Preview

Choosing Firewall

Good Essays
Open Document
Open Document
902 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Choosing Firewall
Firewall
We can use the internet for news, map, email, video chat, websites, music, blogs, research, online banking, business transaction, social engineering, sharing photos etc. We can do all these by sitting in front of PC which is connected to the internet. These are the many advantages we can take from internet but there are some disadvantages too. There are Trojan horses, worms, viruses, hackers etc. They are made to disrupt the computer network or personal computer. They can be biggest threats for our computer anytime while using the internet therefore keeping away from those malicious attacks we need to have best level of protection for our PC and home network. They can steal our bank account information, Social Security number without our knowledge. We do trust our anti-virus software they can detect the file which is trying to infect our system but they are not capable of filtering all the traffic and monitoring unauthorized access to home network or PC. In that case we need a firewall to keep our PC protected. Firewalls can be hardware, software or a combination of both.
There are different types of firewall products available in the market and we have to choose the best that suits for our PC needs. Below are some of the firewalls and their features.
Firestarter – Firestarter is built for Linux operating system and it is most widely used Linux desktop firewall software available today (firestarter). This is an open source software and easy to use on both Linux server and PC. Some key features of firestarter are, user friendly, easy to use, graphical interface, suitable for desktops, servers and gateways, real – time firewall event monitor, allows to define both inbound and outbound access policy, enables port forwarding, real time firewall events view, can view active network connections, including any fraffic routed through the firewall, supports for tuning Tos parameters to improve services for connect client computers, available in many languages,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Now regarding your dilemma with deciding over buying hardware firewalls and antivirus applications… stop. There is no need to go and shill extra money to buy hardware for any sort of countermeasures, no matter how noble your goals may seem. Windows 7 already has user-friendly security, so discrepancies such as viruses and spyware will be dealt with more efficiently. The Action Center in your Control Panel will make sure your Firewall is on, and BitLock Drive Encryption makes sure your passwords,…

    • 190 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1110 Module5 Lab

    • 254 Words
    • 2 Pages

    Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall.…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Most firewalls today utilize state-based filtering. This filtering is a mechanism in modern firewall technology that maintains a list of current, active connection states that traverse the firewall (AIU Online, 2012). When an application inside the firewall requests a connection to another application running outside the firewall, a connection state is created. The addresses of the two communicating applications are saved in a table, so that the firewall can allow all traffic between them through until the initial connection is terminated.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    5. IP stateful firewall is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known active connection will be allowed by the firewall; others will be rejected.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Assignment 1

    • 2755 Words
    • 12 Pages

    First off I decided to check my firewall settings on Windows before attempting to go out on the internet in case someone wants to try and hack my new system before I even get to enjoy it. Most commercially available firewall products, hardware or software based,…

    • 2755 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    There are two types of firewalls, hardware firewalls and software firewalls. Software firewalls provide another coating of security, software firewalls prohibit malware on your computer from being sent to others. Hardware firewalls treat any kind of traffic from travelling from a local network out to the internet as safe. An example of a threat entering your computer could be, you visit a website that contains a hidden malicious program that’s designed to secretly install itself on your machine and then send information out via the internet, this maybe to steal personal information, this is one method of infection. It is very dangerous to operate the internet without a firewall because then you will not be notified if a malicious program is trying to enter your computer and if you do not have a firewall it will not be able to protect you from malicious programs that will damage your computer. A hardware firewall is a physical device that connects to a computer and is configurable through connection to it or either through using the internet browser or through a command line…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    |Comments on security |Linux can use firewalls, IPS, IDS, and antivirus software. It can also be configured to |…

    • 757 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC 280 Week 4 Case Study

    • 425 Words
    • 2 Pages

    One of the most basic things we need to do at home is to setup a router and firewall. Many people are not aware of the security risks of not using a firewall at home. Firewalls act as shields from unwanted traffic and intrusion. There are many types of packets that a well setup firewall can defend us from without our even knowing. Securing the router with passwords was also something that for a number of years in the early days of home computing that not many people were aware of. As a consequence home networks were left wide open for anyone to connect to and explore. Once inside they will have access to any machine also on that network.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Exercise 1

    • 98 Words
    • 1 Page

    You are absolutely correct about Windows 7 including protection and having a firewall in the OS. However I would still purchase hardware firewalls and internet security software. The internet protection and firewall that come with the Windows 7 OS are not the best against threats. You will be better protected by purchasing internet security software. Please keep in mind you should only use one security software. Having more than one will cause them to go back-and-forth to see who will handle the protection and any threat can easily slip through.…

    • 98 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 D1

    • 564 Words
    • 3 Pages

    Having security based software, clean-up based software, and drive formatting can dramatically change how well you computer performs. Security based utilities such firewalls are highly important as your computer is at risk all the time. The main risks to your computer are from virus, Trojans, worms, cookies, spyware and many more. These can be sent though free software downloads emails, internet websites, bad cookies, and many different places. Unwanted virus can cause data loss, makes changes or delete software packages, saves personal information and send it to other users. Firewall will prevent unwanted unauthorized users from accessing your computer. Malware packages can go though cookies and delete bad cookies containing bank details and other personal information. You can also buy security packages such as Norton and MacAfee whereas the firewall is a package that comes with the operating system. I would advise to use the computer based and the shop brought packages to protect your computer. Without uses packages and if the packages aren’t running you computer could be at risk. You computer will run slower, freeze, or even stop running completely if it gets infected.…

    • 564 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are two types of firewalls, there is the in-bound firewall that protects against all things that come into your computer. Then there is the two-way firewall. With this firewall it protects both inbound and outbound threats. This type is used quite often these days. Many computer only have a one-way firewall, but many of them like Zone alarm are two way firewalls. Firewalls are used to block or accept information into your computer that is not a threat. It will either send it to where it needs to be or it will block it if the potential of the file is threatening to your device. A type of firewall is your basic McAfee, which works with Microsoft Corporation on your basic computer it is a program that is already installed into your device. It is a virus protector that works with your computers already installed firewall to keep out and potential harmful viruses or threats to your computer. You can do basic setting for the firewall or you can put it to your liking to make sure of no type of threats can enter your computer.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Second, internet filters also have other advantages. First, filter software can protect the data of businesses; companies also need to protect customer information to keep it from falling in the wrong hands. Second, filter software can identify internet theft is a real threat, because hackers are skilled at getting people's personal information and using it to commit fraud. Third, filter software can make the employees more productive, because there are employees who spend many working hours surfing websites unrelated to their jobs.…

    • 486 Words
    • 2 Pages
    Good Essays