Home | JSP | EJB | JDBC | Java Servlets | WAP  | Free JSP Hosting  | Spring Framework | Web Services | BioInformatics | Java Server Faces | Jboss 3.0 tutorial | Hibernate 3.0 | XML

Tutorial Categories: Ajax | Articles | JSP | Bioinformatics | Database | Free Books | Hibernate | J2EE | J2ME | Java | JavaScript | JDBC | JMS | Linux | MS Technology | PHP | RMI | Web-Services | Servlets | Struts | UML

Features

Search Host

Monthly Fee($)
Disk Space (MB)
Register With us for Newsletter!
Visit Forum! Post Questions!
Jobs At RoseIndia.net!

Have tutorials?
Add your tutorial to our Java Resource and get tons of hits.

We offer free hosting for your tutorials. and exposure for thousands of readers. drop a mail
roseindia_net@yahoo.com
 
   

Tutorials

Java Server Pages

JAXB

Java Beans

JDBC

MySQL

Java Servlets

Struts

Bioinformatics

Java Code Examples

Interview Questions

 
Join For Newsletter

Powered by groups.yahoo.com
Visit Group! Post Questions!

    

Make payments with PayPal - it's fast, free and secure!

Web Promotion

Web Submission

Submit Sites

Manual Submission?

Web Promotion Guide

Hosting Companies

Web Hosting Guide

Linux

Beginner Guide to Linux Server

Frameworks

Persistence Framework

Web Frameworks

Free EAI Tools

Web Servers

Aspect Oriented Programming

Free Proxy Servers

Softwares

Adware & Spyware Remover

Burning Bridges is Bad, But Firewalls are Good

                           

Heather Wallace

When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker.

Dial-up may not have seemed like it could have held any advantages, but it actually did have one upside. It is much less prone to hacking. Every time you dialed-in your computer was assigned a new IP address. That unique IP address made you a moving target that was more difficult for hackers to hit.

With a high-speed connection you are assigned a static IP address it never changes. So, your computer went from being a moving target to staying still with a bulls-eye pasted on the side. That, coupled with the fact that with a high-speed connection your computer is always online, are ideal conditions for a potential hacker attack. That seemingly beneficial always-on connection gives hackers a 24/7 open invitation to try and hack your system. Once inside they can access personal or financial details, compromise your computers operating system, or unleash a virus, worm, or spyware.

Which Firewall is Right For You

Now that you know how vital a firewall is to the protection of your PC you have to decide which firewall is right for you. Software or hardware.

A software firewall is designed to monitor your computers activity at all times. Think of it as a bodyguard who wont let anyone into your computer if he doesnt like the look of them. With a software firewall you may to have to assist in protecting your system. The firewall might alert you to certain activity and ask you if you want to grant or deny permission. Its just like the bodyguard that was mentioned before. He needs the okay before telling someone to scram. After you give either the thumbs up or the thumbs down the firewall will take the appropriate action and remember your reply so that you wont be asked in the future.

If you feel comfortable installing and configuring hardware, then you might want to consider a hardware firewall in the form of a Cable/DSL router. The hardware firewall handles everything on its own without any input from you and you also wont have to read any reports or make any decisions. The firewall handles everything on its own. Installation, however, can be tricky, so this option is definitely more suited to the advanced computer user.

My Firewall is Installed. Now Im Safe, Right

With your new firewall in place you are probably thinking that your computer is impenetrable, right Well, maybe not. As important to the security of your system as a firewall is, some do have their limits. Most software firewalls wont scan your system for viruses that can harm your computer and there arent any hardware firewalls on the market that offer virus protection. That means that you are still vulnerable to attack.

The best line of defense against viruses that can harm your system is anti-virus protection.You can either buy a seperate anti-virus program or shop around for a software firewall with anti-virus protection built-in. You may never be able to make your computer 100% hacker-proof, but the installation of a firewall coupled with anti-virus protection will greatly reduce your chances of becoming a hackers next victim.

About The Author

Heather Wallace is a writer whose work has been published in national, regional, and online publications. Additionally, she has written articles as a newspaper correspondent. Visit http://www.fetchingsites.com/FreeFirewall.html to download a free firewall that is easy-to-use and will block hackers and other unknown threats. 

                           

Ask programming questions?

 

 

Add This Tutorial To:
  Del.icio.us   Digg   Google   Spurl   Blink   Furl   Simpy   Y! MyWeb 

Current Comments

1 comments so far (post your own) View All Comments Latest 10 Comments:

Heather doesn't mention that if you're a heavy P2P user, then a software firewall probably isn't a good idea. Many if not most of these, deliberately or otherwise, interfere with such programs, making them pretty much unusable. There is usually no sign of what is causing the problem, it just doesn't work.

If you have any sort of broadband connection (DSL, Cable, etc.) then your modem contains a router which also incorporates at the least a NAT firewall and quite possibly a SPF (Stateful Packet Inspection) firewall as well. This will protect you from real-time threats from outside at least as well and probably better than any software firewall. You should verify in the documentation that came with your modem that it actually does have this feature, then verify that it is actually turned on. If it has and it is, you don't need any other kind of firewall.

Hard to believe Heather writes articles professionally, as she can't spell "separate" and doesn't seem to know what the apostrophe key is for.

-freddy

Posted by freddyzdead on Wednesday, 01.10.07 @ 08:38am | #3091

Useful Links
  JDO Tutorials
  EAI Articles
  Struts Tutorials
  Java Tutorials
  Java Certification

Tell A Friend
Your Friend Name
Search Tutorials

 

 
 
Browse all Java Tutorials
Java JSP Struts Servlets Hibernate XML
Ajax JDBC EJB MySQL JavaScript JSF
Maven2 Tutorial JEE5 Tutorial Java Threading Tutorial Photoshop Tutorials Linux Technology
Technology Revolutions Eclipse Spring Tutorial Bioinformatics Tutorials Tools SQL
 

Home | JSP | EJB | JDBC | Java Servlets | WAP  | Free JSP Hosting  | Search Engine | News Archive | Jboss 3.0 tutorial | Free Linux CD's | Forum | Blogs

About Us | Advertising On RoseIndia.net

Send your comments, Suggestions or Queries regarding this site at roseindia_net@yahoo.com.

Copyright 2007. All rights reserved.

          [an error occurred while processing this directive]