wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Firewall

profile
Akshay Goswami
Jul 08, 2022
0 Likes
1 Discussions
120 Reads

A firewall provides protection from external internet attackers by protecting your computer or network from malicious or unwanted network traffic. Firewalls can also prevent malicious software from accessing a computer or network over the Internet. Firewalls can be configured to block data from specific locations (i.e., computer network addresses), applications, or holes while allowing relevant and required data.
A firewalls filter network traffic within a private network. Analyzes which traffic should be allowed or restricted based on a set of rules. Think of a security program as a security guard on your computer's access point that only allows trusted sources, or IP addresses, to access your network.
Firewall only accepts incoming traffic prepared to receive. It distinguishes between good and bad traffic and allows or blocks certain data packets in pre-set security rules.
A firewall can be software or hardware. Software firewall programs are installed on each computer, and they control network traffic through applications and port numbers. Meanwhile, a hardware firewall is a device set up between a gateway and your network.
To improve our firewall security: Constantly update your firewalls as soon as possible, Use antivirus protection, Limit accessible ports and host.


Comments ()


Sign in

Read Next

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Security Issues and Countermeasures

Blog banner

Street foods

Blog banner

Trello ( management software)

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Virtual Memory

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Yahoo! mail

Blog banner

PHISHING

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

DISK SCHEDULING

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Data Analytics in Data Science

Blog banner

Predicting Student Performance with Data Science

Blog banner

Topic: Sessions in Operating system

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

IT Service as as Value Creation

Blog banner

File Systems in OS.

Blog banner

Importance of Education

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

BharatPe

Blog banner

Satellite Based Positioning

Blog banner

GIS REMOTE SENSING

Blog banner

Population

Blog banner

therapist blog

Blog banner

What is semaphore in operating system?

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

E-learning

Blog banner

Processes: Process Description and Control.

Blog banner

Types of Big Data

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Sagar Parikrama

Blog banner

What your Favorite colour says about You?

Blog banner

Cache memory

Blog banner