Skip to main content

*robbery rage*

*robbery rage*   *Hamid Mir*   * We had heard a lot of stories about the amazing corruption of politicians. Yesterday afternoon we had the opportunity to hear the corruption stories of a man who, who, who, who, who, for many years, years, years, years, was both a wonder and anathema to many politicians. This person's name was Faiz Hameed.    *I thought that I knew a lot about the person, person, person, person, but yesterday I met three such personalities at a friend's place, and after listening to their conversation, I felt that Faiz Hameed is not the head of any intelligence agency but of an underworld gang from 2019 to 2021. were*   *After hearing the stories of Faiz Hameed's looting, I had to admit that there are other places beyond the stars and there are many more tests to trace Faiz's corruption.*   * A businessman present in this gathering did not say anything that was heard, but he was telling his own bait. In 2021, a false case was made against hi...

*How does a firewall control Internet traffic? know*

*How does a firewall control Internet traffic? know*

 

Testing of the firewall is ongoing in Pakistan, and the second trial of its installation was successfully completed in the past few days. 

 

A firewall is basically a computer network security system that restricts internet traffic inside or outside the boundaries of any network. 

*How does a firewall control Internet traffic? know*

 

It works by blocking or allowing system software or specific hardware data packets (traffic) at will. 

 

Its purpose is generally to help prevent malicious activity and prevent anyone inside or outside the private network from engaging in unauthorized web activities. 

 

*What is a firewall?*

Firewalls can be viewed as gated borders or gateways that control activity in a private network. 

 

The term firewall was used to refer to walls built to prevent the spread of fire. 

 

Just as a wall helps prevent and extinguish a fire, network security firewalls are for web traffic management to reduce threats. 

 

Firewalls create 'choke points' on web traffic, at which traffic is evaluated against a set of programmed parameters and acted upon. 

 

Some firewalls are also capable of tracking traffic and connections in audit logs. 

 

*How does a firewall work?*

A firewall decides what network traffic is allowed to pass and what traffic is dangerous. 

 

Basically, it works by filtering the content, or, in other words, separating the trustworthy content from the untrustworthy content. 

 

The purpose of firewalls is to secure networks and the endpoint devices within them, known as network hosts. 

 

*Types of Firewall*

Different types of firewalls include different filtering methods. 

 

Firewall types are distinguished by the way they work, such as connection tracking, filtering rules, and audit logs. 

 

*Static Packet Filtering Firewall*

 

Such a firewall is also called a stateless inspection firewall that operates at the OSI network layer (i.e., Layer 3). 

 

It offers basic filtering by examining all individual data packets sent over the network based on where that data is from and where it is trying to go. 

 

The filtering done in it is based on IP address, ports, and packet protocol; this firewall prevents at least 2 networks from directly connecting without permission. 

 

This firewall can be used on small networks but is difficult to operate on large networks. 

 

Also, this firewall fails to read the application protocol, which means that the message content sent inside the packet cannot be read by this firewall. 

 

Due to this weakness, this type of firewall is not considered very strong. 

 

*Circuit Level Gateway Firewall*

This firewall works at the session level (Layer 5). 

 

These firewalls examine the functional packets in the connection and allow a permanent open connection between the two networks when it is working properly. 

 

After this happens, the firewall stops monitoring the connection, which may later allow something malicious to enter unhindered. 

 

*Stateful Inspection Firewall*

This firewall, also known as a dynamic packet filtering firewall, is unique in its ability to monitor ongoing connections as well as store and remember past connections. 

 

It began by operating at the communication layer (Layer 4), but today such firewalls can monitor multiple layers, including application Layer 7. 

 

Layer 7 means that it can analyze and filter traffic based on specific applications rather than just looking at the source of the message and the destination IP address and port. 

 

This firewall updates the filtering rules based on the login history in the state table by the screening router. 

 

Filtering decisions are often based on administrator rules when setting up computers and firewalls in general, but the state table allows these dynamic firewalls to make their own decisions. 

 

For example, traffic types that caused problems in the past can be filtered out in the future. 

 

*Proxy Firewall*

Proxy firewalls, also known as application-level firewalls (Layer 7), feature reading and filtering of application protocols. 

 

It combines application-level inspection, or 'deep packet inspection (DPI),' and stateful inspection. 

 

Unlike other types of firewalls, it acts as a separate agent (or proxy) between external networks and internal computers. 

 

A proxy firewall is like a real physical barrier; that is, it acts as a guard at the gate to watch and evaluate incoming data, allowing the data to pass through to the user if no problems are detected. is

 

The downside of this type of heavy security is that it sometimes interferes with incoming data that poses no threat, causing network disruptions. 

 

*Next Generation Firewall (NGFW)*

Evolving threats demand new solutions, and these firewalls stay on top by combining traditional firewall features with network intrusion prevention systems. 

 

*Hybrid Firewall*

As the name implies, hybrid firewalls use two or more firewalls together in a private network. 

 

*Firewall Example and Key Events*

Real-world applications of firewalls in practice have attracted both praise and controversy. 

 

Although firewalls have a long history of success, this type of security must be properly implemented to prevent exploitation. 

 

Also, firewalls have been known to be utilized in morally sketchy ways.

 

*China's Great Firewall and Internet Censorship*

Since 2000, China has built an internal firewall framework for the Internet in the country. 

 

China's firewall system allows its government to restrict Internet services to local companies, making it much easier to control things like search engines and email services. 

 

*US Federal Agency*

In 2020, a misconfigured firewall security led to a cyber attack on the network of a US federal agency. 

 

*American Powerhouse*

 

In 2019, a US power network was impacted by a Disavowal of Administration (DoS) weakness that was taken advantage of by programmers.

 

*Firewalls on the border network* were trapped in a reboot circle for around ten hours after not being set in stone to be the consequence of a shortcoming in the firewalls.

 

These occurrences feature the significance of normal programming refreshes.

 

Without it, a firewall is a network security system whose vulnerability can be harmful. 

Comments

Popular posts from this blog

destiny

It is important to meet what is written in fate, however "petitions to heaven are just for the unimaginable, for the people who are not piece of your "predetermination", That's what you say... When it isn't in fate, why would it be a good idea for me to implore? How about you feel that the "Provider is predetermination" and is a lot greater than your whispers..!! Do you have any idea that piece of "Allah predetermined" is deficient hence? That you will occupy this vacant space with your "requests" as per your will? Do you have any idea that it is your predetermination that you have lost courage....He tests your confidence by spending patience.... He doesn't rebuff you, He just tests you to carry you nearer to Him...and you realize that the translation of your fantasies is composed by your requests and the "lifting of your hands before Allah" changes your "fate". Is... To be sure, Allah is equipped for everythi...

Why such a cruel discipline for infidelity?

 Why such a cruel discipline for infidelity? Ordinarily the inquiry emerges in the psyche that why just the discipline for infidelity is so serious in Shariat. At the point when we went to the Qur'an, it was found that where just the right of Allah is concerned, then, at that point, Allah embraces a mentality of mercy, and where the right of a worker is joined with the right of Allah, then, at that point, Allah takes severity. The casualties of the infidelity of two individuals are not two people, two families, two countries, two gatherings or two clans, however the whole Ummah. The discipline for infidelity has likewise expanded in seriousness that being done covertly yet in public isn't. Furthermore, every stone will make an injury on the body until the spirit passes on. The insight in this is that similarly as each tissue of his body partook in the demonstration of this transgression, so presently demise additionally happens second by second and second by second desolation. ...

*A school teacher writes*

 *A school teacher writes* It has been quite a while that when I was serving at Liaquat Clinical Hotel in Jamshoro, the young men coordinated a gathering on the Prophet's story and welcomed every one of the educators. So I went to this gathering alongside Dr. Inayatullah Jokhio (a muscular subject matter expert). In this meeting, a speaker of Islam gave a point by point record of the confidential existence of the Sacred Prophet (harmony and gifts of Allah arrive) and made sense of the subtleties of every one of his relationships, why he did this marriage and how it helped the Ummah. This assertion was powerful to the point that the crowd felt a debt of gratitude a ton. Toward the finish of the gathering, when the two of us were coming from Jamshoro to Hyderabad via vehicle, Dr. Inayatullah Jokhio offered something bizarre... He said that This evening I turned into a Muslim once more At the point when I requested subtleties, he said that when he went to Britain for FRCS quite a whil...