Maintain your old Siemens Hipath system

Personal Firewalls for Home Users

What is a Firewall?

The term "firewall" illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network.

The primary goal of a firewall is to implement a desired security policy; controlling access in both directions through the firewall, and to protect the firewall itself from compromise. It wards off intrusion attempts, Trojans and other malicious attacks.

Personal Firewalls:

They are meant for the home user in a networked environment. They aim to block simple attacks, unlike the enterprise level firewalls that the corporate world uses at the server or router end. There are many ways to implement a firewall, each with specific advantages and disadvantages.

Are they really needed?

Nowadays organizations and professionals use Internet technology to establish their online presence and showcase their products and services globally. Their endeavor is to leverage digital technology to make their business work for them.

All the organizations and professionals are shifting from Dialup to broadband and getting a fixed IP. It has led to an increase in security attacks, bugs in everyday working. This does not mean that Dialup being anonymous dynamic link or the firewall of the ISP network make you pretty safe.

Now if your machine was under attack, you must have wondered what went wrong making your system crash suddenly. So I would rather like to say, it's not necessary for anyone to actually know about you or your IP address to gain access to your system.

If you system is infected or prone to intrusions, then beyond the anonymity of your Dialup connection or a dynamic IP, your system can be hacked.

Types of Attacks

Intrusion:

There are many ways to gain unauthorized access to a system. Operating system vulnerabilities, cracked or guessed passwords are some of the more common. Once access is attained, the intruder can send email, tamper with data, or use the system privileges to attack another system.

Information Theft and Tampering:

Data theft and tampering do not always require that the system be compromised. There have been many bugs with FTP servers that allow attackers to download password files or upload Trojan horses.

Service Attacks:

Any attack that keeps the intended user from being able to use the services provided by their servers is considered a denial of service attack. There are many types of denial of service attacks, and unfortunately are very difficult to defend against. "Mail bombs" are one example in which an attacker repeatedly sends large mail files in the attempt at filling the server's disk filesystem thus preventing legitimate mail from being received.

Types of Attackers

Joyrider:

Not all attacks on computer systems are malicious. Joyriders are just looking for fun. Your system may be broken into just because it was easy, or to use the machine as a platform to attack others. It may be difficult to detect intrusion on a system that is used for this purpose. If the log files are modified, and if everything appears to be working, you may never know.

Vandals:

A vandal is malicious. They break in to delete files or crash computer systems either because they don't like you, or because they enjoy destroying things. If a vandal breaks into your computer, you will know about it right away. Vandals may also steal secrets and target your privacy.

"In an incident a Trojan was being used to operate the web cam. All the activities being done in the house were being telecasted on the websites."

Spies:

Spies are out to get secret information. It may be difficult to detect break-ins by spies since they will probably leave no trace if they get what they are looking for.

A personal firewall, therefore, is one of the methods you can use to deny such intrusions.

How Firewalls work?

Firewalls basically work as a filter between your application and network connection. They act as gatekeepers and as per your settings, show a port as open or closed for communication. You can grant rights for different applications to gain access to the internet and also in a reverse manner by blocking outside applications trying to use ports and protocols and preventing attacks. Hence you can block ports that you don't use or even block common ports used by Trojans.

Using Firewalls you can also block protocols, so restricting access to NetBIOS will prevent computers on the network from accessing your data. Firewalls often use a combination of ports, protocols, and application level security to give you the desired security.

Firewalls are configured to discard packets with particular attributes such as:

  • Specific source or destination IP addresses.

  • Specific protocol types

  • TCP flags set/clear in the packet header.

Choosing a firewall:

Choose the firewalls which have the ability to ward of all intrusion attempts, control applications that can access the internet, preventing the malicious scripts or controls from stealing information or uploading files and prevent Trojans and other backdoor agents from running as servers.

The purpose of having a firewall cannot be diminished in order to gain speed. However, secure, high-performance firewalls are required to remove the bottleneck when using high speed Internet connections. The World-Wide-Web makes possible the generation of enormous amounts of traffic at the click of a mouse.

Some of the good firewall performers available in the market are below:

  • BlackICE Defender

  • eSafe Desktop

  • McAfee Personal Firewall

  • Neowatch

  • Norton Personal Firewall

  • PGP Desktop Security

  • Sygate Personal Firewalls

  • Tiny Personal Firewall

  • Zone Alarm

  • Zone Alarm Pro

Most of these firewalls are free for personal use or offer a free trial period. All the personal firewalls available can't ensure 100% security for your machine. Regular maintenance of the machine is needed for ensuring safety.

Some of the tasks advised for maintaining system not prone to intrusions:

  • Disable file and print sharing if you are not going to be on network.

  • Update your antivirus signature files regularly.

  • Use a specialized Trojan cleaner.

  • Regular apply security patches to your software and operating system.

  • Don't open email attachments if you have don't know the contents it may contain.

  • Don't allow unknown applications to access to the internet or to your system.

  • Regularly check log files of your personal firewall and antivirus software.

  • Disable ActiveX and java and uninstall windows scripting host if not required.

  • Turn off Macros in Applications like Microsoft Office and turn macro protection on.

  • Check the open ports of your system and see them against the common list of Trojans ports to see if they are being used by some Trojan.

  • Log Off from your internet connection if not required. Being online on the internet for long duration gives any intruder more and sufficient time to breach system security.

  • Unplug peripherals like web cam, microphone if they are not being used.

About The Author

Pawan Bangar,
Technical Director,
Birbals,India
ebirbals@gmail.com

In The News:

Couple jailed for 10 years over viral video showing them dancing at Iran landmark
Wed, 01 Feb 2023 12:00:00 +0000
A young couple in Iran have been jailed for more than 10 years each after a video on social media showed them dancing at one of Tehran's main landmarks.

Legendary NFL player Tom Brady 'retiring for good'
Wed, 01 Feb 2023 13:22:00 +0000
NFL legend Tom Brady has announced for the second time that he will be retiring.

Court upholds decision to extend Andrew Tate's 30-day detention after appeal dismissed
Wed, 01 Feb 2023 15:58:00 +0000
A Romanian court has upheld the decision to extend the detention of controversial influencer Andrew Tate to 30 days.

FIFA facing backlash over potential 'sportswashing' Saudi sponsorship
Wed, 01 Feb 2023 11:35:00 +0000
FIFA is facing backlash from Women's World Cup co-hosts Australia and New Zealand over a potential sponsorship of the tournament by Saudi Arabia amid concerns about restrictions on women’s rights in the kingdom.

Biggest year ever for crypto hacking - with North Korea the suspected culprit
Wed, 01 Feb 2023 13:00:00 +0000
2022 was the biggest year ever for cryptocurrency hacking, with more than £3.2bn stolen worldwide, according to new research.



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

Web and Computer Security

Well, if that would have been said to me by... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Backup and Save your business!

There you are busily typing away on your PC or... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More