Red Hat Linux Fedora For Dummies [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Red Hat Linux Fedora For Dummies [Electronic resources] - نسخه متنی

Jon Hall

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید






Understanding Why You Need a Firewall in the First Place


You may think that there’s safety in numbers. After all, literally millions of people, businesses, and organizations are connected to each other at any given time through networks and the Internet. What do you, an individual with a simple computer and possibly a small network connected to the Internet have to be concerned about? The bad guys are usually interested in big money or big publicity, right?

Well, that’s mostly true, and chances are that you may never get hacked. If you subscribe to that world view, you’re — in technical jargon — relying on security by obscurity.

Many hackers use tools that automatically scan and attack entire networks. The happy hacker doesn’t have to work hard to search large numbers of networks to find and exploit unprotected computers. Don’t risk needlessly getting owned — when your computer gets broken into and controlled — by a hacker, especially when Linux provides effective tools for protecting yourself.

Using a firewall is one simple but quite effective method for protecting yourself when you connect to the Internet. A firewall allows you to connect to the Internet while blocking unnecessary and unwanted connections from coming in.

WarningFirewalls provide good bang-for-the-buck protection. However, they’re not the only security measure you should take. For example, locking your doors certainly helps to protect against burglars but is not 100 percent effective — they can still break through a window. You best bet comes from using layers of security, such as locking your windows, using alarms, and keeping tabs on neighborhood activities. The idea is to have each layer reinforce the others. Chapter 17 describes how to add security layers to your computer.

/ 194