Search the Community
Showing results for tags 'explaining'.
Found 1 result
[I]I've had around three other threads that were based around computer security before getting banned on my other account. I now have on basic thread posted on this account. I'm looking to go into a bit of debt and in the end compile a big list, so feel free to contribute.[/I] In this thread I will be explaining what a firewall is, how it works, and why it's suggested you use one... [HR][/HR] [spoiler=Diagrams][CENTER][IMG]http://www.bestsecuritytips.com/modules/soapbox/images/firewall/2/firewall1.gif[/IMG] [IMG]http://www.examiner.com/images/blog/replicate/EXID59361/images/Firewall.jpg[/IMG][/spoiler][/CENTER] [I]What's the web definition of Firewall (Computer)?[/I] [quote]A firewall is a system designed to prevent unauthorized access to or from a private network. You can implement a firewall in either hardware or software form, or a combination of both. Firewalls prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet (i.e., the local network to which you are connected) must pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.[/quote] So if we use the basic diagram below: [IMG]http://www.examiner.com/images/blog/replicate/EXID59361/images/Firewall.jpg[/IMG] We can see that your computer is protected from INCOMING and OUTGOING connections. This regulates who has access to your data. They're are different types of firewalls: [LIST] [*]Packet Filtering [quote]The system examines each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. [/quote] [*]Circuit-level gateway implementation [quote] This process applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. [/quote] [*]Acting as a proxy server [quote]A proxy server is a type of gateway that hides the true network address of the computer(s) connecting through it. A proxy server connects to the Internet, makes the requests for pages, connections to servers, etc., and receives the data on behalf of the computer(s) behind it. The firewall capabilities lie in the fact that a proxy can be configured to allow only certain types of traffic to pass (e.g., HTTP files, or web pages). A proxy server has the potential drawback of slowing network performance, since it has to actively analyze and manipulate traffic passing through it. [/quote] [*]Web application firewall [quote]A web application firewall is a hardware appliance, server plugin, or some other software filter that applies a set of rules to a HTTP conversation. Such rules are generally customized to the application so that many attacks can be identified and blocked.[/quote] [/LIST] [I]How does a hacker gain access?[/I] - Through an open port, incoming/outgoing, through your firewall. [HR][/HR] [B]PROTECT YOURSELF![/B] Search through this [URL="http://www.techsupportalert.com/best-free-firewall.htm"]article[/URL] to grab the [B]BEST[/B], [B]FREE[/B], firewalls. Several anti-virus/internet security programs now come with a firewall. One of these would be [URL="http://www.kaspersky.com/pure"]Kaspersky PURE[/URL]. Credits [LIST] [*]@[URL="http://www.runelocus.com/forums/member.php?168506-Encoded"]Encoded[/URL] [*][URL="http://gewgle.com"]Gewgle[/URL] [/LIST] [I]Need more information? Contact me via PM.[/I]