Network Setup



Introduction:

We are interested in setting up an isolated network in order to study the vulnerabilities of many Operating Systems.

Initial Setup:

Essential to this project is creating a network in which access is given solely to those involved with the project. In order to achieve this measure of security certain fundamental steps were taken. These are listed below: