it's time to start learning to know about the world of computers and the internet
A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria.Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
There are several types of firewall techniques:
Packet filter: Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules. Although difficult to configure, it is fairly effective and mostly transparent to its users. It is susceptible to IP spoofing.
Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.
A firewall is a dedicated appliance, or software running on a computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.
It is a software or hardware that is normally placed between a protected network and an unprotected network and acts like a gate to protect assets to ensure that nothing private goes out and nothing malicious comes in.
A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ).
A firewall's function within a network is similar to physical firewalls with fire doors in building construction. In the former case, it is used to prevent network intrusion to the private network. In the latter case, it is intended to contain and delay structural fire from spreading to adjacent structures.
Comodo Firewall is one of the many software firewalls available, I myself use this software and the results are quite satisfactory, Comodo firewall to work pretty good although there are also shortcomings. Comodo Firewall has many advantages such as the display is user friendly, easy configuration, there are anti keyloger, parental control features, the automatic update feature, and most importantly this software for free. besides that, there are also disadvantages here are a few weaknesses of this software: Comodo Firewall takes a lot of memory usage, and quite disturbing defensenya notification if a new use of this software.
3DAnalyze is a powerful application that allows to play many DirectX based games using video hardware officially unsupported and theoretically unable to run these; in this guide I'will show you how to install and configure 3D-Analyze main settings, depending on the title you want to play.
First let me explain link among video cards generations and supported Microsoft DirectX versions. This point is crucial for us because changing DirectX versions also hardware compatibilty requests change.
DirectX 5.0 and 6.0 Compliant Cards
This category contains video cards made from 1995 to 1999. For example all 3dfx cards, most video cards from Intel, SiS and S3 Graphics.
DirectX 7.0 Compliant Cards
This category includes video cards made from 1999 to 2001. Main features of this generation are: hardware units for Transform and Lightning (T&L) computation, and Bump Mapping support. For example you can think to Radeon 7000, GeForce, GeForce 2, and GeForce 4 MX cards.
DirectX 8.0 Compliant Cards
This category contains graphics controllers made from 2001 to 2003: these have hardware support for pixel and vertex shader up to version 1.3. Ex. GeForce 3, and GeForce 4.
DirectX 8.1 Compliant Cards
This category includes some video cards, mainly by ATI, made from 2001 to 2003 and with hardware support for pixel and vertex shader up to version 1.4. For example Radeon 8500, Radeon 9000, Radeon 9150, Radeon 9250, and XGI volari v3 belong to this set.
DirectX 9 Compliant Cards
This category contains video cards made since 2003. Main features of this generation are: hardware units for pixel and vertex shader up to version 2.0. For example you can think to Radeon 9x00, Radeon Xx00, Radeon X1x00, GeForce 5x00, GeForce 6x00, GeForce 7x00, and XGI Volari V5/V8.
if you want to try using this software you can download it here
In the Internet world we certainly familiar with the web browser, there are so many kinds of web browsers available. One of the most popular is the mozilla firefox. We often feel we have a web browser using less than maximum performance, here I have a little knowledge to maximize the performance of mozilla firefox.
* Browser.history_expire_days_min change the value to 10 (default: 90)
* Browser.sessionhistory.max_total_viewers change the value to 1 (default: -1)
* Network.http.max-connections change the value to 100 (default: 30)
* Network.http.max-connections-per-server change the value to 20 (default: 15)
* Network.http.max-persistent-connections-per-server change the value to 8 (default: 6)
* Network.http.pipelining change it to true (default: false)
* Network.http.proxy.pipelining change * to true (default: false)
* Network.http.pipelining.maxrequests change it to 8 (default: 4)
* Network.http.request.max-start-delay change it to 0 (default: 10)
* network.prefetch-next ganti menjadi false (default: true)
2. Text should be in a state of Horizontal, turn off Word Wrap on the system you NotepadX5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
EICAR, the European Institute for Computer Antivirus Research, was founded in 1991 as an organization aiming to further antivirus research and improving development of antivirus software. Recently, EICAR has furthered its scope to include the research of malicious software (malware) other than computer viruses and extended work on other information security topics like content security, Wireless LAN security, RFID and information security awareness.