The Fort of Deliverance
This is a firewall combined with an application server, allowing the same machine to serve both to protect your internal network from intruders, and also offer services such as mail, a web site and so forth.
It is designed so that if an intruder does manage to enter the system through the Internet, it cannot be used as a stepping stone to enter your internal network. It uses a specially modified Linux kernel, allowing things such as web servers to run normally, but restricting activities that might be dangerous.
Find out more
What is a firewall and why do I need one?
Is your organisation connected to the Internet, or considering setting up a permanent connection? Getting connected can be like moving from the country to an inner city address. Yes, you get more business, but you may also get more trouble, and you wouldn't consider doing it without proper security.
...Viruses......Trojan Horses......Theft of Secrets......Data Loss...
Yes, whilst the Internet and e-commerce can bring more customers to your door, it can also bring in a lot of undesirables. With many computer systems it is trivial to gain access, steal secrets and even modify or destroy data. Imagine the impact on your business if someone started tampering with your account data.
Ok, now for some good news!
There is a solution to this problem: install a firewall - a system that sits between you and the Internet, to keep intruders out. But that's only half the solution. If your store has a 20 foot brick wall around it, it may be secure, but nobody can buy anything! You may need to offer a web site, handle email and so forth.
A popular way of handling this is to have a machine outside the firewall, or in a partially protected network zone, which handles these things. It takes requests, mail and so forth from the bad Internet, and forwards them into your internal network where necessary. The idea is that this machine will be secure and make sure no harmful attacks are forwarded inside. The problem is, not only can this be costly to set up, if intruders manage to get into this machine and take control of it, they might find a way into your network. This is not a rare occurrence.
So what's so good about this one?
For example, the firewall is not allowed to connect to anything in the internal
network. Ever. Any data that needs to be sent to the internal network must
be requested from inside. Special servers are provided to easily do this
where necessary. This means that an intruder cannot start trying to break
into your internal network from the firewall.
How can you run normal programs, but not let intruders break things?
Actually, legitimate server programs are generally pretty boring once they get going. They read a file here and there, talk to other servers, reply to requests and generally mind their own business. They usually don't do things that hackers want to do, like:
So it is quite feasible for a system to allow external services to run, but stop attackers wreaking havoc.
|Required Hardware||Pentium 100 or better, with 32MB memory, 300MB disk|
|Operating System||Linux, based on Red Hat 6.2 / 7.0, with specially modified kernel.|
How does it work?Watch out for our technical paper with more detailed information here!
When is it available?
The product is due to be released very shortly, though an exact release date has not yet been determined. Do you want to be notified when it becomes available or a release date has been fixed? Click here to find out more about our announcement mailing list.
For comments or problems, please mail
Copyright © Data Deliverance Pty. Ltd. ACN 088 917 980
Last modified: Fri Apr 20 17:39:16 CST 2001