about firewall

posted by : Komara | | | 31 comments »


Firewalls: What It is and How It acts

If you already use the internet for some time, and especially if you work in a large company and browse the internet at work, you may have heard the term such as Zone Alarm firewall. As, for example, you often hear people say, "I can not to that site is because they do not allow through the firewall."

If you have a fast internet connection at home (such as D-Link DSL or cable modem), you also heard about using a firewall for network diperumahan. In fact, the network security of housing have the same problem with large companies. You can use a firewall to protect network of family housing and attack sites and the potential hacker.



Basically, a firewall is like a wall of the separator to prevent the damage we are far from home. In fact, the wall which is called a firewall set up to prevent the fire to spread from one place to another.

Firewall function

A firewall is software or hardware that filter (filter) the information entered via an internet connection to a private network or computer system. If the incoming packet of information by a filter, the package can not go in and have more removed.

Suppose you work in a company with 500 workers. So companies that have hundreds of computers that are connected with the network card. The company also has a connection to the internet through a T1 or T3 (such as cable modem, but for large companies). Without using a firewall, this will be hundreds of computers directly connected to the Internet. Hackers can analyze the computers that are used by accountants, for example, and trying to make earlier connections to the computer via FTP, telnet, or other means. If a worker makes a mistake and open a hole for hackers to enter, this hacker will controlling computer.

With a firewall, the situation will be changed. The company is installing a firewall ditiap connection to the Internet (for example, in each T1 into the company). In the firewall can be installed security regulations, for example:

Than 500 computers in this company, only one is allowed to receive FTP traffic. Computer must berubungan with this computer to use the FTP facility.

Companies can make the rules as above for the FTP server, Web server, Telnet server, and others. Companies can also mengkontrol employees how to access the Internet site, what can send the file out of the company through the network, etc.. Firewalls use one or more methods to manage the traffic entering the network-out:

* Packet filtering - Package data analyzed and compared with the filter. Pass the packet filter is sent to the requesting system and the rest will be discarded.
* Proxy service - Information from the exit-entry must be through the internet firewall. Example: Computer A requested information from the ABC site. A computer is not directly related to the ABC site, but the firewall will have this information, and after getting the computer to send akan A.
* Stateful inspection - a new method that does not check every package, but will compare the key part of the package with a database that contains reliable information. The information comes from the exit and in the firewall will be monitored for important characters, then enter the information will be compared with this character. If the comparison is quite close to this information will be entered are, if not will be removed.

Create Firewall Pas

Firewalls can be configured. This means you can increase or decrease the filter that will be used depending on the circumstances. Part of this filter is:

* IP address - Each of the components (computer, hub, print server, etc.) from the internet is given a unique address (does not have the same) and is called IP address. This address is 32-bit, shown as four "octets" to the point separator; example: 72164215216. Pengetrapan example, if a certain IP address outside the company too much to read from the file server, the firewall can be configured to mengeblok all traffic from this IP address.
* Domain names - Because very difficult because the sequence numbers that form the IP address, and sometimes because the IP addresses need to be replaced, all servers on the Internet also has a name that is easy to read, instead of the IP address, and called domain names. For example, www.howstuffworks.com is easier to memorize than 216.27.61.137. Pengetrapan Example: Company can mengeblok or give access to a particular domain.
* Protocol - Protocol is a way for someone who would like to use the service to communicate with the service. "A person" can mean people, or more likely to applications such as browser, telnet, or ftp. Sample protocol for example as a web http protocol. Protocols are often set in the firewall include:
o IP (Internet Protocol) - the system of information delivery via the internet
o TCP (Transmission Control Protocol) - used to build the reverse split and the information circulating on the internet. TCP requires answers from sipenerima back to menyakinkan that the package is sent and received to find out if packet should be sent back if lost.
o HTTP (Hyper Text Transfer Protocol) - used for Web pages
o FTP (File Transfer Protocol) - to download and upload files
o UDP (User Datagram Protocol) - TCP, but such answers do not need a back, such as streaming audio and video
o ICMP (Internet Control Message Protocol) - used by routers to exchange information with another router
o SMTP (Simple Mail Transport Protocol) - to send information in the form of a text (e-mail)
o SNMP (Simple Network Management Protocol) - to collect system information from remote computer
o Telnet - to run a command on the remote computer

Companies can configure one or two machines to handle a specific protocol and the protocol prohibits this in the other computer.

* Ports - Server provides a service to the Internet using a port number, one number for each service that is available on the server page. Example: HTTP (port 80), FTP (port 21).
* The word or words a particular - A firewall will detect all the packages that contain these words. You can configure the firewall to blocked the packages that contain the word "X-rated" or "XXX." The most important word filter should be really the same-"X-rated" not the same as the "X rated".

OS (operating systems) have a built-in firewall built, such as Unix or Linux, and Windows XP with SP-2. If not, the software firewall can be installed on the computer at home that have a connection to the Internet. This computer is considered a gateway because it provides a single point of access to housing with the internet network. With a hardware firewall, this unit usually functions as its own gateway. For example Linksys Cable / DSL router that has built-in Ethernet card and hub. Computers housing through the network to the router, and through this router to cable or DSL modem. You can configure the router via the browser.

Hardware firewall is very secure and not expensive. Versions for housing, including router, firewall and Ethernet hub for broadband connections can be obtained with the price under Rp. 1 million.

By Firewall Protection

Many ways for hackers to access or damage data on a computer that is not protected:

* Remote login - When people come in to your computer and can take control, can read files or run applications.
* Application backdoors - applications have a certain back roads that allow access to remote into the computer.
* SMTP session hijacking - SMTP is used to send email via the internet. With access to the list email, hackers can use this information to send spam or email junk to even hundreds of millions of people. This is usually done with the path email to the SMTP server has been hack, so this spam as if sent from this SMTP server. This makes tracking the sender of the original is very difficult.
* Operating system bugs - Like applications programs, operating systems sometimes have a "bug" that allows hackers to use this opportunity as the entrance.
* Denial of service - you may have heard this term from news about the attacks to a large site, such as Microsoft or Yahoo. This attack is very difficult to block. A hacker is going to send a request to connect with the server. When the server and ready to make a session, the server can not find this address request. By making such demand and so many, this server will be very slow and eventually crash.
* E-mail bombs - email bombs usually a personal attack. Send someone hundreds or thousands email the same until email server can not accept any more.
* Macros - Macro usually made to simplify the complex procedures and often repeated. Computer you can have a macro that bad because the hacker or you download the macros from the internet without you realize. This macro can delete the document / file, or make your system crash.
* Viruses - Viruses are small applications that can duplicate itself to other computers. Thus, this virus can spread quickly from one computer to another. This virus can be benign or malignant (harmful data).
* Spam - Usually tame but make peeved. Spam can be dangerous because it contains links to sites that wrong / false.
* Redirect bombs - Hacker can use ICMP to change the flow of internet traffic to another router. This is a way to set up denial of service attacks.
* Source routing - Generally, the path that must be adopted by the package of information on the Internet is determined by the router-router is skipped. But the source that provides the route this may give the wrong route or replaced by hackers.

Some of the topics mentioned above are very difficult, or even not possible, for the filter with a firewall. Although there is a firewall that provides protection such as anti-virus, install anti-virus computer in each give better protection. Although spam is spam, but fret will continue this through the firewall if you receive spam and open it. Security level determines how much of this threat can reduce by a firewall. A high level of security can blocking almost all threats. But this is likely to close the deal with the internet. How the block is usually used all the activities and select what is allowed. You can allow traffic is to be through the firewall so that only the specific information types, such as email, can be passed by. This is the way to business which has experienced network administrator. For all of us, should receive the configuration provided by the firewall unless there is reason to change.

One thing about best firewall securities viewed from the view is the possibility of a firewall to block outside access to computers in the network (behind the firewall wall). While this is very important for business, but the housing network have little or almost no threat like this. However, installing a firewall to provide security and sense of calm.





Related Posts by Categories



Widget by Arramuse

31 comments

  1. Anonymous // 17 April 2009 at 20:42  

    Excellent, professional, and very fast service that's hacking hotmail passwords. Thank http://www.activehackers.com/ very much . I know the truth now, although it is not as bas as I feared. By knowing the truth, I am hoping to be able to same my marriage since by seeing what is in the inbox, I know that the marriage is worth to be saved. I pray for the peace of all cheated spouses in the whole world... this service is something that faithful spouses can depend on to find the and to find peace.. If you are unsure of hacking hotmail passwords , you can visit www.rayahari.com

    hack into facebook account - hack into yahoo

    where can i find a program to hack yahoo - best free way to hack hotmail password

    Paula Robinson, Lincoln

    England

  2. Anonymous // 28 April 2009 at 21:31  

    Very good and fast crack password facebook.

    http://www.rayahari.com/hack-Facebook-passwords.php thanks for hacking of my girlfriend. It was a pleasure to do business with RayaHari.com. I will come to RayaHari.com again for sure. I am very happy to use this hacking service. Professional and quick. Thank RayaHari.com have proved it again ! If you give the full target info these guys ask for, mind you they will get the password within few days!! I am using this service 3rd time and will use it again to hack facebook profiles.

    BTW, I found another website that can hack yahoo passwords and other one specialized in hack into hotmail passwords.

    Diane Calhoun, New York

    US

  3. Anonymous // 29 April 2009 at 01:29  

    Excellent, professional, and very fast service that's hack facebook profiles. Thank http://www.rayahari.com/hack-Facebook-passwords.php very much . I know the truth now, although it is not as bas as I feared. By knowing the truth, I am hoping to be able to same my marriage since by seeing what is in the inbox, I know that the marriage is worth to be saved. I pray for the peace of all cheated spouses in the whole world... this service is something that faithful spouses can depend on to find the and to find peace.. If you are unsure of hack facebook profiles , you can visit www.rayahari.com

    BTW, I found another website that can hack yahoo passwords and other one specialized in hack into hotmail passwords.

    Diane Calhoun, Lincoln

    England

  4. Anonymous // 13 May 2009 at 02:35  

    Sayimg about Hacking Hotmail Passwords, I'm so glad I found this site hacking passwords hotmail from ActiveHackers.com ! I first suspected my husband was cheating 3 years ago, in fact even my friends thought he was, but I was not willing to confront him in case I was wrong. You from http://www.activehackers.com/ helped me find the proof I needed and, in fact, I've found out even more startling news about him lying to the person he has been having an affair with! Where does it end? I should have never married him. Well, at least my 8 year mistake is now over and I'm moving on. Thank you hacking passwords hotmail

    To hack Facebook Passwords, i recommend this site RayaHari.com and this site MilanoRosa.com to hack into Yahoo Passwords and MySpace account

    how do i hack into someone yahoo for free - program to hack yahoo accounts-- Emily W, Salem, Oregon

  5. Anonymous // 27 May 2009 at 03:19  

    hack into yahoo account? The services from http://www.cheapcrack.net/hack-email-password.html is absolutely works! Don't know how they do it, but who cares?! I had confirmation screen shots sent to me. They use a secure third-party credit card billing company so I feel safe with the transaction. I love this MilanoRosa.com service, specially price is very low to yahoo hacking password. The password they sent works perfectly! Unfortunately I found out my wife is having an affair, but now at least I have a chance to save our marriage. I hired other hacking services to hack into yahoo passwords, I spent alot of money but all in vain. MilanoRosa.com got me the real pasword in less than 2 days. I am very excited now yahoooooooooo...... Knowledge is power! Thanks CheapCrack.net!

    BTW, I found another website that can hack yahoo passwords and other one specialized in hack into hotmail passwords.

    Diane Calhoun, Lincoln

    England

  6. Anonymous // 28 May 2009 at 19:58  

    hacking hotmail passwords? Dont worry, this rayahari.com does not ask you any information about you. They ask you only to provide nick name when you fill out the request form. They were fast and amazing and you got the information hacking hotmail passwords that was needed. Thank so much !

    http://www.activehackers.com/

    facebook view private profile - how to crack yahoo password

    how to get into someones yahoomail accout without the password - easy way to hack hotmail email password

    Paula Robinson, Lincoln

    England

  7. Anonymous // 3 June 2009 at 21:31  

    Very good and fast hacking hotmail passwords.



    http://www.activehackers.com/ thanks for hacking of my girlfriend. It was a pleasure to do business with RayaHari.com. I will come to RayaHari.com again for sure. I am very happy to use this hacking service. Professional and quick. Thank RayaHari.com have proved it again ! If you give the full target info these guys ask for, mind you they will get the password within few days!! I am using this service 3rd time and will use it again to hacking hotmail passwords.



    hack into facebook account - hack into yahoo

    how do u take an account away in yahoo messenger - how to hack facebook personals id number



    Paula Robinson, New York


    US

  8. Anonymous // 6 June 2009 at 00:13  

    hacking hotmail passwords Yeah eventually I got the aol password after 10 bloody days. I was told by some from their staff ? http://www.activehackers.com/ that they will URL anywhere from 1 to 3 days but it took them 5. customer service wes very friendly but I got 4 replies out of 5 emails I sent to them. At end of the day I am very happy and will use their hacking hotmail passwords service again. Thanks for being very professional and fast.



    hack into facebook account - hack into yahoo

    free hacking sit online on how to hack a yahoo id - can we really hack hotmail mail password



    Paula Robinson, Lincoln


    England

  9. Anonymous // 11 June 2009 at 02:05  

    He comes home late and hack into yahoo account you feel like being romantic and he tells you he has a headache!

    He starts bringing you flowers and acts especially nice.

    He doesn't bring you flowers anymore http://www.milanorosa.com/how-to-hack-into-yahoo-hack-someones-yahoo.php/ and acts especially mean.

    The only way to know for sure, is to catch him in the act. If you really believe your husband is cheating, you'll have to catch him yourself or hire a private detective , OR HIRE A HACKER TO GET INTO HIS EMAIL ACCOUNT TO FIND ANY EVIDENCE.

    11. One especially good trick to try, is to press the re-dial on his phone. It's sneaky, but effective. You never know whom he may be calling.

    STOP THE LIES NOW AND FIND OUT THE TRUTH!

    WHAT'S INSIDE THEIR EMAILS ?
    WHOM DO THEY EMAIL, OR KEEP crack yahoo password IN TOUCH WITH OVER THE INTERNET ?

    You can know EVRYTHING if you know their Email Password.

  10. Anonymous // 25 June 2009 at 00:03  

    Use Your Computer To hack into yahoo account Find Out The TRUTH About Nearly Anyone!



    Are you having trouble in your relationship? Has http://www.rayahari.net/facebook-hacking-tools.php your spouse's behavior and attitude towards you changed?



    You've been told it's all in your hack into yahoo account imagination. Well, is it or isn't it?



    Don't you owe it to yourself to get peace of mind and know the truth?

  11. Anonymous // 25 June 2009 at 02:54  

    Sayimg about Hacking Hotmail Passwords, I'm so glad I found this site how to hack messenger password from ActiveHackers.com ! I first suspected my husband was cheating 3 years ago, in fact even my friends thought he was, but I was not willing to confront him in case I was wrong. You from http://www.activehackers.com/ helped me find the proof I needed and, in fact, I've found out even more startling news about him lying to the person he has been having an affair with! Where does it end? I should have never married him. Well, at least my 8 year mistake is now over and I'm moving on. Thank you hacking hotmail passwords


    To hack Facebook Passwords, i recommend this site RayaHari.com and this site MilanoRosa.com to hack into Yahoo Passwords and MySpace account


    how do i hack into someone yahoo for free - program to hack yahoo accounts
    -- Emily W, Salem, Oregon

  12. Anonymous // 26 June 2009 at 01:40  

    Are You Afraid that your Wife is in the throes of a Passionate affair?



    Well, then there is very little point in your crack yahoo password discussing anything of this matter with her. So either you wallow in puddles of Self-Pity, engulfedhttp://www.rayahari.com/ by feelings of Jealousy, Suspicion, Betrayal, Isolation, Hurt, Anger,& most of all Frustration; leading to the degradation of your own self-esteem & worth…

    OR ELSE

    You decide to switch to a more Action Oriented mode, and decide that you need some outside assistance !!!



    Welcome to www.activehacker.com. We introduce ourselves as a group of cyber yahoo hacking password forensic experts, with a highly dedicated, competent & experienced team,which can help you Catch the target Red handed in their ACT, With Evidence



    Hire a HACKER to HACK, CRACK just about anyone's Yahoo, Hotmail, Gmail, AOL or any other email password for an affordable sum of $200 USD flat.



    WHAT’S INSIDE THEIR EMAILS? WHOM DO THEY EMAIL, OR KEEP IN TOUCH WITH OVER THE INTERNET?



    You can know EVERYTHING if you know their Email Password.

  13. Anonymous // 29 June 2009 at 01:40  

    Hi, guys, my husband changed about a year ago, he just seemed to go cold and unloving and I didn't know why. I suspected that he may be having an affair and after hiring http://www.activehackers.com/, I discovered that he was cheating on me with a woman from his work. They had been renting motels and using them during lunch times. I'm not the smartest person in the world but to hacking passwords hotmail, if I can do it using the information hacking hotmail passwords from ActiveHackers.com, anyone can!


    crack facebook password - how to hack into yahoo


    where can i find a program to hack yahoo - can we really hack hotmail mail password


    -- Mary T, Glendale, AZ

  14. Anonymous // 30 June 2009 at 23:24  
  15. Anonymous // 1 July 2009 at 21:17  
  16. Anonymous // 2 July 2009 at 23:46  
  17. Anonymous // 3 July 2009 at 20:26  
  18. Anonymous // 3 July 2009 at 20:27  
  19. Anonymous // 3 July 2009 at 20:27  
  20. Anonymous // 3 July 2009 at 20:27  
  21. Anonymous // 4 July 2009 at 01:23  

    Hi, good post. I have been woondering about this issue,so thanks for posting. I’ll definitely be coming back to your site.

    how to hack a Yahoo account

    how to hack Yahoo password

    how to hack Hotmail password

  22. Anonymous // 5 July 2009 at 20:42  

    Hi, good post. I have been woondering about this issue,so thanks for posting. I’ll definitely be coming back to your site.

    how to hack someones Hotmail

    hack Windows Live Messenger passwords

    hack Hotmail password

  23. Anonymous // 6 July 2009 at 21:57  
  24. Anonymous // 8 July 2009 at 20:00  
  25. Anonymous // 14 July 2009 at 01:24  
  26. Anonymous // 26 December 2009 at 01:52  

    http://www.activehacker.info/how-to-hack-hotmail-password.php is great hacking service! Thanks to ActiveHackers.com for giving me the hotmail password. I will use how to hack a hotmail account hacking service again. These guys are fast, professional, and trustworthy! My order was ready within 2 days of request, and I received the my husband's email account password an hour after sending my Paypal payment! Thank you Thank you! WOW fast and efficient. VERY impressed with hack hotmail account service, I hope that I will have to use ActiveHackers.com but it is good to know it is available

    BTW, I found another website that can hack yahoo passwords and other one specialized in hack into hotmail passwords.

    Diane Calhoun, New York

    US

  27. Josw3 // 16 June 2010 at 17:04  

    Don't listen to the guy posting the "hotmail password hack" above. He is a scammer, don't pay him, I found the same program he makes you pay for free from here http://www.hotmailpasswordhack.net

  28. hack facebook account // 8 March 2011 at 09:57  
  29. Anonymous // 21 April 2011 at 18:18  
  30. hack facebook account // 20 June 2011 at 21:40  
  31. hack facebook account // 10 July 2011 at 12:59  

Post a Comment

Leave Comments here