To minimize that risk, most corporate networks include a firewall—a secure gateway made up of one or more systems that sit between the network and the Internet at large. Firewalls restrict the ability of outsiders to connect with machines inside the network, while enabling legitimate users to access resources on the Internet. This combination of hardware and software is designed to intercept and filter packets of information, letting through only those that meet strict standards of security.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint