wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SECURITY TOOLS

profile
Ritu Jha
Aug 27, 2022
0 Likes
0 Discussions
48 Reads

ANTI VIRUS SOFTWARE 

The most basic security program is anti- virus software. Anti - virus software periodically downloads small components known as definitions. A server that help it to identify viruses on your computer.  The disadvantage of anti - virus software is that it only deletes anti- virus software after it has been identified or downloads, and does not prevent malware from being downloaded on your computer. 

FIREWALLS 

A firewall is a filter that sits between a corporate network and the rest of the world. A firewall determines what type of traffic will be allowed to pass through the network. The firewall can potentially check the packets at all levels. 

• physical address allow or disallow traffic to certain network addresses ( only for shared media) 

• IP address allow or disallow traffic to certain network addresses. 

• Port numbers allow or disallow traffic to certain port numbers. 

▪︎ prohibit finger from outside. 

▪︎ prohibit Talnet from outside. 

▪︎ prohibit employees from accessing certain network services. 

● There are 2 types of Firewalls 

1) Software  Firewalls  

2) Hardware  Firewalls 

● Benefits of Firewall 

1) Monitors Traffic 

2) Blocks Trojans 

3) Stops Hackers 

4) Stops Keyloggers

 


Comments ()


Sign in

Read Next

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Direct Memory Access

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Khau Galli – Vile Parle

Blog banner

Why Oak Tree Hotel Is Arcadia’s Hidden Gem?

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Security and E-mail

Blog banner

I/O Buffering

Blog banner

Positioning: The battle of the minds

Blog banner

memory cache

Blog banner

Race Conditions

Blog banner

Define Instagram.

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Starvation

Blog banner

Virtual memory

Blog banner

Memory management

Blog banner

Direct Memory Access

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

File sharing

Blog banner

FRIENDSHIP

Blog banner

Electronic Funds Transfer

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

OLA

Blog banner

Steganography and Steganalysis

Blog banner

The Evolution of Operating Systems

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Mumbai

Blog banner

CSI and Organizational Change

Blog banner

DIGITAL ECONOMY

Blog banner

Mumbai famous street food

Blog banner

Domain Name System

Blog banner

Music

Blog banner

OS Assignment 3 Deadlock

Blog banner

THE DESIRE OF MANY

Blog banner

Street foods

Blog banner

Social engineering in cyber security

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

BASICS OF SHARE MARKET

Blog banner

Crypto tax evasion

Blog banner