This book discusses many of the security tools you can use to defend your computer against digital threats. An antivirus program and anti-spyware programs are critical; however, the third key tool in your defenses should be a firewall, which can be used to keep out intruders and traveling viruses (called worms). A firewall is an electronic wall used to keep out an intruder or unwanted communication. It sits between your computer and the Internet.
A firewall is an electronic barrier between your computer or your home network and the Internet.

In construction, a firewall is a physical wall that is designed to stop the spread of fire from one part of a building to another. Firewalls are also used in vehicles to separate the engine compartment from the passenger compartment. In the case of a network, a firewall stops unauthorized communication from the public Internet to a computer.

Think of a firewall as a big wall with lots of doors in it. These doors are called ports. When you use your web browser to access a website such as Google.com, you open a port (an electronic door) from inside the firewall and make contact with a server (a computer that sends information on request).

Let’s say the server belongs to Google. Now that you have made contact with Google, it is allowed to communicate back to you. So data flows two ways through the port because you have initiated contact first and the firewall knows this.

There are potentially thousands of ports on a firewall. For example, email goes through port 25. Web browsers use port 80, and MSN Messenger uses ports 1863, 6891-6900, and 6901.

You don’t have to know what ports are used. Programs on your computer figure that out for you. Some programs, such as file-sharing applications, however, need ports to be specially configured to work.

Crackers use port-scanning software to look for holes in a firewall. These scanners yell out to your firewall on various ports, “Yo dude, are you there?” Your computer would normally respond, “Yep, I am here. Ready to yak.” The port scanner then knows that there’s an opportunity to exploit a security hole and crawl through that door.

There are two basic types of firewalls at your disposal:

* Software firewall—Windows XP comes with its own built-in firewall, but you can also install a third-party software firewall with better features.
* Hardware firewall—These firewalls are physical devices. For home users, their home network router has a firewall function, but advanced hardware firewalls are built for businesses.

Explore More

Distributed Denial of Service (DDoS) Attacks

Demystifying Denial-Of-Service attacks, part one By Abhishek Singh, CISSP This paper provides an introduction to Denial of Service (DoS) attacks, their methodologies, common prevention techniques, and how they differ from

Critical XSS Vulnerability in Ministry of Transport http://www.mot.gov.mm/

PlanetCreator has reported another Critical XSS Vulnerability in Ministry of Transport http://www.mot.gov.mm/ Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious

Critical SQL Injection in Myanmar Teleport – Myanmar Internet Service Provider (formerly known as BaganNet)

PlanetCreator has reported another critical SQL Injection (vulnerability) on Myanmar Teleport – Myanmar Internet Service Provider (formerly known as BaganNet) http://www.myantel.net.mm/ SQL injection is a code injection technique that exploits