4. Personal Firewalls Examine the received packets of information Check what IP address is sending the information Identify the port which the packet will be transmitted
5. How do firewalls protect The firewalls block selected ports from entering your PC Tell you when programs from your PC attempt to connect to the internet Allowing only programs you know are safe to access
6. Which ports to block Personal Firewalls log which ports have attempted to attack your Personal Computer and then block those ports
7. What is an attack An intruder that could steal or damage important information Damage your computer Use your computers resources
8. How does it attack Many ways but the most popular is to plant a infamous “Back Orifice Trojan horse” in your personal computer
9. Routers What do routers do to help Routers for many home networks include a hardware-based personal firewall that protect you from the internet
We live in a world of information overload and how do we know what to store and what we can let escape like the sand through an hour glass.You only have to remember one thing about what I communicate to you today.
We don’t want to live in a paranoid bubble but more so we don’t want to have to start over from behind the starting line.Hopefully we put a security alarm into our homes before we are broken into and our family treasures are taken from us. We sometimes put bars on our windows to prevent uninvited guests from entering into our homes.We even put security alarms on our vehicles to protect our investments that are moveable.
Anyone who uses high speed connections like cable modems at home can be prone to hacker’s attacking.So how do we protect our personal computers from something we can’t see, feel or hear?????To protect home computers, many people are turning to personal firewalls – software that runs on the computer and protects the computer against internet attacks.
Information between your computer and the internet come through an internet port.When you make an internet connection, many of these connections are opened up, and each has its own number & purpose.Example would be an e-mail software usually uses port 110 on a mail server to get mail and uses port 25 to send mail.Personal firewalls examines these data packets your computer receives.
The firewalls block selected ports from your personal computersThey tell you when programs from your personal computers attempt to connect to the internetThey allow only programs you know are safe to access your computer
Personal Firewalls log which ports have attempted to attack your personal computer and then blocks these ports from transmitting information in the future. The logs of these attempted attacking ports are sent to your (ISP) Internet service provider and they track down the hackers and shut them down.
So what is an attack on our computer and why should you be concerned about it?An attack is an intruder that can steal important information from your computer like you banking information or other personal confidential information.An attack is an intruder that can damage the important information you have saved in your computerAn attack can damage your computer An attacker can get into your computer to use its resources.
How does it attack your computer and get information , damage your computer or even use its resources?The Trojan horse that is planted in your PC can then connect to a hacker of its own, giving this hacker complete control over your computer.
Routers for many home networks include a hardware – based personal firewall that protects you from the internet using a technique called Network Address Translation (NAT). You true IP address is shielded from the evils that lie within the internet – it can’t be seen by anyone or any application outside your home network. It’s invisible and can’t be reached by hackers.Personal Firewalls provide great protection from hackers getting into your personal computer system.
You hold the key to protect your personal information and your privacy.