Sunday, November 30, 2014

Understanding Firewalls

What must firewalls?
Firewalls provide protection against outside attackers by shielding your computer or network from malicious or unnecessary Internet traffic. Firewalls can be configured to block data from certain locations, and allows relevant and necessary data (see Denial-of-service attacks and understanding Hidden Threats: Rootkits and Botnets for more information). They are especially important for users who rely "always on" connections such as cable or DSL modem.
What type of firewall is the best?
Firewalls are offered in two forms: hardware (external) and software (internal). While both have their advantages and disadvantages, the decision to use a firewall is far more important than deciding which type you use.
Hardware - Typically called network firewalls, these external devices from your computer or network and your cable or DSL modem positioned. Many vendors and some Internet Service Providers (ISPs) offer devices called "routers" that the firewall functions. Hardware-based firewalls are particularly useful for protecting multiple computers, but also a high level of protection for a single computer. If you only have one computer behind the firewall, or if you are sure that all other computers on the network up to date on patches and free of viruses, worms or other malicious code, you can use the extra protection need a software firewall. Hardware-based firewalls have the advantage of being separate devices running their own operating systems, so that they, an additional line of defense against attacks Their big disadvantage is the cost, but many products for less than $ 100 are available (and there are even some for less than $ 50).
Software - Some operating systems include a built-in firewall; if you are experiencing is the case, consider making it, even if you have an external firewall to another layer of protection. If you do not have a built-in firewall, you can use a software firewall for relatively little or no cost from your computer to store, software vendors or get ISP. Because of the risks associated with software downloaded from the Internet on an unprotected computer, it is best to install the firewall from a CD or DVD. If you do download software from the Internet, make sure it is a reputable, secure Web site (see Web Site Certificates for more information). Although on a software firewall alone provides some protection, recognize that the firewall on the same computer as the information you are trying to protect the firewall trap opportunity malicious traffic before it enters your system are disabled.
How do you know what configuration settings to apply?
Most commercially available firewall products, both hardware- and software-based, come configured in a manner that is acceptable safe for most users. Since each firewall is different, you have to read and the documentation that comes with it to determine whether the default settings for the firewall are sufficient for your needs to understand. You get to be by your firewall manufacturer or your Internet service provider (either by technical support personnel or a website) for further assistance. Even alerts about current viruses or worms (such as the US-CERT Cyber Security Alerts) sometimes information about restrictions can be implemented through the firewall.
Unfortunately, while correctly firewalls can be effectively block some attacks, not a false sense of security. Although they offer some protection, no firewalls do not guarantee that your computer will not be attacked. In particular, a firewall offers little or no protection against viruses, you can run the infected program on your computer to do as many e-mail viruses to work. Using a firewall in combination with other protective measures (such as anti-virus software and "safe" computing practices) will strengthen your resistance to attacks.

No comments:

Post a Comment

Tag

Anti Spyware Anti Trojan Elite Antivirus Apps for Android Phones Antivirus Apps for Samsung Antivirus Review Antivirus Support Avast AVG Avira Antivirus BestCrypt BitDefender Boot Sector Virus BullGuard Clamwin Classroom Spy Pro Cleanup inbox and manage emails Cloud Backup Cloud Computing Security Comodo Computer Certification Courses Conficker worm Cyber Bullying cyber security Data Protection DoctoAntivirus Downloads DR Drive Genius3 eScan Antivirus Fake Antivirus Fast PC Fat Data Recovery Firewall protecion Folder Guard Professional GFI Languard Hackers HitmanPro IDS IE antivirus Installerex IT Consultants K-Secure VPN K7 Antivirus Kaspersky Linux antivirus Loaris trojan malware Manually Virus Delete mcafee MCAfee SuperDAT Microsoft Security Essential Most Danger PC Viruses Netgate spy emergency NOD32 Norman Malware Norton Online Antivirus Panda Cloud antivirus PC Care PC Doctor Pc Resources PC Technician PC Tools Antivirus PC Virus PDA Antivirus Pop-Up Removal PrivateFirewall Protector Plus Registry Clean Remove Spyware Rootkit Virus Safe Emailing Security Shardana Antivirus Rescue Disk Smartphone security Social Network Safety spyhunter Spyware SuperantiSpyware Symantec The Cleaner 2011 Top Antivirus Top Destructive Viruses Trojan Horse Trojan Killer trust port Twitter Protection USB Security Vipre Internet Security Virus Definitions Virus Scanners VueScan Pro WEB Antivirus Website Security WinASO Registry optimizer windows 7 Windows 8 Protection Windows Vista Virus Windows.8.1 WinMend System Doctor Wireless Network Protection Zemana AntiLogger