Daily Tips Ndtricks

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 3 March 2013

How Firewall Work's

Posted on 05:58 by Unknown

Firewalls are the first line of defense for computers connected to other computers or to the Internet.

They help to protect against viruses, malicious software and hackers. At the same time, they can allow communication with other computers or Internet sites that are known to be safe. There are two types of firewalls: Hardware-based and software-based.

Hardware Firewall:

             A hardware firewall can be a stand-alone product, or it may be part of a broadband router. A firewall in a broadband router generally needs no configuration by the user, and it protects all computers on a local network. Hardware firewalls work by using a technique called packet filtering to intercept information before it enters the private network. Any data coming from unknown, unsecured or suspicious locations is rejected and not allowed through.

Software Firewall

           A software firewall is a program that must be installed on a computer. It can be customized by the user. The program runs in the background and protects the computer from suspicious data. It can be configured to always allow information from certain sites or to always block certain sites. It can also be temporarily turned off if it is interfering with attempts to access websites or other computers that are known to be safe.

Which is better?

           Hardware and software firewalls each have advantages and disadvantages. A hardware firewall will protect all computers on a network, but software firewalls must be installed on each computer. This does allow each computer user to choose and customize their firewall software. Since hardware firewalls protect all computers on a private network, individual customization per computer is not possible. Software firewalls must be updated regularly by downloading recommended updates from the manufacture. A software firewall is particularly important for laptop or notebook computers that are taken from place to place. Some functions of hardware and software firewalls overlap, but in general it is best to have both types.

What Firewalls Don’t Do

           A Firewall operates by barring unsecured data from reaching a computer or the computers on a network. It determines what is unsecured or potentially unsecured by following a set of rules that are programmed into it. While a firewall may prevent computer viruses by blocking them, viruses, malware, and other types of malicious data can still get past a firewall if it does not recognize them as a threat. Therefore, it is important to have anti-virus and anti-malware software installed in addition to a firewall.





Author Bio:

Peter Wendt is a writer & researcher interested in computer security. Wendt recommends visiting Ottawa IT support specialists for computer services.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Security Tips, tips | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 8: How To Eliminate Shut Down Problem
               Windows 8 latest operating system launched by Microsoft known for its Modern UEFI interface, windows defender with antivirus prog...
  • 5 Reasons To Use A Website Builder
    If you don’t have a personal website, but you’re dreaming about launching one, you’ve come to the right place. In this article I’m going to...
  • GRAPHENE: A Material That Enabled the Creation of Flexible Smartphones
    Infographic By Quib.ly
  • Spider Silk: The Super Material of the Future
    Today's scientists and researchers are more advanced than they have ever been before thanks to the use of highly effective traditional ...
  • Being Smart For Used Smartphones
    On seeing our article on " Interesting Facts About Smartphone " You might be dying to have a Smartphone, it’s in, it’s cool, it’...
  • Tips to Prevent Data Loss!
    How do you protect yourself from losing important data? Do you save your work as often as possible? Do you do backups? Here are a few effect...
  • Preventing Data Breaches
    Understanding how data and security breaches occur can help you put a plan in place to protect your company moving forward. Your customers ...
  • The Most Important Phonecalls Of All Time
    Imagine a world without telephones, it’s pretty inconceivable. In a time when near enough everyone is little more than a punch of a few dig...
  • Increase Your Traffic With The Help Of Social Networks
    One of the best ways to increase website’s traffic is via social networking. Before even the Google Penguin exists, social networks have mad...
  • Samsung Galaxy S3 (Root, Recovery and Custom ROMs):
    Introduction: After the Samsung Galaxy S3 was released, there were many rooting tools introduced into the market due to its increase in dem...

Categories

  • android apps
  • apps
  • blogging
  • Blogging How To
  • Blogging Tips
  • Blogging Tools
  • business
  • Buying Guide
  • Cloud Computing
  • Computer Tips
  • Computer tricks
  • domain
  • Downloads
  • Earn Online
  • Facebook
  • Facebook Tricks
  • freewares
  • gadgets
  • games
  • Gaming
  • Gaming Tips
  • Gaming Tools
  • Google Glass
  • how to
  • Infographics
  • iphone
  • iphone apps
  • Mobile Tips
  • Mobile Tricks
  • Online Tips
  • Online Tricks
  • Other Tricks
  • printers
  • QR Code
  • recycle
  • review
  • Security Tips
  • seo
  • social media
  • softwares
  • Tech
  • tips
  • Tips -Computer Tips
  • tricks
  • Useful Tools
  • Web host
  • website
  • wet mobile
  • windows phone 8
  • youtube

Blog Archive

  • ▼  2013 (331)
    • ►  December (3)
    • ►  November (11)
    • ►  October (23)
    • ►  September (27)
    • ►  August (26)
    • ►  July (25)
    • ►  June (36)
    • ►  May (56)
    • ►  April (30)
    • ▼  March (31)
      • How To Get Free Mobile Recharge/Airtime
      • How To Boot Ubuntu From A USB Flash Drive
      • Secret Codes For Your Android Mobile
      • What are Cloud Services?
      • Forget Your Windows 7 Password? Create Windows 7 P...
      • How To Create Bootable Windows 8 Usb Drive
      • Flipped Text Generator ʎuunɟ
      • Facebook Chat Letters Generator
      • Now You Can Watch TV, Anytime...Anywhere!
      • 4 Best Apps For Learning On The Go
      • Challenge: Can You Install New Theme In Your WP Si...
      • Google Apps for Businesses
      • How To Make A Folder Invisible?
      • Ways to Prevent Computer Viruses
      • Beaware Of Viruses On Social Networking Sites!
      • 10 Best Educational Apps Of 2013
      • Keeping Personal Data Safe: Mistakes You Should Avoid
      • Android Apps You Can't Miss This Year
      • Protecting Yourself Against Online Identity Thieves
      • How To Choose A Best 2.1 Speaker System
      • 15 Useful Google Tricks
      • What To Look For When Buying A New Android Tablet?
      • Why Is Blu Ray Better Than Standard DVD?
      • What Is Buffering And It's Facts
      • Different Types of Malware
      • How To Move Your Blogspot Blog To Your Own Domain
      • How Firewall Work's
      • Free Software To Split And Merge Large Files [Free...
      • Using Google Webmaster Tools
      • Find the Speed Of Your Hard Disk, Pendrive, etc.. ...
      • Special Features Of Employee Monitoring Software I...
    • ►  February (31)
    • ►  January (32)
  • ►  2012 (43)
    • ►  December (11)
    • ►  November (2)
    • ►  October (2)
    • ►  September (9)
    • ►  August (18)
    • ►  July (1)
Powered by Blogger.

About Me

Unknown
View my complete profile