A firewall is a system or gateway that prevents unauthorized access to your computer or private network. It is usually the first line of defense in protecting your private information or data. A good firewall will help protect you from malicious attacks of spyware, adware, malware, worms, trojans, and hackers.
Firewalls are security mechanisms that control who can access and send data thru your network or computer. They can be applied to both hardware and software on your computer; many systems use a combination of each for greater protection. All data or messages entering or leaving your computer has to pass thru the firewall, which checks all messages and blocks those that don't meet your specified security criteria or rules.
To put it in simple terms: think of a firewall as a security guard or a security scanner for your computer or network. Anything going in or out must be checked thru this system and must obey your rules!
Of course, this is just a simple explanation, firewalls can be very complex; consisting of a whole combination of techniques that can be used in concert depending on the level of security you wish to achieve.
These firewall techniques may include:
Application gateway -- places security mechanisms on specific applications (FTP, Telnet, etc.)
Packet filters -- examines each packet using your computer and accepts or rejects according to your rules
Circuit-level gateway -- security measures for such connections as TCP (Transmission Control Protocol) or UDP (User Datagram Protocol)
Proxy server -- all messages entering or leaving your network must go thru this proxy server, effective for hiding your true network or computer address
Also, for greater security, many networks use encrypted data.
If you are operating a computer or a server, putting up firewalls will provide protection for your data and information that's passed along your network. If you regularly surf the Internet, placing a firewall on your own personal computer is a must. There is no reason not to have a firewall in place, you can download a free firewall from www.zonealarm.com for your own personal use.
Keep in mind, no system is foolproof; any computer or network hooked up to the Internet can be hacked! Therefore, most people in the know, always keep a back-up of their important data/information on a secure off-line source: floppy disks, CDs, or on a computer that's not connected to the Internet. Do daily or weekly back-ups to make sure your data and programs are safe.
Still, a good firewall will go a long way in protecting yourself from any unauthorized access to your computer. With the occurrences of spyware, adware, and other more invasive scumware increasing daily; putting up a firewall and protecting yourself should be your first line of defense against such unwanted and rude visitors. Nuke them at the gate and save yourself from some major headaches.
Put that firewall up right now!
To learn more about Spyware and Adware Click Here: Spyware Remover Guide
Copyright © 2005 Titus Hoskins of Internet Marketing Tools.
This article may be freely distributed if this resource box stays attached.
![]() |
|
![]() |
|
![]() |
|
![]() |
Much has been said on the theory of password protection... Read More
Today the internet is a mine field of malicious code... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
History and BackgroundThe virus was one of the first ever... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Identity Theft is one of the most serious problems facing... Read More
Every now and then you can read about a new... Read More
If you run any type of Internet business, Adware and... Read More
Let us take the example of scrambling an egg. First,... Read More
The Threat10 years ago you could probably have run no... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
If you use emails actively in your communication, you must... Read More
Recently I have received email from my bank/credit Card Company,... Read More
They're out there. Individuals trying to make a quick buck... Read More
It has been said that with the wealth of information,... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Is your data secure? Think again. Securing data is unlike... Read More
So you want to know who your kids are chatting... Read More
File sharing on p2p is soaring despite the music and... Read More
A week or so ago, I received an inquiry from... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
As more people are logging onto the Internet everyday, Network... Read More
This is not some new fangled techno-speak, it is a... Read More
First the basic definition of Spyware: It is a type... Read More
Viruses are, however, not the only malicious software programs out... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
You may not realize it, but as you are surfing... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Huge number of spyware software applications are available in the... Read More
Ebay is a great site and is used by many... Read More
Ok, ok, I know you've seen them. All those pop... Read More
A little bit of time invested into learning about internet... Read More
The first thing people think about when defending their computers... Read More
When surfing the Internet you probably take your anonymity for... Read More
Watching how the traditional media covers the latest virus or... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
So you want to know who your kids are chatting... Read More
As the number of people using the Internet as an... Read More
Huge number of spyware software applications are available in the... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
If you know what is the 'Fishing' then it's very... Read More
Let us take the example of scrambling an egg. First,... Read More
Whether we like it or not, we are all living... Read More
A couple of days ago, I was searching for a... Read More
Is your data secure? Think again. Securing data is unlike... Read More
The average computer is packed with hidden software that can... Read More
If you run any type of Internet business, Adware and... Read More
Imagine my surprise when I received a phone call from... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Phishing is a relatively new form of online fraud that... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Be careful of sites that promise to send you "instant... Read More
Despite the current wave of identity theft and corporate security... Read More
If you use the internet, you have probably been infected... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Every single time you access a website, you leave tracks.... Read More
Imagine this ? you open up your email box and... Read More
I got a virus the other day, Thursday I believe... Read More
No longer are viruses the only threat on the internet.... Read More
Since its birth, the Internet has grown and expanded to... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Internet Security |