KEEPING YOU SAFE ONLINE
Firewalls
A firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and HTTP connections.I would suggest using.
ZONEALARM INTERNET SECURITY FREE VERSION
Role of firewalls in Internet security and web security
Firewalls impose restrictions on incoming and outgoing packets to and from private networks. All the traffic, whether incoming or outgoing, must pass through the firewall; only authorized traffic is allowed to pass through it. Firewalls create checkpoints between an internal private network and the public Internet, also known as choke points. Firewalls can create choke points based on IP source and TCP port number. They can also serve as the platform for IPsec. Using tunnel mode capability, firewall can be used to implement VPNs. Firewalls can also limit network exposure by hiding the internal network system and information from the public Internet.Types of firewalls
Packet filters
Packet filters are one of several different types of firewalls that process network traffic on a packet-by-packet basis. Their main job is to filter traffic from a remote IP host, so a router is needed to connect the internal network to the Internet. The router is known as a screening router, which screens packets leaving and entering the network.Circuit-level gateways
The circuit-level gateway is a proxy server that statically defines what traffic will be allowed. Circuit proxies always forward packets containing a given port number, provided the port number is permitted by the rules set. This gateway operates at the network level of an OSI model. The main advantage of a proxy server is its ability to provide Network Address Translation (NAT), which can hide the user's IP address from the Internet, effectively protecting all internal information from the Internet.Application-level gateways
An application-level gateway is a proxy server operating at the TCP/IP application level. A packet is forwarded only if a connection is established using a known protocol. Application-level gateways are notable for analyzing entire messages rather than individual packets of data when the data are being sent or received..Malicious software and antivirus
Malware
For Malware and spyware i would suggest using
Malware Bytes free version
For more details on this topic, see Malware.
Commonly, a computer user can be tricked or forced into downloading
software onto a computer that is of malicious intent. Such programs are
known as malware and come in many forms, such as viruses, Trojan horses,
spyware, and worms. Malicious software is sometimes used to form botnets.Viruses
For more details on this topic, see Computer virus.
Viruses are programs that can replicate their structures or
effects by infecting other files or structures on a computer. The common
use of a virus is to take over a computer to steal data.Trojan horse
For more details on this topic, see Trojan horse (computing).
A Trojan horse (commonly known as a Trojan) is a
general term for malicious software that pretends to be harmless so that
a user willingly allows it to be downloaded onto the computer.Spyware
For more details on this topic, see Spyware.
The term spyware refers to programs that surreptitiously
monitor activity on a computer system and report that information to
others without the user's consent.Worms
For more details on this topic, see Computer worm.
Worms are programs that can replicate themselves throughout a computer network, performing malicious tasks throughout.Botnet
For more details on this topic, see Botnet.
A botnet is a network of "zombie" computers that have been
taken over by a "bot" that performs large-scale malicious acts for the
creator of the botnet.Antivirus
I would suggest using.
Avira Antivir latest free version
For more details on this topic, see Antivirus.
Antivirus programs and Internet security programs are useful in protecting a computer or programmable device from malware.Such programs are used to detect and usually eliminate viruses; however, it is now common to see security suites, containing also firewalls, anti-spyware, theft protection, and so on to more thoroughly protect users.[7]
Traditionally, a user would pay for antivirus software; however, computer users now can, and do, download from a host of free security applications on the Internet.[8]
Keep your computer system clean
CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware! :)
DOWNLOAD CCLEANER HERE FOR FREE
COMPUTERS REALLY CAN BE FUN IF TREATED THE CORRECT WAY
PLEASE TAKE CARE OF THEM AND THEY WILL TREAT YOU WELL..
