Okkoma Dewal Tricks

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 15 May 2012

How Firewalls Work

Posted on 12:00 by Unknown
Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network.


Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network.

How Firewalls Work


Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator. Most personal firewalls such as Windows firewall operate on a set of pre-configured rules that are most suitable under normal circumstances so that the user need not worry much about configuring the firewall.

Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers.  However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers. In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks. Thus in addition to security, a firewall can give the company a tremendous control over how people use the network.


Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:

1. Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.

2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.

Firewall Configuration
 


Firewalls can be configured by adding one or more filters based on several conditions as mentioned below:

1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set  filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.

2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.

3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.

4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.


Why Firewall?



Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more. The effectiveness of the security depends on the way you configure the firewall and how you set up the filter rules. However major threats such as DOS and DDOS attacks may sometimes manage to bypass the firewalls and do the damage to the server. Even though firewall is not a complete answer to online threats, it can most effectively handle the attacks and provide security to the computer up to the maximum possible extent.


Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Computer Tricks, Internet Tricks | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Dead Space 3 Review
    Details About This Game :     Game : Dead Space 3     Platforms : PC, PS3, 360     Genre : Action     Publisher : Electronic Arts     Devel...
  • How To Make An Easy Clickable Link
    In this post i will show you how to make a text link or hyperlink. Making the link is very simple. This is how you would create a link direc...
  • Download Boot Camp Drivers Fot Windows 8
    Four months after the release of Windows 8, Apple has finally updated Boot Camp Assistant to add support for Windows 8. Yes, Boot Camp 5.0...
  • Avoiding Some Basic Problems during a Conference Call
    There is no hard and fast rule, when it comes to the usage of conference calls. Generally, there can be varied reasons for using conference ...
  • Acer Iconia Tab A700
    With the A700, Acer essentially took its Iconia Tab A510, slapped in a 1,920x1,200-pixel resolution screen and gave it a new name. Unfortuna...
  • Microsoft Genuine Licence Keys Part 02
    Microsoft Office 2000 Small Business Edition: CGGYH-6GF4P-J82Y8-CRXQ6-JKYHX B8F8H-9D2RY-WTRB7-VG7MW-95QM6 GFYPB-J6T84-VR7VJ-PZHPP-8PDMT TW2R...
  • Download UC BrowserHD For Windows 8
    Regardless of the editions of Windows 8, Internet Explorer is available in two versions: Internet Explorer for desktop and Internet Explor...
  • How To Import Photos From iPhone To Windows 8
    Apple iPhone is still one of the best smartphones out there and selling pretty well in spite of stiff competition from the beautiful Nokia...
  • Supertrailer - This week's best videos recut into one energizing video
    http://www.gamesradar.com/supertrailer-weeks-best-videos-recut-one-energizing-video/ Song: Playing with Danger (from Team Fortress 2) remix ...
  • Supertrailer - The best trailers of the week remixed into to make one dramatic montage
    Music is from the Rome 2 Total War trailer While most of us over here were thinking about lighting and/or watching fireworks on Wednesday fo...

Categories

  • 11inch
  • 19201200
  • 19Pin
  • 3615QM
  • 40L5200U
  • 44999
  • 64bit
  • 700Z7CH
  • about
  • Absolution
  • action
  • Activision
  • Adult
  • again
  • AirCurve
  • Alleged
  • almost
  • already
  • alternative
  • amazing
  • America
  • analyst
  • Android
  • Android Tricks
  • announced
  • announcement
  • Anticipated
  • Apple
  • Apple Tricks
  • Apples
  • arrives
  • Assassins
  • assembled
  • Avail
  • available
  • AW100
  • backers
  • backplate
  • Battery
  • being
  • Bentley
  • beyond
  • Black
  • Blizzard
  • Blogger
  • Blogger Gadget
  • Blogger Tricks
  • Bluetooth
  • brilliance
  • Buffalo
  • business
  • Business
  • camera
  • Camera
  • Canon
  • Canons
  • Carrier
  • cellular
  • Cellular
  • Challenge
  • Chicken
  • Chrono
  • Cisco
  • Close
  • Cloud
  • collaboration
  • com
  • combined
  • Comics
  • coming
  • Command
  • Computer Tricks
  • Concept
  • Concepts
  • Confirmed
  • Connect
  • Connector
  • Continental
  • Conundrum
  • Coolpix
  • Creed
  • Dawnguard
  • defeat
  • details
  • Diablo
  • doesnt
  • Double
  • dramatic
  • Droid
  • durable
  • E-Money
  • EA4500
  • Edition
  • energizing
  • EOS1D
  • Episode
  • Essentials
  • expansions
  • Facebook Tricks
  • Fantasy
  • Featured
  • features
  • Ferrari
  • figure
  • Final
  • first
  • footage
  • forget
  • Fourth
  • Freeform
  • Freeman
  • front
  • Gadgets News
  • Galaxy
  • Game News
  • gameplay
  • games
  • Gamesplanet
  • GamesRadars
  • GConnect
  • Google
  • Gordon
  • Grand
  • GreatCall
  • Griffin
  • GTechnology
  • Guardians
  • Guild
  • Hacking Tricks
  • HalfLife
  • HDPATU3
  • HE400
  • Headphones
  • HiFiMan
  • Hitman
  • holder
  • horrifying
  • Iconia
  • IdeaPad
  • Incredible
  • ingame
  • Innergie
  • Inspiration
  • Internet Tricks
  • iPhone
  • iSung
  • itself
  • Jelly
  • Jitterbug
  • Justice
  • Kickstarter
  • Killer
  • killing
  • launch
  • launches
  • leaked
  • Lenovo
  • Lexus
  • lifted
  • Limbo
  • Limited
  • Linksys
  • loads
  • Local
  • MacBook
  • Machines
  • Make Money
  • Marvel
  • Mazda
  • Micro
  • Microsofts
  • MiddleEarth
  • might
  • MiniStation
  • Mission
  • mobile
  • Mobile Tricks
  • Monster
  • montage
  • Mount
  • MS Office
  • News
  • Nexus
  • Nikon
  • North
  • October
  • offers
  • Online
  • Optimus
  • Other
  • Other Tricks
  • partially
  • parts
  • Payne
  • phone
  • phones
  • physics
  • planned
  • player
  • PlayStation
  • PocketCell
  • potential
  • power
  • Premium
  • Professional
  • Quantum
  • Quarters
  • Raider
  • ready
  • really
  • Rechargeable
  • recut
  • register
  • release
  • released
  • remixed
  • Remote
  • Resident
  • resolution
  • restrictions
  • revealed
  • review
  • Robot
  • roundup
  • Router
  • running
  • sample
  • Samsung
  • Sauron
  • season
  • September
  • sequel
  • Series
  • shows
  • Shure
  • silver
  • Skyrims
  • Smart
  • smashing
  • Sniper
  • sniping
  • Software Tricks
  • Something
  • Sonos
  • Special
  • sports
  • SRH1440
  • stirs
  • Studios
  • stuff
  • subway
  • Summer
  • Supertrailer
  • Tablet
  • Tacoma
  • teased
  • Technology
  • Tegra
  • Telltale
  • Theres
  • thickness
  • things
  • Thirds
  • Thunderbolt
  • today
  • Toshiba
  • Total
  • Touring
  • Toyota
  • trailer
  • trailers
  • Tricks
  • turning
  • unlocked
  • Unofficial
  • Unveiled
  • Valve
  • Verizon
  • video
  • videos
  • Virus Tricks
  • Walking
  • weeks
  • Which
  • Window
  • Windows
  • Windows 7
  • Windows 8
  • Windows Vista
  • Windows XP
  • winners
  • Wireless
  • zombie

Blog Archive

  • ►  2013 (6)
    • ►  April (6)
  • ▼  2012 (209)
    • ►  July (78)
    • ►  June (17)
    • ▼  May (89)
      • MS DOS Font Color Change
      • Installing The Windows 8 Consumer Preview Step By ...
      • How touch-sensitive devices work?
      • How hard disc works?
      • How to Remove Your Facebook Account Permanently
      • HOW TO KNOW THE DATE & TIME OF INSTALLATION OF YOU...
      • Speaking Notepad - Review
      • Upside Down Facebook Status Update
      • How To Protect Your Word Files With Password
      • How To Repair Task Manager Disabled Problem
      • How To Remove Autorun.inf Virus Using Command Prompt
      • How To Delete khatra.exe , Xplorer.exe or gHost.ex...
      • windows xp admin password hacking through Guest Ac...
      • How to Use CCleaner (Full Guide)
      • How To Create a CD autorun file
      • New KM Player Free Download
      • Burn a CD on Windows XP without using software
      • How To reduce Google Chrome Memory Usage
      • Internet Connection Sharing on Windows XP
      • Simplest & Best Way to Fix PC Errors
      • How to block and unblock internet sites....!
      • Windows Best Command Prompt Tricks & Hacks
      • Add The Administrative Tools Icon To The Desktop
      • Disable Windows Messenger At Windows Start-Up
      • How to Restart Windows without Restarting your PC
      • How to use your Pen Drive as RAM
      • Rip DVDs with VLC Media Player
      • Get multiple desktops Free software
      • How to Repair, Fix & Format USB Drives
      • Turn Your PC to Karaoke Player with Windows Karaoke
      • Shutdown Your Computer or a Remote Computer via Co...
      • How to increase Virtual Memory from 1-2 GB
      • How to Hack Windows Administrator Password
      • How Firewalls Work
      • HOW TO UPDATE BLANK STATUS ON FACEBOOK TRICK
      • How to copy files in write protected MMC or any re...
      • Keyboard Tricks That Few People Know About
      • How to download all files of a Website
      • Keyloggers
      • How to Trace Any IP Address
      • CREATE BOOTABLE USB PEN DRIVE
      • Steal Data from Computer to a USB or Pendrive
      • How to identify RAM stick just by looking them
      • HOW TO ACCESS WIKIPEDIA OFFLINE
      • SEND PROFILE PIC DURING CHATTING
      • WINDOWS 8 CONSUMER PREVIEW DIRECT DOWNLOAD LINKS W...
      • WINDOWS 7 USEFUL TOOL FOR USERS [Snipping Tool]
      • CHANGE YOUR COMPUTER PROCESSOR NAME PERMANENTLY
      • VIRUS TO FORMAT ENTIRE HARD DISK
      • HOW TO ENABLE 'GOD-MODE' IN WINDOWS 7
      • How do we create animated GIFs on android?
      • How to use VMware tools to Install Windows 8 on VM...
      • Write Protect Your USB Flash Drive
      • Trick to Display Windows Version on Desktop
      • Use VLC as a Video Cutter
      • How to add Hotmail and Live Email Accounts to Outl...
      • Windows 7 Tips, Tricks and Secrets
      • Add / Import Facebook Contacts to Gtalk Using Yaho...
      • How do you block websites in Windows for a specifi...
      • Add / Import Outlook Contacts to Skype Contacts
      • Error message on startup “Windows\System32\config\...
      • Make Free Calls on iPhone using WiFi 3G or MiFi
      • Use Facebook Chat Contacts with Yahoo Messenger
      • Add Mac-Like Dock To Windows 7 Taskbar-StandaloneS...
      • How to Convert a Power Point 2010 Presentation to ...
      • Facebook Photos Slideshow Generator : FB Widget
      • Get SMS Tones and Ringtones to iPhone without iTunes
      • Backup Facebook photos, videos, and text
      • Connect xBox 360 Live through Laptop or PC
      • Siri installation on iPhone 4 and iPod Touch
      • How to install windows 7 from USB drive
      • Facebook keyboard shortcuts
      • SIRI app for iPhone 4? Yes, It Works.
      • How To Remove Facebook Timeline And Get Back To Ol...
      • Windows 8 : Metro interface
      • Windows 8: Getting started, ARM and x86
      • Easiest Way Of Genuine Your Windows- 100% Works [G...
      • Some Important Tips to Setup a New Windows
      • How to hide a Hard disk Drive or partition in wind...
      • Microsoft Genuine Licence Keys Part 02
      • Microsoft Genuine Licence Keys Part 01
      • Make your Computer Welcome You
      • Make Folders With No Name
      • Windows 7 keyboard Shortcuts
      • Hidden Emoticons (Emotions) or Smileys in Yahoo! M...
      • The Simplest Way To Genuine Your WinXP
      • How To Rip DVD With SimpleDivx Tutorial
      • 14000 Serial Numbers
      • Folder Lock without any Software
    • ►  April (25)
Powered by Blogger.

About Me

Unknown
View my complete profile