25.2.10

Using the internet without fear of trojans, malware, spyware, keylogger with Comodo Firewall + AntiVirus ...

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria.

Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

There are several types of firewall techniques:

Packet filter: Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules. Although difficult to configure, it is fairly effective and mostly transparent to its users. It is susceptible to IP spoofing.

Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.

Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.

Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

A firewall is a dedicated appliance, or software running on a computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.

It is a software or hardware that is normally placed between a protected network and an unprotected network and acts like a gate to protect assets to ensure that nothing private goes out and nothing malicious comes in.

A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ).

A firewall's function within a network is similar to physical firewalls with fire doors in building construction. In the former case, it is used to prevent network intrusion to the private network. In the latter case, it is intended to contain and delay structural fire from spreading to adjacent structures.

Comodo Firewall is one of the many software firewalls available, I myself use this software and the results are quite satisfactory, Comodo firewall to work pretty good although there are also shortcomings. Comodo Firewall has many advantages such as the display is user friendly, easy configuration, there are anti keyloger, parental control features, the automatic update feature, and most importantly this software for free. besides that, there are also disadvantages here are a few weaknesses of this software: Comodo Firewall takes a lot of memory usage, and quite disturbing defensenya notification if a new use of this software.

if you want try this software download here



Digg Google Bookmarks reddit Mixx StumbleUpon Technorati Yahoo! Buzz DesignFloat Delicious BlinkList Furl

4 komentar: on "Using the internet without fear of trojans, malware, spyware, keylogger with Comodo Firewall + AntiVirus ..."

Unknown said...

@nuansa pena - sama2!!

Unknown said...

salam sahabat this info make me know more thnxs n good luck ya

Unknown said...

@dhana - salam sahabat juga,n good luck too

Post a Comment