Personal understanding Firewall is divided into software firewall and hardware firewall.
In the case of software firewalls, there are also network firewalls and virus firewalls, among which there are mobile firewalls. We often use the software firewall brand including rising, Ice shield and so on.
On the hardware firewall I am here to quote something ready-made to illustrate the use of hardware firewalls in the network.
First of all, why should we study security?
What is "computer security"? Broadly speaking, security is about preventing others from using your computer or peripherals to do anything you don't want them to do. The first question is: "What resources are we trying to protect?" "The answer is not clear. Usually, the answer to this question is to take the necessary mainframe-specific measures. Figure 5 depicts the current network is strong.
Many people complain that Windows is too vulnerable, and some people even bother with one or another of these vulnerabilities. To this end, this article briefly introduces you how to put up the network security line of defense.
Disabling unused services
Windows offers a lot of services, but there are many that we simply can't use. You may not know yet that some services are opening the back door for those who have ulterior motives.
Windows has a number of services that are not covered here too much. We can prohibit certain services according to our actual situation. Disabling unnecessary services, in addition to reducing security risks, can also increase the speed of Windows, why not?
To play Patches
Microsoft will occasionally offer patches online free of charge and have time to play patches. In addition to enhancing compatibility, it is more important to plug the detected security vulnerabilities. Suggest the ability of a friend can according to their actual situation according to the circumstances dozen fit their own patches.
Firewall
Choose a completely isolate virus method, physical isolation fortigate can prevent more than 10 kinds of hacker attacks,
Distributed service denial of attack DDoS (distributed Denial-of-service attacks)
※syn Attack
※ICMP Flood
※UDP Flood
IP fragmentation attacks (IP fragmentation attacks)
※ping of Death attack
※tear Drop attack
※land attack
Port scan Attack (Scan attacks)