Preview

Choosing Firewall

Good Essays
Open Document
Open Document
902 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Choosing Firewall
Firewall
We can use the internet for news, map, email, video chat, websites, music, blogs, research, online banking, business transaction, social engineering, sharing photos etc. We can do all these by sitting in front of PC which is connected to the internet. These are the many advantages we can take from internet but there are some disadvantages too. There are Trojan horses, worms, viruses, hackers etc. They are made to disrupt the computer network or personal computer. They can be biggest threats for our computer anytime while using the internet therefore keeping away from those malicious attacks we need to have best level of protection for our PC and home network. They can steal our bank account information, Social Security number without our knowledge. We do trust our anti-virus software they can detect the file which is trying to infect our system but they are not capable of filtering all the traffic and monitoring unauthorized access to home network or PC. In that case we need a firewall to keep our PC protected. Firewalls can be hardware, software or a combination of both.
There are different types of firewall products available in the market and we have to choose the best that suits for our PC needs. Below are some of the firewalls and their features.
Firestarter – Firestarter is built for Linux operating system and it is most widely used Linux desktop firewall software available today (firestarter). This is an open source software and easy to use on both Linux server and PC. Some key features of firestarter are, user friendly, easy to use, graphical interface, suitable for desktops, servers and gateways, real – time firewall event monitor, allows to define both inbound and outbound access policy, enables port forwarding, real time firewall events view, can view active network connections, including any fraffic routed through the firewall, supports for tuning Tos parameters to improve services for connect client computers, available in many languages,

You May Also Find These Documents Helpful

  • Good Essays

    Today the Internet has created some really bad issues. First of all, viruses are a problem for the web and its users because they cause damage to their computers. A virus is sent and received as an e-mail through the Internet, and if a computer receives a virus, it is expensive to fix. Therefore, people will have to buy a new mother board in order to get the computer to work again. Another bad thing that often occurs on the Internet is fraud. Frauds are most likely to happen online; therefore, people should avoid giving any personal information for example credit card numbers, debit card numbers, home addresses, and especially not social security numbers. When shoppers are buying merchandise through the Internet with a debit or a credit card, they may have a good chance of getting fraud. People don't only lose money, but they can also get their identity stolen. Pornography is also a negative side of the Internet because a kid can get to it just by clicking the mouse. Pornography pages do say "Adults Only"; however, this does not stop an underage children from looking through the pornography pages. The Internet is the easiest way for a child to get to pornography; in fact, pornography causes serious damages to a child. A child can become addicted to sex, distract him/her from his/her normal school activities, and can grow up with a perverted mind. Viruses, frauds, and pornography are a few examples…

    • 1171 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Now regarding your dilemma with deciding over buying hardware firewalls and antivirus applications… stop. There is no need to go and shill extra money to buy hardware for any sort of countermeasures, no matter how noble your goals may seem. Windows 7 already has user-friendly security, so discrepancies such as viruses and spyware will be dealt with more efficiently. The Action Center in your Control Panel will make sure your Firewall is on, and BitLock Drive Encryption makes sure your passwords,…

    • 190 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    References: Adams, Karen, (2012). Types of Intrusion Prevention Systems. Retrieved September 6, 2012 from http://www.ehow.com/info_8039841_types-intrusion-prevention-systems.html…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    |Comments on security |Linux can use firewalls, IPS, IDS, and antivirus software. It can also be configured to |…

    • 757 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    4. Network Admissions Control - Where a client (supplicant) must pass muster with the networks policy server before being able to connect to resources on the network. Internal firewalls at the host level - These can be software based (personal firewalls) or hardware based such as the 3Com embedded firewalls and policy server that are host-based, hardware-embedded firewalls for desktops, servers and notebooks. These firewalls help to protect individual systems inside or outside the perimeter, wherever an additional layer of security is needed.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    SEC 280 Week 4 Case Study

    • 425 Words
    • 2 Pages

    One of the most basic things we need to do at home is to setup a router and firewall. Many people are not aware of the security risks of not using a firewall at home. Firewalls act as shields from unwanted traffic and intrusion. There are many types of packets that a well setup firewall can defend us from without our even knowing. Securing the router with passwords was also something that for a number of years in the early days of home computing that not many people were aware of. As a consequence home networks were left wide open for anyone to connect to and explore. Once inside they will have access to any machine also on that network.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Exercise 1

    • 98 Words
    • 1 Page

    You are absolutely correct about Windows 7 including protection and having a firewall in the OS. However I would still purchase hardware firewalls and internet security software. The internet protection and firewall that come with the Windows 7 OS are not the best against threats. You will be better protected by purchasing internet security software. Please keep in mind you should only use one security software. Having more than one will cause them to go back-and-forth to see who will handle the protection and any threat can easily slip through.…

    • 98 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 D1

    • 564 Words
    • 3 Pages

    Having security based software, clean-up based software, and drive formatting can dramatically change how well you computer performs. Security based utilities such firewalls are highly important as your computer is at risk all the time. The main risks to your computer are from virus, Trojans, worms, cookies, spyware and many more. These can be sent though free software downloads emails, internet websites, bad cookies, and many different places. Unwanted virus can cause data loss, makes changes or delete software packages, saves personal information and send it to other users. Firewall will prevent unwanted unauthorized users from accessing your computer. Malware packages can go though cookies and delete bad cookies containing bank details and other personal information. You can also buy security packages such as Norton and MacAfee whereas the firewall is a package that comes with the operating system. I would advise to use the computer based and the shop brought packages to protect your computer. Without uses packages and if the packages aren’t running you computer could be at risk. You computer will run slower, freeze, or even stop running completely if it gets infected.…

    • 564 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Although major part of security issues are from inside, Internet does take external threats. When users connect the Internet, the web browsers might contain breaches that permit scripts to access the system and may cause damages potentially. In addition, when information is transmitting through the public network, the transmission might be captured by someone else. This is known as man-in-the middle attack. (Dean, 2009) Another potential common risk associated with Internet is called reconnaissance threats. Attackers could detect the reachable networks, devices and services through the Internet connection, or even draw an entire network map. Furthermore, DoS attack is another risk users could encounter when using Internet. Hackers attempts to over-whelm the system in order to make it shut down. (Oppenheimer, 2011)…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are two types of firewalls, there is the in-bound firewall that protects against all things that come into your computer. Then there is the two-way firewall. With this firewall it protects both inbound and outbound threats. This type is used quite often these days. Many computer only have a one-way firewall, but many of them like Zone alarm are two way firewalls. Firewalls are used to block or accept information into your computer that is not a threat. It will either send it to where it needs to be or it will block it if the potential of the file is threatening to your device. A type of firewall is your basic McAfee, which works with Microsoft Corporation on your basic computer it is a program that is already installed into your device. It is a virus protector that works with your computers already installed firewall to keep out and potential harmful viruses or threats to your computer. You can do basic setting for the firewall or you can put it to your liking to make sure of no type of threats can enter your computer.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Network Security

    • 581 Words
    • 3 Pages

    14. Explain the basic technology that makes residential/SOHO firewall appliances effective in protecting a local network. Why is this usually adequate for protection?…

    • 581 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    There are many ways to tighten up security when it comes to network security, but the most important part of the security in the actual user. If the user is not trained on the system and does not know ones regulations of the company then security is out the door. First and for most, the personal must continues training on the systems that they will have access to. Then there system must be prepared for the environment that they will be placed in. If the policy allows access to facebook then the server address won’t be blocked. If they don’t allow any other programs, software, or web sites then for work, then the computer must be set up for that purpose of working only. That is how one lowers the threat level on the user’s level. For authentication, authorization, and accounting the IT department must stay on top of their duties and have the passwords changed every so often. The IT team must also give the correct level of access to the person that is due it. And continue with follow ups on the system to insure that all is still well. For prevention they must try and stay one step ahead of the intruders. They must think like the hackers and try and get through their systems. For responding to intrusions a company should have a response team or a Disaster Recovery Team in place to act in cases of intrusions. There should be back systems in place to as not hinder the company day to day operation. Files should be backed up in a timely manner also. But a system is never fully…

    • 310 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Second, internet filters also have other advantages. First, filter software can protect the data of businesses; companies also need to protect customer information to keep it from falling in the wrong hands. Second, filter software can identify internet theft is a real threat, because hackers are skilled at getting people's personal information and using it to commit fraud. Third, filter software can make the employees more productive, because there are employees who spend many working hours surfing websites unrelated to their jobs.…

    • 486 Words
    • 2 Pages
    Good Essays