The document discusses web servers, proxy servers, server logs, and network security. It provides details about Apache and Squid servers, how they work, and sample logs. It also covers Linux commands, network devices, and threats like viruses, worms, and trojans. Network security methods like firewalls, IDS, antivirus software and their role in securing networks is explained.
1. Web Server(Apache), Proxy Server(Squid) & Server Logs By Sanjay Kumar Malik Lecturer University School of IT GGS Indraprastha University Kashmere Gate, Delhi -110403
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12. A few Linux commands Commands Description touch create new file mkdir create new dir. vi to edit file. cd change dir. cp copy file/dir. mv move file/dir rm remove file. rmdir remove dir. date view date. cal view calendar. bc view calculator. Init -0 shutdown the machine.
13.
14.
15.
16.
17.
18. Malicious Software Is a software that is intentionally included or inserted in a system for a harmful purpose. Virus :-Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. Effects of Virus :- 1.A virus might corrupt or delete data on your computer. 2.Due to virus drives are not opened. 3.Slows down the speed of the system. 4.Taskmanager is Disabled.