wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Firewall

profile
Akshay Goswami
Jul 08, 2022
0 Likes
1 Discussions
120 Reads

A firewall provides protection from external internet attackers by protecting your computer or network from malicious or unwanted network traffic. Firewalls can also prevent malicious software from accessing a computer or network over the Internet. Firewalls can be configured to block data from specific locations (i.e., computer network addresses), applications, or holes while allowing relevant and required data.
A firewalls filter network traffic within a private network. Analyzes which traffic should be allowed or restricted based on a set of rules. Think of a security program as a security guard on your computer's access point that only allows trusted sources, or IP addresses, to access your network.
Firewall only accepts incoming traffic prepared to receive. It distinguishes between good and bad traffic and allows or blocks certain data packets in pre-set security rules.
A firewall can be software or hardware. Software firewall programs are installed on each computer, and they control network traffic through applications and port numbers. Meanwhile, a hardware firewall is a device set up between a gateway and your network.
To improve our firewall security: Constantly update your firewalls as soon as possible, Use antivirus protection, Limit accessible ports and host.


Comments ()


Sign in

Read Next

DATA WRANGLING

Blog banner

All you need to know about “On-page SEO”

Blog banner

SPAM

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

CONCURRENCY

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

NETWORK SECURITY RISKS

Blog banner

GIS in Disaster Management

Blog banner

Smartsheet

Blog banner

10 Signs your Computer has Virus

Blog banner

security controls

Blog banner

How To Secure Operating Systems ?

Blog banner

Introduction to Virtual Memory - 080

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Trends that began during the pandemic

Blog banner

A small world of Sockets

Blog banner

Starvation

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

OPERATING SYSTEM

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Webmail

Blog banner

Women Empowerment

Blog banner

Some facts about Technology

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Google classroom

Blog banner

Deadlock

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Service Operations in ITSM

Blog banner

How to grow followers on Instagram business account?

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

Sage business cloud accounting

Blog banner

A True Friendship

Blog banner

The art of being alone

Blog banner

Docker Framework

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

"Life as a Part-time Student"

Blog banner

Kernel in Operating System

Blog banner