Share


Share

Share it !



share/bookmark
Showing posts with label Firewall. Show all posts
Showing posts with label Firewall. Show all posts

Firewall Security Safeguards Personal Computer and Data


Almost everybody today has a personal computer connected to the Internet. The internet is a great way to communicate, gather information, and shop. It has made life easier with applications that help a person transact over the internet. However, while the internet has numerous advantages, there are serious disadvantages that should be taken into account as well. The internet has become a breeding ground for criminals and hackers who victimize people by accessing their profiles and fraudulently use their names for transactions which result to huge amounts of bills and tainted credit records of the victimized people. Thus the need for an efficient and effective internet security that could help protect your identity from these attacks. Using a firewall protects your computer and prepares your computer from potential attackers.

Facts about firewall security

1 - A firewall is basically a piece of software or hardware operating in a networked environment to prevent communication between areas with different degrees of trust. The term firewall is derived from the same concept of firewall used in construction whose purpose is to keep fire from spreading if a fire starts.

2 - Personal firewall is the most common type of firewall and this type is found in Windows XP. This type of firewall was not popular among users because of the invention of the viruses-Blaster worm and the Sasser worm. These worms drove Microsoft to start designing a more comprehensive firewall application that can provide users improved and enhanced protection for both their home and office networks.

3 - The next generation of Microsoft firewall protection is effectively designed to help secure and equip both your personal and business computers with the advanced protection against the capabilities viruses. The next generation of firewall protection allows you investigate any activity going on outside of your system. It will let you know who is accessing your information online and who is doing transactions under your name.

Setting firewall

Every personal computer needs a firewall for complete cyber security. Luckily, there is no need to buy it since the operating system of your computer has already included it. Your role is to find out how to properly set up your operating parameters and start configuring your firewall by identifying what to allow and what to ban on your computer.

Although you could easily look for help in setting up your firewall in your computer, it is also important that you ask for assistance of somebody who knows a thing or two about firewalls. Mishandling of firewalls will make them useless and will not protect you from any cyber attack.




Enroll with Sourcefire and get cyber security instantly. Sourcefire provides next generation intrusion detection, NGFW and intrusion prevention system to protect your privacy on the internet.




Protecting Your Computer With Firewall Security


To make it simple, firewall security acts as a barrier between the threats and the personal computer. It keeps away data from the hands of thieves and hackers who are responsible for many cyber crimes.

Firewall protection is a dual approach of software regulating and monitoring hardware and communication protocols. It is tasked to inspect network traffic and all "packets" of information within the computer, in its CPU and hard drives. With firewall protection, the possibility of threat is completely ruled out or minimized. This is done by the alarming and isolating the potential threats, depending on whether you it will deny or permit access your computer based on the rules you set.

The main task of the firewall security is to monitor the flow of traffic between varieties of computer networks with varying trust levels. Virtual world has infinite overlapping zones; some are safe while other is dead. On the contrary, internal networks are more likely to integrate a zone offering more trust.

It is highly essential that firewall should be properly configured; otherwise it would be worthless. Standard security practices demand for "default-deny" firewall rule signifying that only network connections are permitted after they are thoroughly monitored. A deep understanding of network applications along with efforts and time of an administrator are required for effective internet security.

Firewall protection blocks unauthorized access and security threats, as well as prevents and decrypts random information traveling through different domain line. A vital part of the firewall internet security is the fabrication of network address translation, helping to save the identity behind private addresses. It is also used by proxies helping the flawed information from spreading. It also efficiently monitors the traffic.

Users running the default on their security are not utilizing full potential of their firewall protection. You can deal with the common problems happening frequently associated with the computer by introducing some modification or making use of advanced firewall security tools. Hence it would be truly beneficial if the computer has dynamic firewall protection system.

A firewall intrusion detection system has several roles to play. It lowers down the action of threats on the system. A properly set up firewall is capable of reporting back to the creator.

To avail of this protection, you need to choose the best firewall security for your system. You can safeguard the system by installing and configuring a detection system before signing in online.




Get 100% guaranteed firewall security with Intrusion detection system, Next Gen firewall and intrusion prevention software.




Windows XP Security Tips - Enabling and Disabling Windows Firewall


Computer threats are numerous and the consequences of an attack on your computer's security can be severe. But the good news is that it's relatively simple to protect your computer. You can check the security settings that help protect your computer to make sure your computer is secure. The three most important security settings are: Firewall, Automatic Updates and Virus Protection.

Your first line of defense in securing your computer is to protect it from attacks by outsiders. Windows XP comes with firewall software that is turned on automatically. The firewall software provides a barrier between your computer and the network to which is connected by preventing unauthorized people or unwanted programs, such as viruses, from accessing your computer through the Internet or a network.

Windows regularly checks Microsoft's Web site for the latest important updates for your computer and downloads and installs the updates automatically. (Provided you have automatic updates turned on) Windows also checks to see if your computer is using an anti virus program and whether the program is up to date. A virus can cause a variety of problems, such as the appearance of annoying messages or the destruction of information.

Follow the step by step instructions to enable or disable your Windows firewall protection. To view the instructions with guided screenshots you can visit our website and click on PC Tips, and select Security Tips.

Step 1

Click on Start menu and select Control Panel.

Step 2

In the Control Panel window Select Security Center to view and manage your security settings.

Step 3

The Windows Security Center appears and displays the status of your Firewall setting.

Step 4

You can turn Firewall On/Off by clicking Windows Firewall at the bottom of the Windows Security Center window. In the Windows Firewall dialog box select your choice and click on OK.

For more Windows Tips, including performance, customization, maintenance, recovery, efficiency, networking and registry tips, all with step by step instructions and guided screenshots, be sure to be visit our website and begin to unleash your computers potential.




PC Online [http://www.pconline.com.au] - Embracing the Future

[http://www.pconline.com.au]




What is a Computer Firewall?


A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It does this by filtering out the data sent by attackers.

There are two main types of firewalls.


Hardware Firewalls
Software Firewalls

A hardware firewall is generally considered to be more secure than a software firewall. This is because a software firewall is integrated into the vulnerable operating system of the target machine. Whereas a hardware firewall uses an obscure proprietary operating system programmed by the manufacturer.

Since the software firewall is more common this post will cover the following details of firewall software.


Functions
Configuration
Types

Functions of Firewall Software:

The function of firewall software within a network is similar to that of a building with fire doors. Just as a firewall of a building is meant to prevent the fire from spreading to adjacent building structures, firewall software prevents intruders and malware from infecting your computer or network.

Firewall software permits the flow of relevant data and blocks all irrelevant and suspicious data from entering. Relevant files such as legitimate communications, video files, music files, or photo files which are retrieved while browsing or surfing on Internet, are allowed to enter into your computer or network.

Irrelevant or bad data such as hacker scripts or programs that are placed on the Internet to corrupt important files, steal personal information, or hijack your system are blocked. Hackers generally attempt to invade computer files through your computer's ports.

A Firewall forms a protective layer and takes the responsibility of monitoring your computer ports. It also regulates the flow of incoming and outgoing data. It acts as a barrier to hackers.

Many people have the misconception that antivirus software is completely protecting their computers from hackers. However, antivirus software can fail to protect your computer against severe hacker attacks.

Regardless of the type of Internet connection (dial-up, DSL, or broadband connection), your computer is at great risk while it is hooked up to the Internet.

Many software firewalls come with a user interface that is easy to understand and preset security levels. In addition, hardware firewalls are incredibly secure and not very expensive. Home versions that include a router, firewall and ethernet hub for broadband connections can be found for well under $100.

Proper Configuration of Firewall:

Firewall software can be worthless if it is not properly configured. Standard security procedure usually follows a default DENY rule. Which means that only selected network connections are allowed. Unfortunately, use of such a configuration requires a thorough knowledge of your network's application and its end points, and the day-to-day activities of your organization.

Deficient of such knowledge, many businesses therefore use a default ALLOW rule. This rule blocks only specified traffic and allows the flow of non-specified traffic. Such a configuration can cause unwanted network connections and the system is also more susceptible to being compromised.

Your best bet is to read the documentation and instructions and configure your firewall according to the needs of your organization or network. Additionally, you should periodically review the logs to see who has been trying to connect to your network and adjust your firewall's setting accordingly to mitigate new threats.

Once you have a firewall in place, you should test it. A great way to do this is to go to http://www.grc.com and try their free Shields Up! Security test. You will get immediate feedback on just how secure your system is.




The author is a computer security professional with experience protecting small business and home networks. He also teaches the basics of computer network security at 365 Computer Security Training where he blogs regularly and creates video training and educational materials related to information security. Learn more at http://www.365ComputerSecurityTraining.com




How to Test Your Firewall

You may have turned your PC's or Wireless Router's firewall feature on at some point, but how do you know if it's really doing its job?

The main purpose of a personal network firewall is to keep whatever is behind it safe from harm (and by harm I'm talking about hackers and malware).

If implemented correctly, a network firewall can essentially make your PC invisible to bad guys. If they can't see your computer, then they can't target you for network-based attacks.

Hackers use port scanning tools to scan for computers with open ports that might have associated vulnerabilities, providing them with backdoors into your computer. For instance, you may have installed an application on your computer that opens an FTP port. The FTP service running on that port might have a vulnerability that was just discovered. If a hacker can see that you have the port open and have the vulnerable service running, then they could exploit the vulnerability and gain access to your computer.

One of the major tenants of network security is to only allow ports and services that are absolutely necessary. The less ports open and services running on your network and/or PC, the less routes hackers have to try and attack your system. Your firewall should prevent inbound access from the internet unless you have specific applications that require it, such as a remote administration tool.

You most likely have a firewall that is part of your computer's operating system. You may also have a firewall that is part of your wireless router.

It is usually a best security practice to enable "stealth" mode on the firewall on your router. This helps to make your network and computer less conspicuous to hackers. Check your router manufacturer's website for details on how to enable the stealth mode feature.

So how do you know if your firewall is actually protecting you from the bad guys?

You should periodically test your firewall. The best way to test your firewall is from outside your network (i.e. the Internet). There are many free tools out there to help you accomplish this. One of the easiest and most useful available is ShieldsUP from the Gibson Research website. ShieldsUP will allow you to run several different ports and services scans against your network IP address which it will determine when you visit the site. There are four types of scans available for from the ShieldsUP site:

File Sharing Test

The file sharing test checks for common ports associated with vulnerable file sharing ports and services. If these ports and services are running it means that you could have a hidden file server running on your computer, possibly allowing hackers access to your file system

Common Ports Test

The common ports test examines the ports used by popular (and possibly vulnerable) services including: FTP, Telnet, NetBIOS, and many others. The test will tell you whether or not your router or computer's stealth mode is working as advertised.

All Ports and Services Test

This scan tests every single port from 0 to 1056 to see if they are open (indicated in red), closed (indicated in blue), or in stealth mode (indicated in green). If you see any ports in red you should investigate further to see what is running on those ports. Check your firewall setup to see if these ports have been added for some specific purpose.

If you don't see anything in your firewall rules list regarding these ports, it could indicate that you have malware running on your computer and it's possible that your PC may have become part of a bot net. If something seems fishy, you should use an anti-malware scanner to check your computer for hidden malware services

Messenger Spam Test

The Messenger Spam test attempts to send a Microsoft Windows Messenger test message to your computer to see if your firewall is blocking this service which can be exploited and used by spammers to send messages to you. This test is intended for Microsoft Windows users only. Mac/Linux users can skip this test.

Browser Disclosure Test

While not a firewall test, this test shows what information your browser may be revealing about you and your system.

The best results you can hope for on these tests is to be told that your computer is in "True Stealth" mode and that the scan reveals that you have no open ports on your system that are visible / accessible from the Internet. Once you have achieved this, you can sleep a little easier knowing that your computer is not holding up a big virtual sign that says "Hey! Pleas Attack Me."


View the original article here