Skip to main content

What is firewall?

What is a Firewall?

what-is-firewall
A firewall is a tool that monitors communication to and from your computer. It sits between your computer and the rest of the network, and according to some criteria, it decides which communication to allow, and which communication to block. It may also use some other criteria to decide about which communication or communication request to report to you (either by adding the information to a log file that you may browse whenever you wish, or in an alert message on the screen), and what not to report.


What Is It Good For?

Identifying and blocking remote access Trojans. Perhaps the most common way to break into a home computer and gain control, is by using a remote access Trojan (RAT). (sometimes it is called "backdoor Trojan" or "backdoor program". Many people simply call it a "Trojan horse" although the term "Trojan horse" is much more generic). A Trojan horse, is a program that claims to do something really innocent, but in fact does something much less innocent. This goes to the days where the Greek soldiers succeeded to enter through the gates of Troy by building a big wooden horse, and giving it as a present to the king of Troy. The soldiers allowed the sculpture to enter through their gates, and then at night, when the soldiers were busy guarding against an outside attack, many Greek soldiers who were hiding inside the horse went out and attacked Troy from the inside. This story, which may or may not be true, is an example of something which looks like something innocent and is used for some less innocent purpose. The same thing happens in computers. You may sometimes get some program, via ICQ, or via Usenet, or via IRC, and believe this program to be something good, while in fact running it will do something less nice to your computer. Such programs are called Trojan horses. It is accepted to say that the difference between a Trojan horse and a virus, is that a virus has the ability to self-replicate and to distribute itself, while a Trojan horse lacks this ability. A special type of Trojan horses, is RATs (Remote Access Trojans, some say "remote admin Trojans"). These Trojans once executed in the victim's computer, start to listen to incoming communication from a remote matching program that the attacker uses. When they get instructions from the remote program, they act accordingly, and thus let the user of the remote program to execute commands on the victim's computer. To name a few famous RATs, the most common are Netbus, Back-Orifice, and SubSeven (which is also known as Backdoor-G). In order for the attacker to use this method, your computer must first be infected by a RAT.
Prevention of infections by RATs is no different than prevention of infection by viruses. Antivirus programs can identify and remove most of the more common RATs. Personal firewalls can identify and block remote communication efforts to the more common RATs and by thus blocking the attacker, and identifying the RAT.



Blocking Advertisements?

Some of the better personal firewalls can be set to block communication with specific sites. This can be used in order to prevent downloading of advertisements in web pages, and thus to accelerate the download process of the web sites. This is not a very common use of a personal firewall, though. 


Hiding Your Computer on the Internet? 

Without a firewall, on a typical computer, even if well maintained, a remote person will still be able to know that the communication effort has reached some computer, and perhaps some information about the operating system on that computer. If that computer is handled well, the remote user will not be able to get much more information from your computer, but might still be able to identify also who your ISP is, and might decide to invest further time in cracking into your computer. 
With a firewall, you can set the firewall so that any communication effort from remote users (in the better firewalls you may define an exception list) will not be responded at all. This way the remote user will not be able to even know that it reached a live computer. This might discourage the remote attacker from investing further time in effort to crack into your computer. 

Comments

Popular posts from this blog

How to improove iphone battery life ?

Apple iPhone Battery: You may consider how this is possible if the battery truly contracted. Apple could be taking some masterful flexibility in its evaluations, yet what has likely happened is that the A9 chip and distinctive parts within the phone have ended up being more gainful, less wasteful, such that total power utilization of the phone is lower. From now on, Apple can convey the iPhone 6s with a more diminutive battery however continue offering the same power and battery bits of knowledge as the iPhone 6. Enhance Battery Life: Enhance iPhone battery life tips do you complete a strong and which don’t, you should from your penchants and slants subordinate. Not each tip is useful for everyone. Create iPhone battery life: To create iPhone battery life ignored these essential and effective tips: 1. WiFi and GPS, is one of the greatest imperativeness customers on the iPhone. So just on WiFi and GPS when required. This extras imperativeness and also entrancing for s...

How to remove shortcut virus

how to remove shortcut virus easily with few simple methods..  here we are descusing about shortcut virus which is very irritating for all of us. when you insert your pendrive or any portable storage device the files into the device becomes one shortcut which is called as shortcut virus here i will tell you how you can remove this virus form your computer easily.. #1 Remove virus from cmd here we will use command prompt to remove shortcut virus from your device easily..   1.insert your infected device into computer   2.DONOT open infected pendrive or device just insert it into the usb slot   3.open command prompt as administrator   4.input this code:        attrib -h -r -s /s /d D:\*.*   5.in this code replace latter D with your specific pendrive name or drive latter at last of the code line   and press enter and your shortcut virus will be removed but there will be sevral diffrent system files ...

Create One-Click Shutdown and Reboot Shortcuts

Create One-Click Shutdown and Reboot Shortcuts First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC. But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this: shutdown -r -t 01 -c "Rebooting your PC" Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message "Rebooting your PC." The shutdown command includes a variety of switches you can use to customize it. Table 1-3 lists all of them and describes their use. I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use: shutdown -s -t 03 -c ...