What Are Firewall

Hacker in Ludhiana,EthiicalHacker in Ludhiana

A firewall is any device used to prevent outsiders from gaining access to your network. This device is usually a combination of software and hardware. Firewalls commonly implement exclusionary schemes or rules that sort out wanted and unwanted addresses. To understand how work firewalls; consider some of the subjects discussed earlier in this book. First, most simple authentication procedures use the IP address as an index. The IP address is the most universal identification index on the Internet. This address can be either a static or dynamic address it is permanent; it is the address of a machine that is always connected to the Internet. There are many classes of static IP addresses. One class can be discovered by issuing a whois query; this class consists primarily of top-level machines in a network, such as domain name servers, Web servers, and root-level machines. These actually have registered host names within the who is database at InterNIC.
Other classes of static IP addresses are addresses assigned to second- and third-level machines within networks dominated by domain name servers, root servers, Web servers, and so on. These also have permanent physical addresses. However, these machines might or might not possess a registered host name. In any event, their addresses are registered as well.
A dynamic IP address is one that is arbitrarily assigned to a different node each time it connects to a network. Dynamic IP is often used by ISPs for dial-up access–each time a node dials up, it is assigned a different IP address.
Whether your address is static or dynamic, it is used in all network traffic that you conduct. A Web server records your IP address when you request a Web page. This is not to intrude on your privacy; it is done so that the server knows how to send you the requested data. In a similar fashion, all network services capture your IP (either temporarily or permanently) so they can return data to your address. In essence, it works much like the postal service: Imagine if every letter mailed had a return address. On the Internet, things are just so. The IP is the return address.
There are four types of firewalls.
The remote server or Proxy Server:It is essentially a computer which checks the packets of information being sent over the network to be certain they are safe. It blocks unsafe packets and allows those to pass that are safe.
Screening routers: These connect two or more computers together to make a network, are the most basic type of firewall. Your Internet connection is attached to the router and you access the Internet through your internal network. Two or more computers can share the Internet connection and be protected by the firewall, which is built into the router, at the same time.
 High security network level firewalls:These firewalls compare the bit patterns of data packets being sent over the network to data packets that are listed as being “trusted” or safe. These firewalls are used to help stop DOS (denial of service) attacks. They also use dynamic packet filtering to automatically control the flow of data through the ports, to minimize the number of open ports at any given time to help stop hackers from gaining access to the network.
 The software Firewall: It is probably the most common type. It is a software program running on your computer that allows the data to pass through it, if you have programmed the software to allow it. You simply select which of your applications, like web browsers, email client, mIRC, etc. you want the “firewall” to allow to access the Internet. These firewalls are mainly designed to protect the single computer that is running the software.

We Provide Services On Following Cities

*Ethical Haker in Ludhiana *Ethical Hacking Services in Amritsar *Ethical Hacking Services in Mumbai
*Ethical Hacking Services in Delhi *Ethical Hacking Services in Gujarat * Ethical Hacking Services in Chandigarh
Hacker in Ludhiana,EthiicalHacker in Ludhiana

Leave a Reply

Your email address will not be published. Required fields are marked *