wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Firewall

profile
Akshay Goswami
Jul 08, 2022
0 Likes
1 Discussions
120 Reads

A firewall provides protection from external internet attackers by protecting your computer or network from malicious or unwanted network traffic. Firewalls can also prevent malicious software from accessing a computer or network over the Internet. Firewalls can be configured to block data from specific locations (i.e., computer network addresses), applications, or holes while allowing relevant and required data.
A firewalls filter network traffic within a private network. Analyzes which traffic should be allowed or restricted based on a set of rules. Think of a security program as a security guard on your computer's access point that only allows trusted sources, or IP addresses, to access your network.
Firewall only accepts incoming traffic prepared to receive. It distinguishes between good and bad traffic and allows or blocks certain data packets in pre-set security rules.
A firewall can be software or hardware. Software firewall programs are installed on each computer, and they control network traffic through applications and port numbers. Meanwhile, a hardware firewall is a device set up between a gateway and your network.
To improve our firewall security: Constantly update your firewalls as soon as possible, Use antivirus protection, Limit accessible ports and host.


Comments ()


Sign in

Read Next

Fitness

Blog banner

Security issues

Blog banner

Network Forensics Tools and Techniques

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Cache memory

Blog banner

Indian Food

Blog banner

Culture Of Ladakh

Blog banner

Disk cache

Blog banner

Women empowerment

Blog banner

Visualization in Data Science

Blog banner

CONCURRENCY

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Scala - a programming tool

Blog banner

Water Resources are about to exhaust...

Blog banner

Mumbai

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Cache memory

Blog banner

Embedded Operating System

Blog banner

Man VS Nature

Blog banner

Vulnerability Assessment

Blog banner

What is Packet Filtering?

Blog banner

Answer

Blog banner

Texting is actually better than talking in person

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

What are Tenders its various types

Blog banner

Sagar Parikrama

Blog banner

Outlook.com

Blog banner

Raid

Blog banner

Virtual Memory

Blog banner

Evolution of Operating System

Blog banner

Memory Management

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

A Deep Dive

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Steganography

Blog banner

Remote Work in 2026

Blog banner

undefined

Blog banner

Memory management

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Hacking Mobile Platforms

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner