How Firewalls Work
At their most basic, firewalls work like a filter between your computer/network and the Internet. You can program what you want to get out and what you want to get in. Everything else is not allowed. There are several different methods firewalls use to filter out information, and some are used in combination. These methods work at different layers of a network, which determines how specific the filtering options can be.
Firewalls can be used in a number of ways to add security to your home or business. Large corporations often have very complex firewalls in place to protect their extensive networks. On the outbound side, firewalls can be configured to prevent employees from sending certain types of emails or transmitting sensitive data outside of the network. On the inbound side, firewalls can be programmed to prevent access to certain websites (like social networking sites). Additionally, firewalls can prevent outside computers from accessing computers inside the network. A company might choose to designate a single computer on the network for file sharing and all other computers could be restricted. There is no limit to the variety of configurations that are possible when using firewalls. Extensive configurations typically need to be handle and maintained by highly trained IT specialists, however.
For home use, firewalls work much more simply. The main goal of a personal firewall is to protect your personal computer and private network from malicious mischief. malware, malicious software, is the primary threat to your home computer. Viruses are often the first type of malware that comes to mind. A virus can be transmitted to your computer through email or over the Internet and can quickly cause a lot of damage to your files. Other malware includes trojan horse programs and spyware. These programs are usually designed to acquire your personal information for the purposes of identity theft of some kind. There are two ways a firewall can prevent this from happening. It can allow all traffic to pass through except data that meets a predetermined set of criteria, or it can prohibit all traffic unless it meets a predetermined set of criteria.
Comodo Firewall Pro uses the latter way to prevent malware from installing on your computer. This free software Firewall, from a leading global security solutions provider and certification authority, use the patent pending “Clean PC Mode” to prohibit any applications from being installed on your computer unless it meets one of two criteria. Those criteria are a) the user gives permission for the installation and b) the application is on an extensive list of approved applications provided by Comodo. With this feature, you don’t have to worry about unauthorized programs installing on your computer without your knowledge.
Comodo Firewall Pro is rated as Top Firewall recommended for both beginners and advanced users. It has a number of unique features including “Defense +,” an advanced host Intrusion Prevention system (HIPS), which prevents changes to critical system resources. This software is highly customizable, so that you can adjust it to suit your specific needs.
Article Directory: http://www.articledashboard.com
Vijayanand working as a online marketing co-ordinator in ID Theft team in Comodo, a leading internet security provider, offers a real time Identity Theft Prevention and Identity Fraud restoration services among others.
Please Rate this Article
Click the XML Icon Above to Receive Security Articles Via RSS!
Additional Articles From – Home | Internet Business | Security
* Start up guide to become an Information security consultant – By : Nirmalya Jain
* Why Would Someone Steal Another’s Identity? – By : Fred Jones
* The Problem of Identity Theft – By : Fred Jones
* Microsoft and US Law against internet pop up scams (Part 1) – By : Jennifer Quirk
* Associate Degree in Security Management – By : Abby Reid
* Helpful Tips for Fire Safety – By : Franchis
* Fire Marshals for Your Safety – By : Franchis
* Fire Extinguishers and Small Fire Mishap – By : Franchis
* Fire Safety Equipments For Emergency – By : Franchis
* Internet Security Appliance – By : Harish Chib