wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SECURITY TOOLS

profile
Ritu Jha
Aug 27, 2022
0 Likes
0 Discussions
48 Reads

ANTI VIRUS SOFTWARE 

The most basic security program is anti- virus software. Anti - virus software periodically downloads small components known as definitions. A server that help it to identify viruses on your computer.  The disadvantage of anti - virus software is that it only deletes anti- virus software after it has been identified or downloads, and does not prevent malware from being downloaded on your computer. 

FIREWALLS 

A firewall is a filter that sits between a corporate network and the rest of the world. A firewall determines what type of traffic will be allowed to pass through the network. The firewall can potentially check the packets at all levels. 

• physical address allow or disallow traffic to certain network addresses ( only for shared media) 

• IP address allow or disallow traffic to certain network addresses. 

• Port numbers allow or disallow traffic to certain port numbers. 

▪︎ prohibit finger from outside. 

▪︎ prohibit Talnet from outside. 

▪︎ prohibit employees from accessing certain network services. 

● There are 2 types of Firewalls 

1) Software  Firewalls  

2) Hardware  Firewalls 

● Benefits of Firewall 

1) Monitors Traffic 

2) Blocks Trojans 

3) Stops Hackers 

4) Stops Keyloggers

 


Comments ()


Sign in

Read Next

Travelling blog

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Best Time to Visit Arcadia, Florida & Why Oak Tree Hotel Is Always Ready

Blog banner

Paginng In OS

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Virtual Memory

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

Travel: Everything Everywhere!

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Pink sauce pasta

Blog banner

FIREWALL

Blog banner

Proof-of-Stake (PoS)

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Principles of Service Operation

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

MEMORY MANAGEMENT

Blog banner

NETSUITE

Blog banner

Mumbaicha Dabbawalla

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Webmail

Blog banner

UniProcessor Scheduling

Blog banner

Message Passing in OS

Blog banner

Install Ubuntu in Vmware

Blog banner

RAID_142

Blog banner

Dudhasagar waterfall ?

Blog banner

Microsoft Windows Overview

Blog banner

Risk factors in service transistion

Blog banner

Evolution of operating system

Blog banner

Direct Memory Access

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Domain Name System

Blog banner

Data Science & AI

Blog banner

Virtual machine.

Blog banner

BrainGate Technology

Blog banner

memory cache

Blog banner

ProofHub

Blog banner