Daily Tips Ndtricks

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 3 March 2013

How Firewall Work's

Posted on 05:58 by Unknown

Firewalls are the first line of defense for computers connected to other computers or to the Internet.

They help to protect against viruses, malicious software and hackers. At the same time, they can allow communication with other computers or Internet sites that are known to be safe. There are two types of firewalls: Hardware-based and software-based.

Hardware Firewall:

             A hardware firewall can be a stand-alone product, or it may be part of a broadband router. A firewall in a broadband router generally needs no configuration by the user, and it protects all computers on a local network. Hardware firewalls work by using a technique called packet filtering to intercept information before it enters the private network. Any data coming from unknown, unsecured or suspicious locations is rejected and not allowed through.

Software Firewall

           A software firewall is a program that must be installed on a computer. It can be customized by the user. The program runs in the background and protects the computer from suspicious data. It can be configured to always allow information from certain sites or to always block certain sites. It can also be temporarily turned off if it is interfering with attempts to access websites or other computers that are known to be safe.

Which is better?

           Hardware and software firewalls each have advantages and disadvantages. A hardware firewall will protect all computers on a network, but software firewalls must be installed on each computer. This does allow each computer user to choose and customize their firewall software. Since hardware firewalls protect all computers on a private network, individual customization per computer is not possible. Software firewalls must be updated regularly by downloading recommended updates from the manufacture. A software firewall is particularly important for laptop or notebook computers that are taken from place to place. Some functions of hardware and software firewalls overlap, but in general it is best to have both types.

What Firewalls Don’t Do

           A Firewall operates by barring unsecured data from reaching a computer or the computers on a network. It determines what is unsecured or potentially unsecured by following a set of rules that are programmed into it. While a firewall may prevent computer viruses by blocking them, viruses, malware, and other types of malicious data can still get past a firewall if it does not recognize them as a threat. Therefore, it is important to have anti-virus and anti-malware software installed in addition to a firewall.





Author Bio:

Peter Wendt is a writer & researcher interested in computer security. Wendt recommends visiting Ottawa IT support specialists for computer services.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Security Tips, tips | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Being Smart For Used Smartphones
    On seeing our article on " Interesting Facts About Smartphone " You might be dying to have a Smartphone, it’s in, it’s cool, it’...
  • Protect Your Business Information: Data Security Guidelines
    We live in a digital era and there are not only traditional hazards that endanger our business. Cyber attacks are becoming more and more co...
  • Invisible Yahoo Detector
    Invisible detect users on Yahoo! Messenger (YM)         Use our Invisible Yahoo Scanner to detect if a Yahoo Messenger users is in fact offl...
  • 5 Reasons To Use A Website Builder
    If you don’t have a personal website, but you’re dreaming about launching one, you’ve come to the right place. In this article I’m going to...
  • Tips and Tricks about Online Bargains
    The internet, with the myriads of interconnected computers and sites, its not impossible that there is something good waiting to be discover...
  • Pros And Cons Of IPhones
    Img. Credit:  freedigitalphotos There is a great deal of buzz in the smart phone arena as of late. With the HTC Droid DNA and the upcoming ...

Categories

  • android apps
  • apps
  • blogging
  • Blogging How To
  • Blogging Tips
  • Blogging Tools
  • business
  • Buying Guide
  • Cloud Computing
  • Computer Tips
  • Computer tricks
  • domain
  • Downloads
  • Earn Online
  • Facebook
  • Facebook Tricks
  • freewares
  • gadgets
  • games
  • Gaming
  • Gaming Tips
  • Gaming Tools
  • Google Glass
  • how to
  • Infographics
  • iphone
  • iphone apps
  • Mobile Tips
  • Mobile Tricks
  • Online Tips
  • Online Tricks
  • Other Tricks
  • printers
  • QR Code
  • recycle
  • review
  • Security Tips
  • seo
  • social media
  • softwares
  • Tech
  • tips
  • Tips -Computer Tips
  • tricks
  • Useful Tools
  • Web host
  • website
  • wet mobile
  • windows phone 8
  • youtube

Blog Archive

  • ▼  2013 (331)
    • ►  December (3)
    • ►  November (11)
    • ►  October (23)
    • ►  September (27)
    • ►  August (26)
    • ►  July (25)
    • ►  June (36)
    • ►  May (56)
    • ►  April (30)
    • ▼  March (31)
      • How To Get Free Mobile Recharge/Airtime
      • How To Boot Ubuntu From A USB Flash Drive
      • Secret Codes For Your Android Mobile
      • What are Cloud Services?
      • Forget Your Windows 7 Password? Create Windows 7 P...
      • How To Create Bootable Windows 8 Usb Drive
      • Flipped Text Generator ʎuunɟ
      • Facebook Chat Letters Generator
      • Now You Can Watch TV, Anytime...Anywhere!
      • 4 Best Apps For Learning On The Go
      • Challenge: Can You Install New Theme In Your WP Si...
      • Google Apps for Businesses
      • How To Make A Folder Invisible?
      • Ways to Prevent Computer Viruses
      • Beaware Of Viruses On Social Networking Sites!
      • 10 Best Educational Apps Of 2013
      • Keeping Personal Data Safe: Mistakes You Should Avoid
      • Android Apps You Can't Miss This Year
      • Protecting Yourself Against Online Identity Thieves
      • How To Choose A Best 2.1 Speaker System
      • 15 Useful Google Tricks
      • What To Look For When Buying A New Android Tablet?
      • Why Is Blu Ray Better Than Standard DVD?
      • What Is Buffering And It's Facts
      • Different Types of Malware
      • How To Move Your Blogspot Blog To Your Own Domain
      • How Firewall Work's
      • Free Software To Split And Merge Large Files [Free...
      • Using Google Webmaster Tools
      • Find the Speed Of Your Hard Disk, Pendrive, etc.. ...
      • Special Features Of Employee Monitoring Software I...
    • ►  February (31)
    • ►  January (32)
  • ►  2012 (43)
    • ►  December (11)
    • ►  November (2)
    • ►  October (2)
    • ►  September (9)
    • ►  August (18)
    • ►  July (1)
Powered by Blogger.

About Me

Unknown
View my complete profile