Feature Posts

02/05/10

Linux Firewall Software

Whatever the type of firewall in any Linux systems, they receive, then inspect and make decisions upon all the net traffic that goes through its perimeters. The basic type of firewall does packet filtering. Through this type of filtering all internet data is broken up into small parts or packets and then monitored. If it is registered as a virus, the firewall prevents the data from entering your computer. The second type of firewall system is circuit relay or circuit level gateway. Here the firewall checks the authenticity of connections before allowing data traffic. It permits traffic from permitted sources for a limited period of time. In the advanced firewall security system, the application level gateway is considered to be the most secure of all. It acts as a proxy and devoted detailed attention to any application that uses the gateway.

Linux is secure enough to run on your computer provided you just work on it as a client, But once it is connected to remote services, you need to make use of firewalls. A firewall is the first step you take in an elaborately planned security system. There are two kinds of user accounts. One is a low privileged user account and the other is a full privileged user account. Most Linux distributors set up low privileged user accounts in their computers. If yours is low privileged it prevents malicious viruses from attacking your computer. In extreme cases, some viruses or hackers might try to damage your files. This can be prevented by logging in through the root account. Once you are logged in through the root account it is powerful enough that you can change the Linux configurations. This places Linux users in an advantageous position because such a facility is not available with Windows users as they are logged in full time as a full privileged user. But to be on the safe side please keep on updating the firewall regularly. You also have to make sure that no one logs in as a root user and uses unsecured sites enabling viruses to attack your computer. If this happens viruses which are known to exist in the Linux systems can come in and steal user data.
Article Source: http://www.ArticleKit.com/

0 Komentar:

Posting Komentar