Top 10 Antivirus Software

1 Avast
2 AVG
3 Avira
4 ESET
5 Kaspersky
6 Norton
7 Panda Security
8 McAfee
9 Trend Micro
10 ZoneAlarm

 


Computer Security Tips

The Difference of Adware, Spyware and Anti-virus

Adware and spyware, knowing the basics

Adware Spyware Remover from Trend Micro Systems

Phishing For Your Identity

Computer and Internet Security Issues that you Should Know

How to Reduce Spam in Your Inbox and Enhance Your Email Security

Strategies To Fight Email Spam

Problems With Spam? Learn How To Treat It.

Computer Viruses an Over View.

Choosing Anti-Virus Software

Protect Your Computer From Adware & Spyware

Are YOU one of the 90% Affected by Spyware or Adware?

Anti Phishing Software

Does Your Computer Need A Firewall

Every Computer Needs Anti Virus Software

Control Time Your Kids Can Access the PC

How to Safely Delete Suspicious E-mails

Department of Defense Crackdown on Security

Parental Control in the Digital Age

PC Threats Everyone Is At Risk

Fighting off Viruses:  Advancements in Antivirus Software Suites

Finding The Best Spyware Blocker

How to Reduce Spam in Your Inbox and Enhance Your Email Security

Improve PC Performance - 6 Tips You Must Know

How To Keep Your Computer Virus Free

Keyloggers: How they work and how to detect them

About Norton Anti-Virus

How a Personal Firewall Helps to Protect Your Home Computer From Hackers

How to recognize a Phishing email message

Do I Need A Registry Clean?

Securing Your Computer System

Why Do I Feel Like Somebody’s Watching Me?

How To Speed Up Your PC By Removing,disabling Certain Software

Spyware Protection For Dummies

How To Identify A Virus Infected E-mail Message?

Website Security Rules of the Road

What is the difference between adware and spyware ?

Why do people create computer virus and how does it spread?

Security rules to follow while shopping on the internet

What the Heck are Botnets?

What is a Computer Virus?

What is a keylogger?

What is a Trojan Horse and how can you avoid it?

Phishing For Your Identity

What is Spam?

What is Spyware and how can you avoid it?

5 Mistakes You Might Be Making When Choosing A Password

5 Simple Steps To Protect Yourself Against Identity Theft

14 Household Ways To Protect Your Computer From Viruses

 

 


How a Personal Firewall Helps to Protect Your Home Computer From Hackers

There are two types of firewall available to the home computer user. A hardware firewall is a device which sits between your computer and the internet. At home for example it could reside on a broadband router which is used to share your internet connection with a number of computers. One of the advantages of a hardware firewall is that it can be used to protect more than one computer at a time. For this reason hardware firewalls are deployed in corporate networks. For home users who own just one computer a personal firewall is more commonly used and more cost effective.

A personal firewall is a software application that monitors and can block the flow of data between the internet and your computer. The firewall is a key part of your computer security set up. It prevents hackers from gaining access to your computer using an internet connection.

Hackers gain access to your computer through open ports that are used by your computer to communicate with the internet. The most basic firewall programs, like Windows XP's firewall, monitor and can block "inbound" traffic by closing these ports. If theses ports are closed a hacker cannot access your computer directly via the internet.

More advanced firewall programs like products from ZoneLabs or Symantec also monitor and can block "outbound" traffic. This extra level of security is important and is worth investing in. For example, if malicious software like a Trojan Virus or spyware were installed on your computer without your knowledge the firewall would alert the user when it tried to connect to the internet and prevent it communicating with its host.

A firewall usually works at two basic levels. Firstly, packets of data are analysed based upon IP address and content to see whether they comply with a set of rules which a user can input to. The second level the data is analysed is at the application level. The firewall determines whether an application can send and/or receive data and the port which it should be communicating through.

The firewall "learns" through continuous interaction with the user. It seeks user approval from programs when they first come in to contact with the firewall. Most firewalls also allow the user to allow or block applications through a stored list of program which can be accessed through the firewall's user interface.

There are a number of sites which will help test your firewall's effectiveness. A number of these sites are run by security software vendors so it is recommended you test using an independently run site to double-check any results. One of the best independent test sites is run by The Gibson Research Corporation. They offer a free test called "Shield Up!" which can be found at their website - http://www.grc.com. The test checks a number of well-know and vulnerable ports on your computer and then provides some useful additional information to help improve your security while online.

It is important to remember that the firewall is only part of your computer security and does not negate the need for a good anti virus solution, a spyware removal tool and a degree of caution / common on sense on the type of websites a user visits. For example, the firewall will not scan for viruses or remove them from your computer.
Click Here To Read Other Interesting Articles On Computer Security

 

 

 

 

Free Web Hosting