wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Firewall

profile
Akshay Goswami
Jul 08, 2022
0 Likes
1 Discussions
120 Reads

A firewall provides protection from external internet attackers by protecting your computer or network from malicious or unwanted network traffic. Firewalls can also prevent malicious software from accessing a computer or network over the Internet. Firewalls can be configured to block data from specific locations (i.e., computer network addresses), applications, or holes while allowing relevant and required data.
A firewalls filter network traffic within a private network. Analyzes which traffic should be allowed or restricted based on a set of rules. Think of a security program as a security guard on your computer's access point that only allows trusted sources, or IP addresses, to access your network.
Firewall only accepts incoming traffic prepared to receive. It distinguishes between good and bad traffic and allows or blocks certain data packets in pre-set security rules.
A firewall can be software or hardware. Software firewall programs are installed on each computer, and they control network traffic through applications and port numbers. Meanwhile, a hardware firewall is a device set up between a gateway and your network.
To improve our firewall security: Constantly update your firewalls as soon as possible, Use antivirus protection, Limit accessible ports and host.


Comments ()


Sign in

Read Next

Artical on FreshBooks

Blog banner

Cyber Security in Data Breaching

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

File Sharing

Blog banner

CoWIN

Blog banner

What is OS Fingerprinting?

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Memory management

Blog banner

Memory heirchy

Blog banner

Hash password! Is it really secured?

Blog banner

Cross site scripting Attack

Blog banner

LIMITED EDITION

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Explain Multiprocessors

Blog banner

Cyber Laws In India and Around the World

Blog banner

ODOO

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Concept and definition of m-commerce

Blog banner

Fashion marketing in india

Blog banner

JIRA SOFTWARE

Blog banner

Python as a tool for data analysis

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

What are NFT s?

Blog banner

Session Vulnerabilities

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

"Games and the future"

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Starvation

Blog banner

What is semaphore in operating system?

Blog banner

10 Unknown facts about India's Independence

Blog banner

I/O Management and Disk Scheduling

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Virtual Machine

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Cache memory

Blog banner

Deadlock and Starvation

Blog banner

Cache memory

Blog banner

Google classroom

Blog banner

Busted : Common Web Security Myths

Blog banner

Wedding photographer

Blog banner