Monday, September 6, 2010

Is a firewall absolutely necessary?

Is a firewall absolutely necessary?

Question:

Hi, I'm really new to computers and the Internet. I keep hearing people say I should use a firewall on my computer to prevent Web nasties, but I'm confused as to what a firewall is and if it's absolutely necessary. If you say I need one, which one would you recommend? I want one that I can use and easily understand without pulling out what's left of my hair. Understanding my antivirus app was difficult enough, but I'm always willing to learn new things given a chance. Any advice to a grandpa who's just starting to explore the computer world is sincerely appreciated.

Submitted by: Stanley M.


Answer:

Stanley, a firewall acts as a gatekeeper between your computer and all the other machines that make up the Internet. Why do we need such a gatekeeper? It's because the nature of communication across computer networks allows for a loophole that can be exploited by malicious hackers. I'll use a telephone analogy to make the aforementioned points clearer, then make a recommendation...

If you call your telephone service provider, you will inevitably be greeted by an automated voice and a menu of options, and your call will be forwarded to the appropriate extension line based on selections you make. But imagine if that customer service number was a single, direct line to a single representative instead of to any number of extension lines connecting you with different departments and many employees. Disparate calls to report problems, pay bills, upgrade and downgrade services, and general inquiries would all go to the exact same phone line, so that thousands of customers would be simultaneously competing to get through at any given time. Such heavy traffic would not only tax the phone line and the employee at the end of the line, it would eventually overload the circuit to the point that it might cease to work altogether. Not exactly a model of efficiency, and the reason multiple lines and extensions, and even those dastardly automated menus, exist.

Communication across a computer network works in a similar fashion. Your computer is identified by an unique number - known as its Internet Protocol (IP) number or address - that allows it to transfer information across the Internet. Think of the IP number as your computer's telephone number. But as we just saw in the example above, if every instance of communication involved a single "line," competition among different processes or programs would slow things to a crawl, and essential processes like your antivirus updater might never get through!

To avoid this nightmarish logjam, computers use what are known as Internet ports. These ports are not physical entities like those used to connect hardware such as your mouse or a scanner, but rather "numerical addresses" that act like multiple lines or extensions necessary to keep things running in an orderly fashion. When a remote computer "dials" your IP number, it also specifies a port. This is like dialing a known party's extension at the main automated menu. To keep your system running smoothly, different processes in your computer listen for "calls" coming through specific "extensions lines" or ports. When a call comes through the appropriate port, your computer responds by providing whatever information is being requested, usually in the background, without your knowledge. And therein lies the importance of having a firewall.

A port is considered to be "open" when it can be detected by remote computers, which then are able to exchange information with your computer. While many ports must remain open to permit legitimate processes to access the Internet, most don't, and their exposure merely provides an invitation for trouble. Hackers can easily scan for available open ports, and when a computer answers, they have found a machine they might be able to break into. They can request all sorts of sensitive information, and your computer will gladly send it over.

A firewall "closes" ports by preventing unauthorized "calls" from getting through. Because your computer doesn't answer, a hacker will assume no computer exists at the particular IP address, and move on. A good firewall practically makes your computer invisible to hackers, while allowing for legitimate programs to access the ports needed for flawless performance.

By now you might be thinking "But there's nothing worth stealing in my computer!" Perhaps, but a hacker might break into a computer with intentions other than to steal sensitive files like financial information or Social Security numbers. (And don't fool yourself, your computer might already have far more personal information than you might suspect!) Malicious hackers can act as vandals and delete information from your hard drive and corrupt system files, essentially rendering your computer useless. They can also remotely control your computer, turning it into a zombie machine used to send viruses or spam, or even launch denial of services attacks to companies like Microsoft, Google, CNET, and Amazon.com - severely slowing down Internet traffic. So, you see, an unprotected computer represents a potential risk to all of us!

Fortunately, a firewall can prevent these and other headaches. The choice between installing one, and trying to explain to the FBI why your computer is disseminating child pornography over the Internet, is no choice at all.

Firewalls come in two flavors, so to speak: Hardware varieties, which are installed between your computer and your Internet gateway, and software firewalls. Hardware firewalls monitor access to your computer, but do not prevent programs already in it from accessing the Internet. In contrast, software firewalls monitor both incoming and outgoing traffic. Thus, if you accidentally download adware or a Trojan, your software firewall would keep these programs from "calling home" and carrying out many of their devilish tasks. Keep in mind, a firewall by itself won't protect you from all "web nasties." While a vital component of PC security, a firewall needs to be complemented with antivirus and antispyware software.

While it would be ideal to have both a hardware and a software firewall protecting your computer - you'd be having an extra line of defense - a quality software firewall is arguably more than enough for most of us. If you are running Windows XP, you already have a basic firewall installed in your computer. If you installed Service Pack 2, this Windows Firewall was turned on by default, and should be protecting your computer right now, unless you opted to disable it. The Windows Firewall acts like a hardware firewall, that is, it controls inbound traffic but not outgoing communications. Thus, you are better off upgrading to a better firewall, one that monitors both incoming and outgoing traffic.

Fortunately, there is an outstanding software firewall that happens to be extremely simple to install, configure and run - ZoneAlarm. Best of all, the personal version of ZoneAlarm is free! I encourage you to visit the Zone Labs website (http://www.zonealarm.com/) and download a copy. A ZoneAlarm User's Manual is also available for download in the website's Support section.

After you install and configure it - a process that is very quick and user-friendly - please go to the excellent Shields Up! website (https://www.grc.com/x/ne.dll?bh0bkyd2) to test the newly-installed firewall. This website features very clear and thorough information on how firewalls works, why they are necessary, which ones are worth getting, etc., so you might want to bookmark it and explore it at your leisure. (It is also a good idea to go back and retest your firewall from time to time, especially after software upgrades.)
After you install ZoneAlarm, you will have access to all of the features of the premium version for 30 days, including technical support. Take advantage of this trial period to determine whether the extra features might be worthwhile for you, and to have Zone Labs' support answer any questions you might have.

I am certain that you will find ZoneAlarm extremely easy to use. Don't let the fact that it is a free download make you wonder about the quality of the software. ZoneAlarm is a very powerful firewall, and it can be made even more so if the need arises. But chances are, you will not have to tweak much (if anything) after the initial setup.

There are other firewall choices, many of them packaged as part of "Security Suites." Symantec's Norton Internet Security (http://www.symantec.com/sabu/nis/nis_pe/), Trend Micro's PC-cillin Internet Security (http://www.trendmicro.com/en/products/desktop/pc-cillin/evaluate/overview.htm), and ZoneAlarm's Security Suite (http://www.zonelabs.com/store/content/home.jsp) are among the best. The advantage of these suites is that they integrate antivirus, firewall, antispyware, privacy and other utilities in one place, which not only is convenient, but tends to simplify things and prevent conflicts between software from different manufacturers. The three products just mentioned offer free trials, so if you think one of them might be the right solution for you, by all means check it out.

Best wishes,

Submitted by: Miguel K. of Columbus, Ohio

Taken from CNet Community Forums

Difference between a Pentium and a Celeron processor?

Difference between a Pentium and a Celeron processor?

Here are the most important similarities and differences between the Pentium 4 and the Celeron chips coming out today:
Core - The Celeron chip is based on a Pentium 4 core.

Cache - Celeron chips have less cache memory than Pentium 4 chips do. A Celeron might have 128 kilobytes of L2 cache, while a Pentium 4 can have four times that. The amount of L2 cache memory can have a big effect on performance.

Clock speed - Intel manufactures the Pentium 4 chips to run at a higher clock speed than Celeron chips. The fastest Pentium 4 might be 60 percent faster than the fastest Celeron.

Bus speed - There are differences in the maximum bus speeds that the processors allow. Pentium 4s tend to be about 30 percent faster than Celerons.

When you compare the two chips side by side, a Celeron and a Pentium 4 chip running at the same speed are different beasts. The smaller L2 cache size and slower bus speeds can mean serious performance differences depending on what you want to do with your computer. If all you do is check e-mail and browse the Web, the Celeron is fine, and the price difference can save you a lot of money. If you want the fastest machine you can buy, then you need to go with the Pentium 4 to get the highest clock speeds and the fastest system bus.

Some Cute Pics Of Kerala

When Inanimate objects ruled the world

Does Paradise Exist - Beautiful

Ultra Swank House On Wheels

2011 Kawasaki Ninja ZX-10R Superbike makes its debut

Kawasaki’s final version of its latest Ninja racebike has been revealed at the Nurburgring circuit, in Germany.

Two months of teasers have whet the appetite of the fans who couldn’t hold back their excitement as the all-new Kawasaki Ninja ZX-10R racer was unveiled before the full launch of the production machine in early October at the Intermot show.

The Kawasaki Superbike Racing Team has been preparing the bike to make its racing debut in the 2011 WSB Championship. Steve Guttridge, the Race Planning Manager from Kawasaki Motors Europe, told reporters that the new race bike is eagerly anticipated by everyone involved in the Superbike racing project.

He also said that the PBM team continues to evolve and restructure itself so that it can be in a position to boost the new bike's potential next season.

Guttridge added that the Paul Bird team is keen to get started and so it was given the chance to help show what the first edition of the race version can do at the Nurburgring.

“The new race bike has been eagerly anticipated by everyone involved in the Superbike racing project for a while now. The PBM team have evolved and restructured continuously in order to be in a position to utilise the new bike's potential to the maximum next season. As you can imagine the Paul Bird team are ultra keen to get started with it and so who better than the team itself to help us show the first edition of the race version of it here at the Nürburgring?” said Steve Guttridge, the Race Planning Manager from Kawasaki Motors Europe.


Thanko HDDV 1080P-506 Full HD Camcorder

Health Important Tips

Health Important Tips:

>Answer the phone by left ear.

>Don't take medicine with cold water.

>Don't have huge meals after 5pm.

>Drink more water in morning, less at night.

>Best sleeping time is from 10 pm to 4 am.

>Don't lay down immediately after taking medicine.

>When battery is down to last bar, don't answer the phone, as the radiation is 1000 times stronger.

*Forward this to people u care about.

Drinking tea could protect your skin

Drinking tea could protect your skin

Drinking at least two cups of tea daily can protect you from developing skin cancer, says a new study, but scientists call for more research to strengthen the findings.

Tea's disease-fighting properties appear to protect the body against Squamous cell carcinomas and Basal cell carcinomas - most common forms of skin cancers usually caused by too much exposure to the sun's rays - that grow slowly over a period of months or even years, the researchers say.

Squamous cell carcinomas normally appear on the face and turn into an ulcer-like growth that doesn't heal.

Basal cell carcinomas normally show up as a painless lump that gradually expands in size. Although they do not normally spread through the body, they still need be removed through surgery.

In the latest study, carried out at Dartmouth Medical School in New Hampshire in the US, the scientists analysed over 1,400 patients aged between 25 and 74 years with one of the two types of tumour, reported the online edition of Daily Mail.

They compared their diet, drinking habits and lifestyle with a similar group who did not have cancer.

They found that regular tea drinkers were 65 percent less likely to have squamous cell carcinoma and almost 80 percent less at risk of a basal cell carcinoma. The biggest benefits were seen among long-term drinkers, especially those who downed several cups a day for more than 40 years.

Judy Rees, who led the research, said: "The constituents of tea have been investigated for their activity against a variety of diseases and cancers. But the most potent appear to be polyphenols."

These are antioxidants that block the damaging effects in the body of molecules known as free radicals.

But she stressed more research was needed to confirm it is the tea and not some other lifestyle factor which is protecting against the illness.

Tourism in Israel

Related Posts Plugin for WordPress, Blogger...

Followers

Smile Campus. Powered by Blogger.
Follow Me on Pinterest
Follow smilecampus on Twitter