wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Firewall

profile
Akshay Goswami
Jul 08, 2022
0 Likes
1 Discussions
120 Reads

A firewall provides protection from external internet attackers by protecting your computer or network from malicious or unwanted network traffic. Firewalls can also prevent malicious software from accessing a computer or network over the Internet. Firewalls can be configured to block data from specific locations (i.e., computer network addresses), applications, or holes while allowing relevant and required data.
A firewalls filter network traffic within a private network. Analyzes which traffic should be allowed or restricted based on a set of rules. Think of a security program as a security guard on your computer's access point that only allows trusted sources, or IP addresses, to access your network.
Firewall only accepts incoming traffic prepared to receive. It distinguishes between good and bad traffic and allows or blocks certain data packets in pre-set security rules.
A firewall can be software or hardware. Software firewall programs are installed on each computer, and they control network traffic through applications and port numbers. Meanwhile, a hardware firewall is a device set up between a gateway and your network.
To improve our firewall security: Constantly update your firewalls as soon as possible, Use antivirus protection, Limit accessible ports and host.


Comments ()


Sign in

Read Next

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

E-learning

Blog banner

Install Ubuntu in Vmware

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

SPAM

Blog banner

Financial Fraud Detection

Blog banner

Worms, viruses and Bots

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Operating system

Blog banner

RAID

Blog banner

Confidence Building Activities for the New School Year

Blog banner

Environmental Management using GIS

Blog banner

Assignment-3

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

GOOGLE

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Online Games

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Excel records

Blog banner

Earth with no trees

Blog banner

Objectives and functions of Operating System...

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Cache memory

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

Rapido

Blog banner

Python as a tool for Data science task & project

Blog banner

RAID

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

IP Address

Blog banner

Recipe of Paneer Butter Masala

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Security Issues and Countermeasures

Blog banner

Difference Between Classification And Clustering

Blog banner

Deadlock

Blog banner

Ethical Hacking

Blog banner

Modern operating system

Blog banner

Malware Defense

Blog banner

Proof-of-Stake (PoS)

Blog banner

Constrained Management in IT

Blog banner

Article on Team Work

Blog banner