Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Burning Bridges is Bad, But Firewalls are Good > NetSparsh - Viral Content you Love & Share

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker.

Dial-up may not have seemed like it could have held any advantages, but it actually did have one upside. It is much less prone to hacking. Every time you dialed-in your computer was assigned a new IP address. That unique IP address made you a moving target that was more difficult for hackers to hit.

With a high-speed connection you are assigned a static IP address (it never changes). So, your computer went from being a moving target to staying still with a bulls-eye pasted on the side. That, coupled with the fact that with a high-speed connection your computer is always online, are ideal conditions for a potential hacker attack. That seemingly beneficial always-on connection gives hackers a 24/7 open invitation to try and hack your system. Once inside they can access personal or financial details, compromise your computer's operating system, or unleash a virus, worm, or spyware.

Which Firewall is Right For You?

Now that you know how vital a firewall is to the protection of your PC you have to decide which firewall is right for you. Software or hardware.

A software firewall is designed to monitor your computers activity at all times. Think of it as a bodyguard who won't let anyone into your computer if he doesn't like the look of them. With a software firewall you may to have to assist in protecting your system. The firewall might alert you to certain activity and ask you if you want to grant or deny permission. It's just like the bodyguard that was mentioned before. He needs the okay before telling someone to scram. After you give either the thumbs up or the thumbs down the firewall will take the appropriate action and remember your reply so that you won't be asked in the future.

If you feel comfortable installing and configuring hardware, then you might want to consider a hardware firewall in the form of a Cable/DSL router. The hardware firewall handles everything on its own without any input from you and you also won't have to read any reports or make any decisions. The firewall handles everything on its own. Installation, however, can be tricky, so this option is definitely more suited to the advanced computer user.

My Firewall is Installed. Now I'm Safe, Right?

With your new firewall in place you are probably thinking that your computer is impenetrable, right? Well, maybe not. As important to the security of your system as a firewall is, some do have their limits. Most software firewalls won't scan your system for viruses that can harm your computer and there aren't any hardware firewalls on the market that offer virus protection. That means that you are still vulnerable to attack.

The best line of defense against viruses that can harm your system is anti-virus protection.You can either buy a seperate anti-virus program or shop around for a software firewall with anti-virus protection built-in. You may never be able to make your computer 100% hacker-proof, but the installation of a firewall coupled with anti-virus protection will greatly reduce your chances of becoming a hacker's next victim.

About The Author

Heather Wallace is a writer whose work has been published in national, regional, and online publications. Additionally, she has written articles as a newspaper correspondent. Visit http://www.fetchingsites.com/FreeFirewall.html to download a free firewall that is easy-to-use and will block hackers and other unknown threats.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

New York Times

No Passport or Ticket: How a Woman Evaded Airport Security and Flew to London
New York Times
After Ms. Hartman joined the security line and was screened by the T.S.A., she tried to board a flight to Connecticut around 2 p.m., attempting to conceal herself behind a passenger who was waiting in line, Ms. Simonton said. As Ms. Hartman tried to ...
How Marilyn Hartman Got Past O'Hare SecurityCBS Chicago
'Serial stowaway' arrested for 10th time after slipping past airport security, flies to LondonFox 2 Detroit
Notorious 'serial stowaway' pensioner evades airport security and flies from Chicago to London without a ticketEvening Standard

all 29 news articles »

Google's Advanced Protection Program Offers Security Options For High-Risk Users
EFF
Security is not a one-size-fits-all proposition, and features that are prohibitively inconvenient for some could be critical for others. For most users, standard account security settings options are sufficient protection against common threats. But ...


BBC News

Syria offensive: US seeks to address Turkey's 'legitimate' security concerns
BBC News
The US is willing to work with Turkey to address its "legitimate" security concerns in northern Syria, Secretary of State Rex Tillerson has said. He was speaking after Turkey's military incursion into northern Syria to fight the Kurdish YPG militia at ...
US Hopes to Work With Turkey on 'Security Zone' in SyriaU.S. News & World Report
US hopes to work with Turkey to create 'security zone' in Syria: TillersonDaily Sabah
Turkey has legitimate security concerns: MattisHurriyet Daily News

all 452 news articles »

ZDNet

After ignoring for months, Uber fixes two-factor bypass bug after all
ZDNet
Uber has fixed a security bug that could've allowed an attacker to hack into user accounts by bypassing two-factor authentication, after the ride-sharing company initially said the flaw wasn't a "particularly severe" issue. The company quietly issued a ...


Engadget

Uber security flaw compromised two-factor authentication
Engadget
Two-factor authentication only works if it's strictly enforced in software, and it sounds like Uber might have fallen short of that goal for a while. In a chat with ZDNet, security researcher Karan Saini has revealed a flaw in Uber's two-factor ...

and more »

NBCNews.com

Report: Afghan security forces committed 75 rights abuses, including child sex assault
NBCNews.com
The report from the Special Inspector General for Afghanistan Reconstruction (SIGAR), which was first released to Congress last year but made public Tuesday, says that at least seven of the violations were child sexual assault, but also says "the full ...

and more »

CNBC

Soldiers, snipers and security at Davos: Protecting the world's rich and powerful
CNBC
Ensuring the safety of more than 2,500 high-profile political, economic and business guests at an event is never easy; ensuring the safety of more than 70 heads of state and government is a nightmare. The World Economic Forum (WEF) has said security is ...

and more »

New York Times

Prison Guards in France Continue Strike Over Security and Pay
New York Times
PARIS — A labor strike by prison guards around France entered its second week on Monday, as the guards vented anger over their pay and dangerous working conditions, an issue that erupted into the open this month after a string of violent assaults by ...

and more »

Sun Sentinel

Security guard shot colleague in Hollywood in fight over gate lock, police say
Sun Sentinel
Andres Aviles, 26, drove to Mexico and flew to El Salvador where he was detained while trying to reach Nicaragua, police said. Tonya AlanezContact Reporter · Privacy Policy. The security guard accused of shooting his colleague during a shift change at ...
Security guard accused of shooting colleague gets caught in El SalvadorWPLG Local 10
Fugitive security guard fled Florida. His crime caught up with him in El Salvador.Miami Herald

all 5 news articles »

Fox News

US says it wants to help Indonesia provide maritime security
Fox News
JAKARTA, Indonesia – U.S. Defense Secretary Jim Mattis says the Trump administration wants to help Indonesia play a central role in maritime security in the Asia-Pacific region. Mattis spoke briefly to reporters Tuesday after meeting with his ...
US to work with Indonesia on maritime security, counter-terrorismThe Straits Times

all 168 news articles »
Google News

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More