Professional Documents
Culture Documents
What Is A Firewall & Why Do You Need It?
What Is A Firewall & Why Do You Need It?
What Is A Firewall & Why Do You Need It?
need it?
According to a study by NCSA Cyber Security, only 4% of
Americans say they understand firewalls "completely",
while more than 44% don't understand firewalls at all - or
know if they have one enabled on their PC. So for those
of you who feel a little unsure - below is a brief overview
of why you might need a firewall.
If your PC is connected to the Internet, you are a potential
target to an array of cyber threats, such as hackers,
keyloggers, and Trojans that attack through unpatched
security holes. This means that if you, like most people
shop and bank online, are vulnerable to identity theft and
other malicious attacks.
A firewall works as a barrier, or a shield, between your PC
and cyber space. When you are connected to the
Internet, you are constantly sending and receiving
information in small units called packets. The firewall
filters these packets to see if they meet certain criteria
set by a series of rules, and thereafter blocks or allows
the data. This way, hackers cannot get inside and steal
information such as bank account numbers and
passwords from you.
Basic firewalls such as the one included in Windows XP,
only monitor incoming traffic by default. This may give
you a false sense of security. Keep in mind, outgoing
traffic, with your credit card information, bank accounts,
and social security number is not protected. A good
firewall will monitor traffic in both directions. That is, both
your incoming data and your outgoing data, keeping your
private information safe. In addition to preventing
2@@@@@@@@@@@@@@
@@@@@@@@@@@@@@
@@@@@@@@@@@@@@
3@@@@@@@@@@@@@@@@@@@@
What is a firewall?
A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and
worms that try to reach your computer over the Internet. If you cant start Windows Firewall or
you are getting an error, use our
proxy server
A proxy server is a server that sits between a client application, such as a Web browser, and a
real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If
not, it forwards the request to the real server.
Computers and applications connect to remote hosts using IP addresses and port
numbers. Every computer connected to a network has an IP address, and data is
transmitted from one computer to another through channels, or ports, which are
assigned certain numbers. A computers IP address is analogous to your main office
telephone number, while the port represents your extension. Some applications
require communication on specific ports, so you may need to verify that a certain
port is open on your computer. You can do this by first determining your IP address
and then running the "netstat" command-line utility to discover all open ports on
the computer.
Step 1
Log in to Windows using an administrator account.
Step 2
Click "Start" and type cmd (without quotes here and throughout this article) in the
search box. Press Enter.
Related Reading: How to Find Your External IP Address
Step 3
Type ipconfig and press Enter. Your IP address should be listed under Ethernet
adapter Local Area Connection if you have a cabled connection, or Wireless LAN
adapter Wireless Network Connection. Use the IPv4 address (unless you are on an
IPv6 network contact your IT department if you are unsure). Depending on your
hardware configuration, you may have more than one network adapter installed on
your computer.
Step 4
Type netstat -a and press Enter. A list of all your active TCP/IP connections will
populate. The port numbers appear after the IP address with a colon separating the
two. For example, if your IP address is 192.168.1.1 and you see an entry for
192.168.1.1:2869, it means port 2869 is open. If you see port numbers listed after
0.0.0.0, it means that all network adapters on your computer have the listed ports
open and in the state indicated in the State column on the right. Port numbers
listed after 127.0.0.1 are open on your computers loopback address only. The
loopback address is a virtual network interface mainly used for connectivity testing
purposes.
What is a Port?
To the uninitiated or the otherwise-gifted computer user, technical geek-speak can be rather
frustrating and aggravating. When instructions are filled with such things as "port," "TCP,"
"UDP," and other acronyms or technical terminology, the user feels more isolated and rarely
finds a solution or comprehension. Fortunately, comprehension is just moments away.
Port
Picture a bay where there are lots of private boats are docked. The overall location is called
a seaport, literally a port at or on the sea. Everyone wanting to dock thererequesting
landing servicesuses the same port. Seaports work with berth numbers assigned to
individual boats. The port name and the berth number combine into the "who, what, and
where" of boat identification.
In geek-speak, berth numbers on the Internet are Internet Protocol or IP addresses, a user's
numerical identifier on the Internet. Depending on connection type and service provider, a
user's IP address may or may not remain the same with each connection to or "docking" on
the Internet.
A computer port is a type of electronic, software- or programming-related docking point
through which information flows from a program on your computer or to your computer from
the Internet or another computer in a network. (A network, by the way, is a series of
computers that are physically or electronically linked.)
In computer terms, a computer or a program connects to somewhere or something else on
the Internet via a port. Port numbers and the user's IP address combine into the "who does
what" information kept by every Internet Service Provider.
Ports are numbered for consistency and programming. The most commonly used and best
known ports are those numbered 0 to 1023 dedicated for Internet use, but they can extend
far higher for specialized purposes. Each port set or range is assigned specialized jobs or
functions, and that's generally all they do. Usually, all identical system services or functions
use the same port numbers on the receiving servers.
For example, all computers accessing or requesting Quote of the Day will always use port
17, because that port is officially reserved for that purpose, and only requests for that
service use port 17. Outgoing information is channeled through a different or private port,
keeping the "incoming line" open for others. Email received on a local computer generally
uses a TCP port 25. File Transport Protocol or FTP uses port 21, to name only a few port
assignments.
TCP/UDP
TCP stands for Transmission Control Protocol, and UDP is the abbreviation for User
Datagram Protocol. Both pertain to data transmissions on the Internet, but they work very
differently.
TCP is considerably more reliable. It is connection-based transmission of data. There must
be anchored points between sending location to receiving location, and data A that is sent
first will always arrive at the destination prior to data B which was sent second. The only
transmission that fails is one that is broken (for instance, if the transmitting point's Internet
connection was lost or a receiver's website is down or an email address is no longer valid.
The email server is the receiving point that counts therenot the user name.)
UDP is connectionless protocol. Data is sent regardless of the receiving destination's status.
Unfortunately, there is no guarantee that the data will ever be received, in what order, or in
what condition.
An example between the two might involve mailing two sets of two letters. Set A comprises
Letters 1 and 2. Set A is sent via the postal service called TCP that has a permanent, predefined route with no derivation. Letters 1 and 2 will arrive, and they'll arrive in order.
Meanwhile, Set B comprises Letters 3 and 4 which were sent on chronological days via the
postal service nicknamed UDP. Because they were sent with the routing and delivery
instructions, "Get there when you can by whatever route you might findmaybe. Just do
the best you can," Letter 4 arrives torn, water-stained, bent, folded, and generally well
mutilated; Letter 3 never shows up at all and is never returned to the sender.
Another difference between TCP and UDP surrounds data streaming. Data sets sent via
TCP are sent seamlessly; there is no separation between bits of data which allows for a
smoother viewing or listening experience.
UDP streaming data sets or packages are guaranteed to arrive, but they do so individually.
Slightly lagging or jerking pictures or sound may result as each separately arriving package
is received, read, and played. While seeming to contradict the above, the difference is in the
data "packaging" aspect. Bits of data, those individual letters, aren't guaranteed to arrive or
in what shape. The streaming data is packaged "in bulk," and boxes are sent, not
envelopes. The streaming data "boxes" are sent along more reliably, and if they're
requested, they'll be delivered. Consider the delivery of a higher priority, air travel versus
ground transportation or certified mail versus standard mail.
The previously uninitiated in geek-speak can comfortably brag that they no longer take any
port in a computer storm, metaphorically speaking, but they know whether to have a
program transmit or receive via a TCP or a UDP connection, which is progress, indeed.
Port Number
Definition - What does Port Number mean?
A port number is the logical address of each application or process that uses a network or the
Internet to communicate. A port number uniquely identifies a network-based application on a
computer. Each application/program is allocated a 16-bit integer port number. This number is
assigned automatically by the OS, manually by the user or is set as a default for some popular
applications.