Firewall: Stopping the Internet Barbarians at the Gateway!

Firewall: Stopping the Internet Barbarians at the Gateway!

Movies and TV are to have us believe that a “firewall” is some form of ultra high-tech obstacle that protects sensitive information. In this world of fiction, savvy hackers are also able to type away – seemingly at random – to gain access to a computer. But in reality a firewall is just a basic program or simple piece of hardware that any computer user, especially those with a broadband connection should have running at all times.

If your computer is connected to the Internet via a broadband connection then it has an Internet Protocol signature, or IP address. Other online users can access that IP address, and this is why a firewall becomes so important. A firewall can provide secure access to the Internet, allowing safe traffic into and out of your computer or private network, while at the same time automatically blocking intruders and hackers. Additionally, the firewall gives you the power to decide which programs should be able to connect to the Internet, while also shielding you from being attacked through security holes in unpatched software.

And while movies make us believe that firewalls are some advanced technology, these are actually very simple products that come in a variety of forms. The first type is the hardware firewall, which is an application built into your DSL, cable or wireless router. In this case, the firewall is the first line of defense and works by a technique called packet filter, examining the header of a packet and thus determining its source and destination address. This information is then compared to a set of predefined or user-created rules that determine whether the packet is to be forwarded or dropped. An advanced system called Stateful Packet Inspection (SPI) even looks for other characteristics, including the origin and whether incoming traffic is actually a response to outgoing connections, such as a Web page request. The downside of hardware firewalls is that they can inadvertently treat any local network traffic as safe, which certainly won’t halt the spread of viruses or other threats if even one computer on the network is contaminated.

The alternative is a software firewall, which is essentially a program that screens the data as it arrives on the network. But no matter which version is in place, all information passes through the firewall, and those that do not meet a specified security criteria are blocked. There are several types of methods that software firewalls use to block unauthorized connections to the computer. These include a packet filter – similar to the hardware firewall technique – that looks at each packet of data that enters or leaves the network, accepting or rejecting it based on the user-defined rules. It is effective, but susceptible to spoof IP addresses – that is where the sender’s IP address has been changed to appear as an authorized address. A proxy server can intercept all data entering and leaving the network and it effectively hides the true IP addresses, but this adds difficultly in allowing an authorized outside computer to access the protected computer. Additionally, gateways can be set up to allow specific connections with approved access for specific programs – such as games – or from authorized outside IP addresses. Users should also determine their firewall needs, based on how they use their computers.

1 2 Next Page

Marketing-Professional-aundh

RWA-activation-Supplier-Pune

Point-of-Sale-Merchandising-Supplier-Pune

retail-Marketing-Services-Bhosari

Services-Bhosari

Brand-Services-Bhosari

retail-Marketing-Supplier-Bhosari

selling-consultant-Akurdi

Brand-Activations-consultant-Akurdi

Direct-Marketing-Solutions-Bhosari

Sales-Promotion-Solutions-Bhosari

Brand-Building-Solutions-Kalyani-Nagar

Door-To-Door-Marketing-Service-Provider-Agency-Akurdi

Personal-selling-Service-Provider-Agency-Akurdi

Brand-Identity-Development-Service-Provider-Agency-bosari

one-to-one-marketing-consultant-Kalyani-Nagar

Sales-promotion-consultant-Kalyani-Nagar

Brand-Support-consultant-Kasba-Peth

face-to-face-marketing-Professional-bosari

Point-of-sale-Professional-bosari

Brand-ambassador-Solutions-Pune

corporate-marketing-Service-Provider-Agency-Kasba-Peth

Sales-Force-Service-Provider-Agency-Kasba-Peth

Brand-promotion-Service-Provider-Agency-Kondhwa

B-2-B-marketing-Marketing-consultant-Pune

Sales-Operations-consultant-Pune

Branding-consultant-Kothrud

Feet-On-Street-Marketing-Professional-Kondhwa

Fieldwork-Marketing-Service-Provider-Agency-Kothrud

Experiential-marketing-Companies-Swargate

guerrilla-Marketing-Professional-Bavdhan

Corporate-Activities-Companies-Warje

Interactive-marketing-Companies-Deccan-Gymkhana

retail-Marketing-Outsourcing-firm-Koregaon-Park

Point-of-Sale-Merchandising-Professional-Kondhwa

Loyalty-Card-Solutions-Service-Provider-Agency-Kothrud

Customer-Acquisition-Companies-Narayan-Peth

Lead-Generation-Professional-Bavdhan

In-shop-Branding-agencies-Shivaji-Nagar

Sales-Management-Outsourcing-firm-Shivaji-Nagar

product sample

Consumer-Sales-Promotions-Professional-Narayan-Peth

Corporate-identity-Service-Provider-Agency-Bavdhan

On-ground-Marketing-Companies-Narayan-Peth

Hoarding-Installation-Professional-Warje

Product-Launches-agencies-Swargate

Leaflet-Distribution-Outsourcing-firm-Koregaon-Park