Member Center:
Newschannel 10 home NewsChannel 10 Too Telemundo Connections: Expert Health Homelinks Best FB Links

Benefits of a Firewall Amarillo TX

A solid firewall will help you stop intruders from accessing your system in Amarillo. You keep your Internet link to the outside world but the outside world can't view you unless you want them to. With a firewall in place you will still have typical email access, but chat and other interactive programs will require you to take an extra step to grant access before you can use them.

OfficeMax
(806) 352-6197
2912 Soncy Road
Amarillo, TX
Hours
M-F 8-9, Sa 9-7, Su 11-6*

InterPlan Systems Inc
(281) 482-7126
Houston, TX
Services
Management Consultants, Computer Software, Project Management

Data Provided by:
Affordable Computer Service
(972) 866-0188
9450 Skillman Street # 122
Dallas, TX
Services
Computers and Equipment Repair and Maintenance, Computer and Equipment Dealers, Computer Software, Computer Networks, Computer Systems Consultants and Designers
Hours
Mon-Sat: 08:00am-05:30am

Data Provided by:
Hardware House
(214) 665-4400
1875 Laws Street
Dallas, TX
Services
Help Desk Services, Computer Software

Data Provided by:
Hedge Advanced Systems
(254) 848-5559
Waco, TX
Services
Computers and Equipment Repair and Maintenance, Computer Software, Computer Systems Consultants and Designers

Data Provided by:
Linchping Network Solutions
(210) 228-9494
816 Camaron Street
San Antonio, TX
Services
Computer Software, Computer Network Hardware, Computer Networks

Data Provided by:
Gtech Inc
(806) 934-9370
Dumas, TX
Services
Fasteners, Computer Software, Environmental Equipment and Supplies

Data Provided by:
Intetech Systems Inc
(254) 881-7100
1045 Peevey Lane
Waco, TX
Services
Computer Software, Computer Network Hardware, Computer Networks

Data Provided by:
Com Tech
(409) 985-8000
1914 9th Ave Ste B
Port Arthur, TX
Services
Computers and Equipment Repair and Maintenance, Computer and Equipment Dealers, Computer Hardware and Supplies, Computer Software, Computer Networks
Hours
9 To 7 7 Days
Payment Options
Cash Check Credit

Data Provided by:
Isis Papyrus America Inc
(817) 416-2345
301 Bank Street
Southlake, TX
Services
Software Design and Development, Computer Software, Computer Systems Consultants and Designers

Data Provided by:
Data Provided by:

Benefits of a Firewall

Provided by:

When you leave your home or car for a period of time, do you lock your doors? Of course. Doing so gives you a sense of security-your property won't be an easy mark for thieves.

The same is necessary for your computer; your Internet connection leaves you vulnerable to hackers who want to access your financial and personal information. Some hackers may be after your high-speed connection so that they can send malicious viruses and worms, blackening your reputation. Other intruders have the power to destroy your operating system on a whim. How can you lock that computer door but still have the freedom to do your business online?

A solid firewall will help you stop intruders from accessing your system. You keep your Internet link to the outside world but the outside world can't view you unless you want them to. With a firewall in place you will still have typical email access, but chat and other interactive programs will require you to take an extra step to grant access before you can use them. A firewall is powerful, but unobtrusive-just like a deadbolt lock inside a door.

But unlike a single door to a home, the path to your computer data has two doorways. Some of your data is stored on a physical media storage device such as a hard drive, optical disk, thumb drive, or some other form of media. The other method is your computer memory. An open door on either of these storage methods leaves your network and your data vulnerable.

Some of the most common methods to attack or view computer data include:

  • IP spoofing - This form of attack occurs when someone outside your network spoofs (fools) your computer into recognizing the intruder as a trusted source-either a trusted internal source (by using an IP address that is within the range of IP addresses in your network) or a trusted external IP address that your system recognizes. This is like a stranger knocking on your door, claiming to be your long lost Uncle Joe. An IP address is like the computer's name, giving a computer a specific identity that other computers come to recognize.

    IP spoofing only works when a hacker learns your IP address. The hacker then modifies the packet headers on his communications to your computer. A packet header is present in any transfer of computer data and is similar to a routing number on a check-the header guides the packet of data on its journey just as a routing number guides a check.

  • Network Packet Sniffers - Windows NT sends network packets as unprotected clear text, inadvertently allowing anyone to pick packets up en route for a closer look. Even though some packet sniffers are legitimate (for network management) others are used to steal your information while in transit. This method is a hacker favorite because it's easier to pull off, harder to get caught.
  • Man-in-the-Middle Attacks - This type of an attack occurs when someone accesses information between two individuals without either one detecting the infiltrator's presence. If both parties are using a public-key system to send data, the man-in-the-middle can intercept the public-key, use it to decipher the message, copy it, then recode the data again to continue sending it on its way.
  • Distribution of Sensitive Internal Information to External Sources - This form of an attack could involve a disgruntled employee or someone who has or once had access to sensitive corporate information. The individual could place the sensitive data on an external computer (such as an external FTP server or share a drive on a network) so others can have full access.
  • Password Attacks - Passwords are the most vulnerable to attack. Once someone has access to a user's password, the attackers will then have the key to personal information. There are several ways an attacker can steal passwords. The most common are:
    • Password Guessing - This technique is often ineffective because it takes a long time to guess someone's password, even if the password is a common one. Attackers can either enter guesses manually or electronically.

      Brute-Force Logon - This technique is essentially the same as password guessing, however, the attacker tries to quickly gain access to a user's username and password by using guessing tools to automate the process.

      Password Cracking - This technique is more effective than the previous techniques. Password Cracking software obtains the password file in Windows through an elevated level of access, then using a tool like PWDUMP to view the password data you've saved in a file.

Click to read more from TopTenReviews.com