wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Firewall

profile
Akshay Goswami
Jul 08, 2022
0 Likes
1 Discussions
120 Reads

A firewall provides protection from external internet attackers by protecting your computer or network from malicious or unwanted network traffic. Firewalls can also prevent malicious software from accessing a computer or network over the Internet. Firewalls can be configured to block data from specific locations (i.e., computer network addresses), applications, or holes while allowing relevant and required data.
A firewalls filter network traffic within a private network. Analyzes which traffic should be allowed or restricted based on a set of rules. Think of a security program as a security guard on your computer's access point that only allows trusted sources, or IP addresses, to access your network.
Firewall only accepts incoming traffic prepared to receive. It distinguishes between good and bad traffic and allows or blocks certain data packets in pre-set security rules.
A firewall can be software or hardware. Software firewall programs are installed on each computer, and they control network traffic through applications and port numbers. Meanwhile, a hardware firewall is a device set up between a gateway and your network.
To improve our firewall security: Constantly update your firewalls as soon as possible, Use antivirus protection, Limit accessible ports and host.


Comments ()


Sign in

Read Next

Soak knowledge and level up your intellectual potential!!!

Blog banner

What is M-commerce and how it's work

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Electronic Funds Transfer

Blog banner

Note Taker App

Blog banner

Uniprocessor Scheduling

Blog banner

Types of email

Blog banner

computer security

Blog banner

Memory Management

Blog banner

My Favorite Sportsperson

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Outlook mail

Blog banner

Trello ( management software)

Blog banner

Types of Hackers

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Virtual memory in windows

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Apple

Blog banner

Data Security must be your Priority!

Blog banner

Web Site

Blog banner

HTML vs HTML5

Blog banner

EMAIL INVESTIGATION

Blog banner

Topic: Sessions in Operating system

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Direct Memory Access

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Privacy in Social Media and Online Services

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Deadlock and Starvation

Blog banner

Ubiquitous Computing

Blog banner

Assignment 2

Blog banner

A BLOG ON MYSQL

Blog banner

Women Empowerment

Blog banner

OS Assignment 3 Deadlock

Blog banner

Internet of Things and cyber security

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

Travelling blog

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

How to lose belly fat

Blog banner