wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SECURITY TOOLS

profile
Ritu Jha
Aug 27, 2022
0 Likes
0 Discussions
48 Reads

ANTI VIRUS SOFTWARE 

The most basic security program is anti- virus software. Anti - virus software periodically downloads small components known as definitions. A server that help it to identify viruses on your computer.  The disadvantage of anti - virus software is that it only deletes anti- virus software after it has been identified or downloads, and does not prevent malware from being downloaded on your computer. 

FIREWALLS 

A firewall is a filter that sits between a corporate network and the rest of the world. A firewall determines what type of traffic will be allowed to pass through the network. The firewall can potentially check the packets at all levels. 

• physical address allow or disallow traffic to certain network addresses ( only for shared media) 

• IP address allow or disallow traffic to certain network addresses. 

• Port numbers allow or disallow traffic to certain port numbers. 

▪︎ prohibit finger from outside. 

▪︎ prohibit Talnet from outside. 

▪︎ prohibit employees from accessing certain network services. 

● There are 2 types of Firewalls 

1) Software  Firewalls  

2) Hardware  Firewalls 

● Benefits of Firewall 

1) Monitors Traffic 

2) Blocks Trojans 

3) Stops Hackers 

4) Stops Keyloggers

 


Comments ()


Sign in

Read Next

Memory management

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

OPERATING SYSTEM

Blog banner

Article on IT development trends

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Types of email

Blog banner

Network Forensics

Blog banner

Caching windows

Blog banner

Security Issues and Countermeasures

Blog banner

Wedding photographer

Blog banner

Booting Process In Operating System

Blog banner

What is semaphore in operating system?

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Traditional Unix System

Blog banner

Malware Defense

Blog banner

Toothache at night? What does this mean, and how to cope with it?

Blog banner

Khau Galli – Vile Parle

Blog banner

Memory Management

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Different Types of Data

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

A True Friendship

Blog banner

Environmental Management using GIS

Blog banner

Deadlock

Blog banner

Memory Management

Blog banner

Memory Management in Operating System

Blog banner

Danger assessment in GIS

Blog banner

Virtual Memory

Blog banner

SQL Injection practice on DVWA

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Topic: Sessions in Operating system

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

Cyber Laws In India and Around the World

Blog banner

Deadlock

Blog banner

What is Email? Uses of Emails

Blog banner

The Right way of cooking

Blog banner

Trello ( management software)

Blog banner

My First Dream Bike

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Concurrency and memory

Blog banner