| Joe Emmanuel
Res: #465/D, 3rd
Cross, S.R. Layout Member Technical - Software Murugeshpalaya P.O. U&I System Design Ltd. Bangalore - 560017, India Bangalore 560 003 Mobile: 98443 53288 India Email: [email protected] |
| Professional Summary |
|
| Skill set | |
| Operating Systems |
Unix, Linux, Windows 95/98/2000 & Windows NT 4.0 |
| Languages | C, C++. Visual C ++, Visual Basic 6.0 |
| Script Languages | Perl, Shell scripts, awk |
| RDBMS | Oracle, MS - Access |
| Network Protocols | TCP/IP, UDP, ICMP, ARP/RARP, and DHCP/BOOTP |
| Network Services | Telnet, Rlogin, FTP, DNS, LDAP and SSH |
| Network Devices | Proxy server, Gateway, Hub, Router, Bridge, Switch |
| Technology | IDS, Linux Kernel Internals, Firewall, and Cryptography |
| Educational Qualifications |
|
M.C.A
Centre for Electronics Design and Technology of India (C.E.D.T.I), Calicut 74 % aggregate. |
|
B.Sc Physics
Mahatma Gandhi University, Kerala 81 % aggregate |
|
P.D.C (Maths, Physics, Chemistry)
Sacred Heart College, Thevara, Ernakulam 70 % aggregate |
| S.S.L.C St.Sebastians High School, Muvattupuzha, Kerala 88 % aggregate |
Work Experience |
| Presently working with U&I
System design Ltd. Bangalore as 'Member technical - Software' in the
domain of network security. Visit us in uisdl.com. |
| Personal Details | |
| Gender | Male |
| Date of Birth | 28 May 1978 |
| Qualification | M.C.A |
| Contact Address | 465/D, 3rd
Cross, S R Layout, Murugeshpalaya, Bangalore - 560 017, India. |
| Contact phone # | 98443 53288 |
| Permanent Address | Punnackapadavil (h),
Nadukkara, Avoly (P.O), Muvattupuzha, Ernakulam (Dist.) Kerala - 686 677 Phone: 0485 - 2263024 |
| Projects handled |
|
1. Rlogin Gateway Firewall. Platform : Unix Duration : 6 months Role : Analysis, Design, Development and Testing. Technology : C, TCP/IP Network Programming, Socket Programming
Description: When an
rlogin client wants to connect to a server, it first connects to the Rlogin
Gateway Firewall as it is connecting to the server. The firewall
running on the gateway can accept, deny or reject the connection
request to the server according to the security policy of the
organization. If it is accepted the Rlogin Gateway Firewall
connects it to the real server. If it is rejected it displays a message
on the clients terminal about the permission of the client to access
that particular server. If the connection request is denied from the Rlogin
Gateway Firewall it simply drops that packet without giving any
message to the client. The firewall permitting the connection requests
by checking the client IP address, server IP address, and login name.
It can track the established connections by checking all the packets
passing between the client and server. If some commands are not
permissible for a particular connection, whenever the client tries to
invoke that commands the Rlogin Gateway Firewall will not pass
that command requests to the server. In this situation instead of
getting the output from the server, client receives a warning from the
firewall about the invocation of the non-permissible commands. Firewall
can log all the transactions passing through it.
|
|
2.
Application Level Gateway for Telnet Platform : Unix Duration : 6 months Role : Analysis, Design, Development and Testing. Technology
: C, TCP/IP Network Programming, Socket Programming. Description: This project is to develop a security module between trusted telnet server and the telnet client. It prevents the distrusted clients from accessing the server and also monitors the transactions successfully established by the trusted client. This security module will be a firewall between telnet client and telnet server. It also provides, logging mechanisms. Whenever the gateway receives the packet, it compares it against the rule set. When it finds a rule it matches it stops checking and applies that rule. If packets go through each rule without finding a match, that packet is denied. The first rule that matches the packet is applied and not the rule that best matches. The gateway monitors and logs the transactions of the successfully established connections. |
|
3. Thrishuul Platform : Unix Role : Analysis, Design, Implementation, Testing. Technology :
C, C++, IDS, Kernel Internals, Sockets, and Threads. Description: This is an Intrusion Detection System (IDS), which combine the features of both Host based and Network based IDS. The system obtains event information from one or more information sources, performs a pre-configured analysis of the event data, and then generates specified responses, ranging from reports to active intervention when it detects intrusions. There is also a management system that allows a security or network administrator to monitor and configure the system and to analyze the data. |
|
4) Asianet Complaint Handling Software Technology : Visual Basic 6.0, SQL Database : MS Access 2000 Role
: Analysis, Design, Development, Testing and Implementation Description: This software is used to handle the complaint details of the Asianet's subscribers. Whenever the complaint occurs the subscriber reports the nature of complaint to the relevant authority. The operator can enter the complaint details with subscriber number. At the end of each day all the reported complaints are sorted and allocating the employee to rectify each complaint. In the morning, operator can give the work details of each employee. After rectifying the complaints the operator entering the rectified complaints' details along with the employee name who rectified the complaint, rectified date and time. Monthly and weekly reports of the rectified complaints can also be prepared. |
*********