Loading


Add to Google
Showing posts with label Personal Firewalls. Show all posts
Showing posts with label Personal Firewalls. Show all posts

Wednesday, December 21, 2011

The Basic Function of a Computer Firewall

The word firewall is a very term in the world of computing. It is a part of a security of a computer or network but for today’s topic where going to focus a personal computer firewall. First what is a computer firewall, well it could be a software firewall or hardware firewall, wait a minute here this is getting to deep before we go any further let’s see what a firewall in general do or how does it gets to function. Firewall checks information coming from the Internet or a network and then either turns it away or allows it to pass through to your computer, depending on your firewall settings. In this way, a firewall helps prevent hackers and malicious software from gaining access to your computer. Windows Firewall is built into Windows and is turned on automatically.



The firewall has different settings depending on its work areas. For a firewall of a personal computer the general setting is usually determine by the owner which program is allowed or denied access to computer. Allowing a program to communicate through the firewall, sometimes called unblocking, is when you allow a particular program to send information through the firewall. You can also allow a program to communicate through the firewall by opening one or more ports. If you run a program such as an instant messaging program or a multi-player network game that needs to receive information from the Internet or a network, the firewall asks if you want to block or unblock (allow) the connection. If you choose to unblock the connection, Windows Firewall creates an exception so that the firewall won't bother you when that program needs to receive information in the future.


The recommended general default firewall settings are listed below:

·         The firewall is on.
·         The firewall is on for all network locations (Home or work, Public place, or Domain).
·         The firewall is on for all network connections.
·         The firewall is blocking all inbound connections except those that you specifically allowed.
·         E‑mail viruses

Windows FirewallImage via Wikipedia
 
The two items listed below are the two most common applications that a computer firewall can prevent from entering your computer. With the help of a properly set firewall the two items below can be prevented from infecting and gaining information from your computer.


E‑mail viruses

E‑mail viruses are attached to e‑mail messages. A firewall can't determine the contents of e‑mail messages, so it can't protect you from these types of viruses. You should use an antivirus program to scan and delete suspicious attachments from an e‑mail message before you open it. Even when you have an antivirus program, you should not open an e‑mail attachment if you're not positive it's safe.

Phishing scams
 
Phishing is a technique used to trick computer users into revealing personal or financial information, such as a bank account password. A common online phishing scam starts with an e‑mail message that appears to come from a trusted source, but actually directs recipients to provide information to a fraudulent website. Firewalls can't determine the contents of e‑mail messages, so they can't protect you from this type of attack.


Simulação da participação de um Firewall entre...Image via Wikipedia


If I have a router with a built-in firewall, should I also turn on Windows Firewall?

Yes, because router-based firewalls only provide protection from computers on the Internet, not from computers on your home network. For example, if a mobile computer or guest computer connects to some other network, becomes infected with a computer worm, and then connects to your home network; your router-based firewall won't be able to prevent the spread of the worm. However, a firewall running on each computer on your network can help control the spread of worms.


However, running more than one firewall program on your computer at the same time could cause conflicts. It's best to just use one firewall program, in addition to a router-based firewall.

Enhanced by Zemanta

Friday, December 9, 2011

Computer Tech Tips on Basic Zone Alarm Configurations

Firewall protects system from inward virus attacks and unwanted outward information sharing. Windows operating system generally comes with pre-installed windows firewall. But you should have one independent firewall to secure your data, identity and other sensitive information.

Zone alarm is a freeware firewall, which has a fully-loaded a paid version too. Till date over 60 million freeware copies have been downloaded till date. Use it to understand its effectiveness.

After installation, you could see the “Z” icon on the right bottom corner of your PC screen, near by the clock. Click it to open firewall window.

It allows 3 tiers of protection under 3 tabs – computer, internet and identity & data. Select each tab to configure each feature.


1. Computer
Under this tier, you could see 4 different security options – Basic firewall, anti-virus & anti-spyware, application control and PC tune-up. However, free version allows only 2 - Basic firewall and application. Other 2 are available once you opt for the paid version.

Basic firewall – This helps to set security level of the firewall. You can set it off, medium or high along a sliding scale. You need to set security high under public zone, i.e., internet. But you can opt for medium security when connected to private network or close end LAN, i.e., trusted zone.

Application control – Infected application compromises information within your system. You can control such applications with this feature. Set it to automatic. You can screen select applications from working too.

Simulação da participação de um Firewall entre...Image via Wikipedia

2. Internet
Zone alarm freeware provides you anti-phishing cover under Internet security. Paid version gives you 3 more crucial covers – Browser virtualization, anti-spam and parental control.

Phishing is a malpractice rampant in worldwide web to steal user identity and passwords. Anti-phishing feature counters this risk. Switch this feature on and opt for automatic update under general settings. There is an advanced setting of course but it won’t be wise to tweak it if you don’t have details on browser and OS. History shows you the record of countered risk.

Anschluss einer externen Firewall nebst Person...Image via Wikipedia

3. Identity & data
To secure your identity and data Zone alarm allows you identity protection and online backup. With paid version you also get DataLock hard drive encryption.

To use identity protection feature you have to register yourself - this won’t cost you – on Zone alarm website. Freeware firewall provides you 2 GB of space to backup your data. Once you are register on the official Zone alarm site, you have to sync your system with the server for backup process to start.

 
Things to remember
1. You have to update firewall regularly, at least once a week. Check top right hand of your Zone alarm window for update button. You will get another button – Tools.

2. Tools allow you game mode, preference and scheduled tasks. Firewall restricts data flow required in online gaming. Under game mode you can temporarily lower the security. Don’t forget to turn off the mode once you finished gaming.

3. Scheduled tasks allow you to set intervals for different types of system scans like, anti-virus quick scan, normal scan and deep scan.

4. You can tweak different backup settings and passwords in preferences.

Worldwide web is gold mine and minefield at the same time. You have to step carefully to keep sensitive information away from dirty hands. So better don’t wait till you are knee-deep in trouble. We know – prevention is better than cure.


About the author: Alia Haley is a blogger by profession. She loves writing on technology and luxury. Beside this she is fond of gadgets. These days she is researching about 3d phone. These days she is busy in witting an article on Bushnell Binoculars.


Enhanced by Zemanta

Here Are Some of My Most Popular Posts Since Day One.

If you like my blog Please Subscribes to my RSS Feed for updates and more

Rydertech

↑ Grab this Headline Animator


Subscribe via email

Enter your email address:

Delivered by FeedBurner
Your Email Will never be shared or Made Public

Related Posts Plugin for WordPress, Blogger...