Not many of us intentionally leave our cars unlocked or the front of our homes open to strangers. But we often leave our computers wide open to anyone and everyone that may want to snoop.
To get and keep our computers safe from hackers,or anyone wanting to have a look in our computers,we need the aid and assistance of something commonly called Firewalls.
A Firewall can be hardware or software that acts as a gatekeeper to your computer.It does this by monitoring all internet traffic coming in and going out of our computers.
They not only allow the passage of this traffic but inspects all,making sure it is safe and do not contain viruses,any spyware,or other malicious software.
Firewalls control internet traffic in two methods,Packet filtering and stateful inspection.A Packet is a chunk of data and it contains the address of the computer it comes from and a destination address.
Ok,so you're wondering what on earth is an IP Address.Well,it is an identifier for your computer device.The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. If the Firewall recognizes the Packet and its IP Address,or its Internet Protocol Address,it allows the Packet to pass. The Stateful Inspection method look at the some data in the Packet and compares key chunks of data to a large area that contains known,trusted information.
to see if it is safe or if your computer is expecting the data.It also allow safe passage of data if all seems well.The Stateful Inspection method is preferred since it checks the data that have passed through your computer before. What About Those Hardware Firewalls Hardware Firewalls are devices that are designed to run software Firewalls.So why are there hardware firewalls,you ask.One big advantage of having a Hardware Firewall is that the computer don't have to do any work. The hardware running the software does all work,thereby leaving the CPU in the computer free to get on with other tasks.The CPU,or Central Processing Unit should be free as much as possible to keep the computer running at peak performance.
Explaining The Software Firewalls
There are many creative ways that people use to access or abuse your computer when its not protected. Someone is able to connect to your computer and control it in some form. This can range from being able to view or access your files to actually running programs on your computer. Some of the software Firewalls protect your computer from are the following. Email Bombs.Someone sends you the same e-mail hundreds or thousands of times until your e-mail system cannot accept any more messages. If you spend time on the internet often you will most likely experience this. Viruses. This is no doubt the most well known threat.A Virus is a small file which reproduces itself on other computers.Viruses may be harmless to wiping your hard drive clean. Firewalls may not protect you from all viruses.It would be worth your while to invest in good anti virus software as added protection.Once you invest in a Firewall,study its owner's manual to set it up. Once the Firewall has been installed and setup complete,take a minute to be sure its working.Test the Firewall by going online and visiting a security site.Go to www.grc.com and give their free Shields Up security test a try. If the Firewall pass,you will have the comfort of knowing your PC will have that added protection from someone stealing your credit card information or any valuable information. If you have not invested in a Firewall,won't wait to give one a try.Your critical files and programs will be much safer and you will have the knowledge of being able to install Firewalls on the PC of your friends,enemies,and everyone else in between. Keep your computer safe from hackers and other intruders by fully understanding how firewalls operate in the background of your computer.
Monday, August 27, 2007
Blog Archive
Categories
- 4 Things You Should Know About Hard Drive Crashes (1)
- A Complete Data Recovery Solution (1)
- back up for laptops (1)
- Backing Up Data on CD's and DVD's (1)
- Backing Up Your Data Frequently Can Save You Money (1)
- Bare Metal Server (1)
- Can I Recover Deleted Files? How to Retrieve Deleted Files (1)
- Consumers and Communications (1)
- Data Recovery (3)
- Data Recovery Freeware - Take Advantage of the Freeware Available to You (1)
- Data Recovery Help (1)
- Data Recovery Situations (1)
- Data Recovery Software (1)
- DBX File Corruption (1)
- Defragmenting Your Hard Drives (1)
- Diagnostic Tips For Hard Drive Data Recovery (1)
- Do You Back Up Your Website (1)
- Do You Know Where Your Data Is (1)
- Ease the Headache of Saving Files (1)
- File Recovery - 3 Ways I Prevent Hard Drive Crashes (1)
- Formatted Data Recovery (1)
- Fully Utilize the Full Benefit of a SAN With Automatic Defragmentation (1)
- Hard Disk Data Recovery - How to Restore Deleted Data (1)
- How to avoid data loss and data recovery (1)
- How to Backup Your Computer Hard Drive (1)
- How to Create an Offsite Data Backup and Restore Plan (1)
- How to Recover Lost Data From a Flash Drive (1)
- How to Recover Photos Deleted From SD Disk Or XD Card (1)
- How to Retrieve Deleted Data From Your Computer (1)
- How to Retrieve Deleted Files From Your Computer (1)
- Identity Theft by Selling a Used Computer (1)
- iPhone Data Recovery Advice (1)
- IT Disaster Recovery - A Finance Perspective (1)
- Laptop Backup Software Program (1)
- need laptop back up software (1)
- Online Backup and the Consequences of Data Loss For Business (1)
- Outlook Express Recovery (1)
- password finders (1)
- PDF Password Finder Tips (1)
- RAID Arrays (1)
- RAID Data Recovery (1)
- Recover Deleted Files - Vista (1)
- Recover Hard Disk Files - How to Recover Deleted Files (1)
- remove a password (1)
- Remove a Password From Your PDF Files (1)
- Restore Deleted Data (1)
- Restore Deleted Files - Vista (1)
- Retrieving Deleted Files From Your Computer (1)
- SQL Data Recovery (1)
- SQL Server Snapshot (1)
- SQL Servers (1)
- The Role of This Software Tool (1)
- Understanding Data Loss and Data Recovery (1)
- website back ups (1)
- What to Do When Everything is Lost (1)
- Why to Buy Online Data Back Up Services (1)
- Will Data Recovery Work (1)