Hacking Worlds

hacking the worlds


How Firewalls Work

How Firewalls WorkIf you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” in a layman’s terms.
How Firewalls Work

Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network.

How Firewalls Work

Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator. Most personal firewalls such as Windows firewall operate on a set of pre-configured rules that are most suitable under normal circumstances so that the user need not worry much about configuring the firewall.

Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers.  However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers. In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks. Thus in addition to security, a firewall can give the company a tremendous control over how people use the network.

Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:

1. Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.

2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.

Firewall Configuration

Firewalls can be configured by adding one or more filters based on several conditions as mentioned below:

1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set  filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.

2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.

3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.

4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.

Hardware vs. Software Firewall

Hardware firewalls provide higher level of security and hence preferred for servers where security has the top most priority whereas, the software firewalls are less expensive and are most preferred in home computers and laptops. Hardware firewalls usually come as an in-built unit of a router and provide maximum security as it filters each packet in the hardware level itself even before it manages to enter your computer. A good example is the Linksys Cable/DSL router.

Why Firewall?

Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more. The effectiveness of the security depends on the way you configure the firewall and how you set up the filter rules. However major threats such as DOS and DDOS attacks may sometimes manage to bypass the firewalls and do the damage to the server. Even though firewall is not a complete answer to online threats, it can most effectively handle the attacks and provide security to the computer up to the maximum possible extent.

Delete or Remove Recycle bin Icon from Desktop

If you are the kind of person who always likes neatness specially desktop, then here is a small trick for you that will simply remove the Recycle bin icon from desktop.

Follow the steps below:

[Start] [Run] [Regedit]
Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\

CurrentVersion\Explorer\BitBucket

Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.

Data Type: DWORD // Value Name: NukeOnDelete

Setting for Value Data: [0 = Use Recycle Bin / 1 = Permanently Delete]
Exit Registry and Reboot

Another Method
start->run->gpedit.msc-> user configuration ->desktop->remove recycle bin from desktop->double click->change it not configured to enable->apply and ok.

now come to start->run->gpupdate.exe and press enter.

your recycle bin icon is gone from desktop nad you will need to revert your settings for get that back.

after reverting setting make sure to run gpupdate.exe command.

Advertisements

6 Comments »

  1. Hi, if you to dominate the search engines in a short time, check out http://magicsubmitters.net/ Watch the video how it can push you to the top of google and sends you unlimited qualified traffic and customers on auto pilot

    Comment by Rank 1 On Search Engine — April 15, 2012 @ 10:35 am

  2. I am as a result successful by myself identified that site page. One pretty much reported everyone only precisely what As i elected to help you take note to help you and even then some. Cool writing and even all the best once more designed for attaining the following very little toll!

    Comment by Nova Mckim — April 26, 2012 @ 6:06 pm

  3. Undeniably imagine that that you said. Your favorite reason appeared to be
    at the web the easiest factor to take into account of.
    I say to you, I definitely get irked even as
    other folks think about worries that they just don’t understand about. You controlled to hit the nail upon the highest as well as outlined out the whole thing with no need side-effects , people could take a signal. Will likely be back to get more. Thank you

    Comment by email redirection free — September 27, 2012 @ 8:07 pm

  4. I am no longer positive the place you are getting your information,
    but good topic. I needs to spend some time finding out more
    or understanding more. Thank you for excellent information I was in search of
    this info for my mission.

    Comment by vietnam web — May 15, 2013 @ 6:51 pm

  5. Thanks in support of sharing such a good opinion, paragraph is good, thats why i have read it entirely

    Comment by nero full version — July 12, 2013 @ 4:08 pm

  6. To begin creating a new application select “Set Up New Application” in the application developer.
    There exists now $20 from the pot, and its $10 to call
    up, so you might be finding two:one (33%) on your own facebook poker chips, and therefore the odds of earning your
    hand are about 11:one or 8%. To the accomplished hacker or to
    any computer expert in general, hacking can be a relatively basic
    action that can be accomplished with minimum effort.

    Comment by comment pirater un mot de passe facebook — September 18, 2013 @ 8:02 am


RSS feed for comments on this post. TrackBack URI

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Create a free website or blog at WordPress.com.

Hacking Worlds

hacking worlds,how to hack window,virus coding,cyber hacking,code programming,Malware,Security architecture,Trojan horse ,Social engineering ,Spam,Spyware,Dancing pigs.