The XP Firewall Isnt Enough


You might think you don't need a firewall because windows XP has one built in, but read on for a plain-english explanation why this isn't enough.

Before broadband and cable connections were common most people didn't need a personal firewall because they weren't connected to the Internet for extended periods of time.

Every computer that connects to the internet has an IP address. This is like a sort of phone number, and is issued either to an individual computer or to a "gateway" that connects a private network to the 'net.

Domestic dial-up internet connections normally use a system called Dynamic IP Addressing where people are issued with a sort of "new identity" every time they connect, so it's difficult to find and attack an individual computer - Dynamic IP addressing is a bit like having your phone number change every time you use the phone, which makes it difficult for the bad guys to find you.

But the longer you keep a particular "phone number" the more chance there is of someone finding you and that is why high-speed always-on connections need handling with care.

In particular, with "always on" DSL and cable connections you are connected for extended periods of time which give the attackers more chance of finding you if you've got an unprotected connection.

In these days of identity theft and with more and more security holes being uncovered in commercial software it is vital that you have a good firewall if you use a high-speed connection.

You may already have a firewall, either in a device called a "Broadband Router" which goes between your computer and the Internet or the very basic firewall built in to Windows XP Service Pack 2 and you might think that's all you need.

But there's another reason that you won't have thought of.

Basic firewalls will tell you, and hopefully protect you if someone is trying to get in.... but they won't tell you if something is trying to get out!

That's right! Certain spyware and viruses can gather your personal information and send it out of your machine without you knowing.

A good firewall will spot these attempts to send stuff out and will warn you, quite possibly before your Antivirus or Spyware application notices the problem. Which gives you time to get the problem fixed.

Steve Blampied lives in Jersey in the Channel Islands and has been an independent IT consultant for around 10 years.

He is currently putting together a web site solely about free software.

http://www.freesoftwareadvice.com

He also has a small IT company in Jersey.

http://www.freesoftwareadvice.com

shuttle from Midway Glen Ellyn ..
In The News:

Technology expert Kim Komando gives her tips and tricks on enhancing your user experience a smartphone and other devices you use everyday.
A new camera called NUCA uses artificial intelligence to create deepfake photos of subjects by stripping away clothing in close to real time.
The Kimberley Kube trail-ready camper has a compact but spacious design and combines luxury, functionality and ruggedness for a weekend getaway.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Emails instructing you to reset your password for an account may be legitimate, or they may be scams. Kurt "CyberGuy" Knutsson explains.
Northrop Grumman's Manta Ray uncrewed underwater vehicle aims to revolutionize undersea missions — it glides through the ocean without human assistance.
Learn how to work Google's calendar application to streamline and organize your daily tasks from technology expert Kim Komando.
If you do not want Facebook to have automatic access to your private photos, follow our tips to protect yourself. Kurt “CyberGuy" Knutsson shows you how.
Kurt “CyberGuy" Knutsson goes into detail about Apple’s recent iOS update that allows iPhone users to instantly translate spoken language simply by using the Action Button.
Safeguarding your digital life with a reliable physical backup isn't just a precaution, it's a necessity. Kurt “CyberGuy" Knutsson provides the essential backup checklist.
Kurt “CyberGuy" Knutsson reveals how a Redditor exposed false recycling claims at their apartment, highlighting a report that only 21% of U.S. recyclables are processed.
Kurt "CyberGuy" Knutsson offers a travel toolkit featuring five technology tools to help you with booking flights and hotels for your summer vacation.
The bubble behind the clock on your iPhone can appear in different colors. Kurt "CyberGuy" Knutsson explains what each of those colors mean.
Scammers are using the power of artificial intelligence to mimic voices of people and are using the fake voices to commit crimes, like kidnappings.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tech guru Kurt "CyberGuy" Knutsson explains the science behind the Invisibility Shield, a 6-foot shield that makes people become invisible.
The International Olympic Committee on Friday announced plans to use AI in various Olympic aspects, including athlete identification, training and judging.
Tech guru Kurt "CyberGuy" Knutsson explains an easy trick to avoid squinting while working or surfing the web by zooming in on your personal computer.
Streaming giant Roku has recently been targeted by a pair of cyberattacks, and the company confirmed over a half million Roku accounts were compromised.
The Land Aircraft Carrier combines an all-terrain, six-wheeled vehicle with a two-seat aircraft, which features electric vertical takeoff and landing.
The European Union has sent TikTok a "request for information" on the video sharing platform's newest app, TikTok Lite, under the Digital Services Act, with the aim to clean up social media.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The FBI is warning the public about a recent phishing scam via text that claims its targets owe money in Pennsylvania for unpaid road toll charges.
Your Apple Music settings may be revealing to your contacts what you're listening to. Kurt "CyberGuy" Knutsson explains the process to change those settings.
Learn how to secure social media accounts, implement legacy contacts, and create a digital estate plan to protect your online assets from 'ghost hackers' after your death.

Navision Attain C/ODBC Crystal Report ? Customization Example

Microsoft Business Solutions Navision is main ERP application for European,... Read More

Increase Office Efficiency With One Simple Tool

When you need a phone number, you do a quick... Read More

Microsoft CRM Integration with Lotus Notes Domino: Messaging Connector ? Future Directions

IBM Lotus Notes Domino and Microsoft CRM (Client Relation Management)... Read More

Microsoft Great Plains Customization Recovery & Upgrade for Large Corporation

At the end of XX century, in the late 1990th... Read More

Quick Summary of Basic and Common Linux Commands

There are many commands that are used in linux on... Read More

5 Time-Saving Tips in Microsoft Word

Whether you have used Microsoft Word for years, have just... Read More

Best Spyware Removers

Finding the best spyware removers to detect and remove spyware... Read More

Business Planning Software

Once a business idea is selected, it is highly recommended... Read More

Software Companies: Generate New Revenue Streams and Decrease Costs with Custom e-Learning Content

It's no secret that software companies operate in a very... Read More

Troubleshoot Windows with Task Manager

Task Manager is a Windows system utility that displays thetasks... Read More

Implementing ERP for Large Publicly Traded Corporation ? Microsoft Great Plains

We would like first emphasize the change in the paradigm.... Read More

Microsoft Moves to Small Business Accounting/Retail Market ? Stakes and Thoughts

In this small article we will be looking at the... Read More

Microsoft Great Plains Upgrade ? Things to Consider and FAQ

If you have Microsoft Great Plains and support it for... Read More

ERP Remote Support: Microsoft Great Plains Analysis ? Pluses & Minuses

Former Great Plains Software Dynamics/eEnterprise and currently Microsoft Business Solutions... Read More

Does Microsoft have any real competition?

Does Microsoft Have any Real Competition? Copyright (c) 2003 Gregory... Read More

Microsoft CRM: Data Conversion ? Import from Act!

Best Software Act! is very popular CRM for small and... Read More

Pros and Cons of Using FREE Software in Your Business

It???s easy to understand why you might be drawn to... Read More

Constructionalist Parsing - Deciphering Natural Language

The research in the field of Natural Language Processing usually... Read More

Spyware: What It Is and How to Combat It

Spyware is software or hardware installed on a computer without... Read More

C++ Tutorial 1, Introduction to C++

Introduction to C++Why Learn C++?C++ may at first seem like... Read More

DVD Burning Tips

CD and DVD replication is a process that works by... Read More

Great Plains Custom Development: Dexterity, VBA, SQL, Crystal, eConnect ? Overview For Programmer

Microsoft Great Plains is main Microsoft Business Solutions accounting package... Read More

Microsoft CRM Data Conversion FAQ

Microsoft Business Solutions CRM data conversion deserves FAQ type of... Read More

The Truth: Netzero 3G

We've all seen the ads on TV for Netzero 3G.... Read More

Internet Faxing Service Review

The Internet is reshaping every form of communications medium, and... Read More

shuttle from O'Hare North Chicago ..