Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is Firewall? I saw in one website Firewall is software
and hardware and combination of software and hardware.It is
used to protect user information or avoiding crackers.how
it is?Whether it is hardware?If not then why the images are
like that?(a wall ).Please help me by answering this
question.Advance thanks.

Answer Posted / natraj

A firewall is a set of related programs, located at a
network gateway server, that protects the resources of a
private network from users from other networks. (The term
also implies the security policy that is used with the
programs.) An enterprise with an intranet that allows its
workers access to the wider Internet installs a firewall to
prevent outsiders from accessing its own private data
resources and for controlling what outside resources its own
users have access to.

Is This Answer Correct ?    5 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the difference between arp & rarp?

966


Why should you care about the OSI Reference Model

1014


If you need to encrypt and compress data for transmission, how would you achieve it?

1097


How does network security work?

965


How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?

2336


who is a hacker?

1027


What protocol is used by DNS name servers

1095


What is shadow it?

954


What are the types of phishing attacks?

1082


Explain the difference between discretionary access control and mandatory access control?

949


What are the data units at different layers of the TCP / IP protocol suite

1030


What is intrusion prevention systems (ips)?

983


What does cia stand for in security management?

1061


How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

936


Explain how do we use rsa for both authentication and secrecy?

996