Skip to main content

*robbery rage*

*robbery rage*   *Hamid Mir*   * We had heard a lot of stories about the amazing corruption of politicians. Yesterday afternoon we had the opportunity to hear the corruption stories of a man who, who, who, who, who, for many years, years, years, years, was both a wonder and anathema to many politicians. This person's name was Faiz Hameed.    *I thought that I knew a lot about the person, person, person, person, but yesterday I met three such personalities at a friend's place, and after listening to their conversation, I felt that Faiz Hameed is not the head of any intelligence agency but of an underworld gang from 2019 to 2021. were*   *After hearing the stories of Faiz Hameed's looting, I had to admit that there are other places beyond the stars and there are many more tests to trace Faiz's corruption.*   * A businessman present in this gathering did not say anything that was heard, but he was telling his own bait. In 2021, a false case was made against him,him,him,him

*How does a firewall control Internet traffic? know*

*How does a firewall control Internet traffic? know*

 

Testing of the firewall is ongoing in Pakistan, and the second trial of its installation was successfully completed in the past few days. 

 

A firewall is basically a computer network security system that restricts internet traffic inside or outside the boundaries of any network. 

*How does a firewall control Internet traffic? know*

 

It works by blocking or allowing system software or specific hardware data packets (traffic) at will. 

 

Its purpose is generally to help prevent malicious activity and prevent anyone inside or outside the private network from engaging in unauthorized web activities. 

 

*What is a firewall?*

Firewalls can be viewed as gated borders or gateways that control activity in a private network. 

 

The term firewall was used to refer to walls built to prevent the spread of fire. 

 

Just as a wall helps prevent and extinguish a fire, network security firewalls are for web traffic management to reduce threats. 

 

Firewalls create 'choke points' on web traffic, at which traffic is evaluated against a set of programmed parameters and acted upon. 

 

Some firewalls are also capable of tracking traffic and connections in audit logs. 

 

*How does a firewall work?*

A firewall decides what network traffic is allowed to pass and what traffic is dangerous. 

 

Basically, it works by filtering the content, or, in other words, separating the trustworthy content from the untrustworthy content. 

 

The purpose of firewalls is to secure networks and the endpoint devices within them, known as network hosts. 

 

*Types of Firewall*

Different types of firewalls include different filtering methods. 

 

Firewall types are distinguished by the way they work, such as connection tracking, filtering rules, and audit logs. 

 

*Static Packet Filtering Firewall*

 

Such a firewall is also called a stateless inspection firewall that operates at the OSI network layer (i.e., Layer 3). 

 

It offers basic filtering by examining all individual data packets sent over the network based on where that data is from and where it is trying to go. 

 

The filtering done in it is based on IP address, ports, and packet protocol; this firewall prevents at least 2 networks from directly connecting without permission. 

 

This firewall can be used on small networks but is difficult to operate on large networks. 

 

Also, this firewall fails to read the application protocol, which means that the message content sent inside the packet cannot be read by this firewall. 

 

Due to this weakness, this type of firewall is not considered very strong. 

 

*Circuit Level Gateway Firewall*

This firewall works at the session level (Layer 5). 

 

These firewalls examine the functional packets in the connection and allow a permanent open connection between the two networks when it is working properly. 

 

After this happens, the firewall stops monitoring the connection, which may later allow something malicious to enter unhindered. 

 

*Stateful Inspection Firewall*

This firewall, also known as a dynamic packet filtering firewall, is unique in its ability to monitor ongoing connections as well as store and remember past connections. 

 

It began by operating at the communication layer (Layer 4), but today such firewalls can monitor multiple layers, including application Layer 7. 

 

Layer 7 means that it can analyze and filter traffic based on specific applications rather than just looking at the source of the message and the destination IP address and port. 

 

This firewall updates the filtering rules based on the login history in the state table by the screening router. 

 

Filtering decisions are often based on administrator rules when setting up computers and firewalls in general, but the state table allows these dynamic firewalls to make their own decisions. 

 

For example, traffic types that caused problems in the past can be filtered out in the future. 

 

*Proxy Firewall*

Proxy firewalls, also known as application-level firewalls (Layer 7), feature reading and filtering of application protocols. 

 

It combines application-level inspection, or 'deep packet inspection (DPI),' and stateful inspection. 

 

Unlike other types of firewalls, it acts as a separate agent (or proxy) between external networks and internal computers. 

 

A proxy firewall is like a real physical barrier; that is, it acts as a guard at the gate to watch and evaluate incoming data, allowing the data to pass through to the user if no problems are detected. is

 

The downside of this type of heavy security is that it sometimes interferes with incoming data that poses no threat, causing network disruptions. 

 

*Next Generation Firewall (NGFW)*

Evolving threats demand new solutions, and these firewalls stay on top by combining traditional firewall features with network intrusion prevention systems. 

 

*Hybrid Firewall*

As the name implies, hybrid firewalls use two or more firewalls together in a private network. 

 

*Firewall Example and Key Events*

Real-world applications of firewalls in practice have attracted both praise and controversy. 

 

Although firewalls have a long history of success, this type of security must be properly implemented to prevent exploitation. 

 

Also, firewalls have been known to be utilized in morally sketchy ways.

 

*China's Great Firewall and Internet Censorship*

Since 2000, China has built an internal firewall framework for the Internet in the country. 

 

China's firewall system allows its government to restrict Internet services to local companies, making it much easier to control things like search engines and email services. 

 

*US Federal Agency*

In 2020, a misconfigured firewall security led to a cyber attack on the network of a US federal agency. 

 

*American Powerhouse*

 

In 2019, a US power network was impacted by a Disavowal of Administration (DoS) weakness that was taken advantage of by programmers.

 

*Firewalls on the border network* were trapped in a reboot circle for around ten hours after not being set in stone to be the consequence of a shortcoming in the firewalls.

 

These occurrences feature the significance of normal programming refreshes.

 

Without it, a firewall is a network security system whose vulnerability can be harmful. 

Comments

Popular posts from this blog

*When do your organs get scared..??*

 *When do your organs get scared..??* 1. Stomach It's terrifying when you don't eat in the first part of the day. 2. *Kidneys* get terrified when you don't hydrate in 24 hours. 3. *Gall bladder* is upset when you don't rest till 11 pm and don't awaken before dawn. 4. Small digestive tracts feel torment when you drink cold beverages and eat lifeless food. 5. *Large intestine* gets terrified while eating a lot of seared or hot food. 6. *Lungs* feel truly awkward when you take in air contaminated by smoke, dust, or cigarettes. 7. Liver is frightened when you eat weighty seafood and cheap food. 8. *Heart* feels a ton of torment when you eat high-salt and cholesterol food. 9. *Pancreas* Pancreas is exceptionally apprehensive when you eat a great deal of desserts. 10. *Eyes* get drained while working in obscurity on mobiles and PCs in their brilliant light. 11. The mind is extremely miserable when you think negatively. Deal with your body parts and don't t

The absolute most significant trees among the earliest fruiting trees are:*

The absolute most significant trees among the earliest fruiting trees are:* 🌴🌳🌲☘️🌵 1. *#Papaya (#Papaya):* The papaya tree, for the most part, begins proving to be fruitful in one year or less. It develops rapidly and can be developed without any problem. 2. *#Banana (#Banana):* The banana plant additionally develops quickly and, as a rule, begins proving to be fruitful in 12 years and a half. 3. *#Guava:* A guava tree ordinarily begins proving to be fruitful within 2–3 years. This tree proves to be fruitful even absent a lot of support. 4. *#Lemon (#Lemon):* A lemon tree, as a rule, begins proving to be fruitful inside 1-2 years. This tree is not difficult to develop and requires little support. 5. *#Jamun (Java Plum or #Jamun):* The Jamun tree starts to prove to be fruitful in 2-3 years, and its natural products are heavenly and nutritious. 6. *#Aam (#Mango):** A mango tree begins proving to be fruitful in 3-4 years, particularly in the event that very much liked. These trees bea