wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SECURITY TOOLS

profile
Ritu Jha
Aug 27, 2022
0 Likes
0 Discussions
48 Reads

ANTI VIRUS SOFTWARE 

The most basic security program is anti- virus software. Anti - virus software periodically downloads small components known as definitions. A server that help it to identify viruses on your computer.  The disadvantage of anti - virus software is that it only deletes anti- virus software after it has been identified or downloads, and does not prevent malware from being downloaded on your computer. 

FIREWALLS 

A firewall is a filter that sits between a corporate network and the rest of the world. A firewall determines what type of traffic will be allowed to pass through the network. The firewall can potentially check the packets at all levels. 

• physical address allow or disallow traffic to certain network addresses ( only for shared media) 

• IP address allow or disallow traffic to certain network addresses. 

• Port numbers allow or disallow traffic to certain port numbers. 

▪︎ prohibit finger from outside. 

▪︎ prohibit Talnet from outside. 

▪︎ prohibit employees from accessing certain network services. 

● There are 2 types of Firewalls 

1) Software  Firewalls  

2) Hardware  Firewalls 

● Benefits of Firewall 

1) Monitors Traffic 

2) Blocks Trojans 

3) Stops Hackers 

4) Stops Keyloggers

 


Comments ()


Sign in

Read Next

Memory Management

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Theads

Blog banner

10 Unknown facts about India's Independence

Blog banner

PHISHING

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Diwali

Blog banner

From Model Mistakes to Metrics

Blog banner

Routers

Blog banner

Deadlock in operating system

Blog banner

Ola

Blog banner

A small world of Sockets

Blog banner

Can ChatGPT Answer All My Questions About Life?

Blog banner

How Cyber Forensics use in AI

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

Information Technology In E- Commerce

Blog banner

Mumbai

Blog banner

FRIENDSHIP

Blog banner

VPN

Blog banner

What is service level Agreement?

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Every body is beautiful

Blog banner

Operating Systems Overview

Blog banner

HTML vs HTML5

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Dos (Denial of service) Attack

Blog banner

Deadlock

Blog banner

Marvel Cinematic Universe

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Music

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Memory Management

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

Python as a tool for data analysis

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner