Skip to main content

*robbery rage*

*robbery rage*   *Hamid Mir*   * We had heard a lot of stories about the amazing corruption of politicians. Yesterday afternoon we had the opportunity to hear the corruption stories of a man who, who, who, who, who, for many years, years, years, years, was both a wonder and anathema to many politicians. This person's name was Faiz Hameed.    *I thought that I knew a lot about the person, person, person, person, but yesterday I met three such personalities at a friend's place, and after listening to their conversation, I felt that Faiz Hameed is not the head of any intelligence agency but of an underworld gang from 2019 to 2021. were*   *After hearing the stories of Faiz Hameed's looting, I had to admit that there are other places beyond the stars and there are many more tests to trace Faiz's corruption.*   * A businessman present in this gathering did not say anything that was heard, but he was telling his own bait. In 2021, a false case was made against hi...

*How does a firewall control Internet traffic? know*

*How does a firewall control Internet traffic? know*

 

Testing of the firewall is ongoing in Pakistan, and the second trial of its installation was successfully completed in the past few days. 

 

A firewall is basically a computer network security system that restricts internet traffic inside or outside the boundaries of any network. 

*How does a firewall control Internet traffic? know*

 

It works by blocking or allowing system software or specific hardware data packets (traffic) at will. 

 

Its purpose is generally to help prevent malicious activity and prevent anyone inside or outside the private network from engaging in unauthorized web activities. 

 

*What is a firewall?*

Firewalls can be viewed as gated borders or gateways that control activity in a private network. 

 

The term firewall was used to refer to walls built to prevent the spread of fire. 

 

Just as a wall helps prevent and extinguish a fire, network security firewalls are for web traffic management to reduce threats. 

 

Firewalls create 'choke points' on web traffic, at which traffic is evaluated against a set of programmed parameters and acted upon. 

 

Some firewalls are also capable of tracking traffic and connections in audit logs. 

 

*How does a firewall work?*

A firewall decides what network traffic is allowed to pass and what traffic is dangerous. 

 

Basically, it works by filtering the content, or, in other words, separating the trustworthy content from the untrustworthy content. 

 

The purpose of firewalls is to secure networks and the endpoint devices within them, known as network hosts. 

 

*Types of Firewall*

Different types of firewalls include different filtering methods. 

 

Firewall types are distinguished by the way they work, such as connection tracking, filtering rules, and audit logs. 

 

*Static Packet Filtering Firewall*

 

Such a firewall is also called a stateless inspection firewall that operates at the OSI network layer (i.e., Layer 3). 

 

It offers basic filtering by examining all individual data packets sent over the network based on where that data is from and where it is trying to go. 

 

The filtering done in it is based on IP address, ports, and packet protocol; this firewall prevents at least 2 networks from directly connecting without permission. 

 

This firewall can be used on small networks but is difficult to operate on large networks. 

 

Also, this firewall fails to read the application protocol, which means that the message content sent inside the packet cannot be read by this firewall. 

 

Due to this weakness, this type of firewall is not considered very strong. 

 

*Circuit Level Gateway Firewall*

This firewall works at the session level (Layer 5). 

 

These firewalls examine the functional packets in the connection and allow a permanent open connection between the two networks when it is working properly. 

 

After this happens, the firewall stops monitoring the connection, which may later allow something malicious to enter unhindered. 

 

*Stateful Inspection Firewall*

This firewall, also known as a dynamic packet filtering firewall, is unique in its ability to monitor ongoing connections as well as store and remember past connections. 

 

It began by operating at the communication layer (Layer 4), but today such firewalls can monitor multiple layers, including application Layer 7. 

 

Layer 7 means that it can analyze and filter traffic based on specific applications rather than just looking at the source of the message and the destination IP address and port. 

 

This firewall updates the filtering rules based on the login history in the state table by the screening router. 

 

Filtering decisions are often based on administrator rules when setting up computers and firewalls in general, but the state table allows these dynamic firewalls to make their own decisions. 

 

For example, traffic types that caused problems in the past can be filtered out in the future. 

 

*Proxy Firewall*

Proxy firewalls, also known as application-level firewalls (Layer 7), feature reading and filtering of application protocols. 

 

It combines application-level inspection, or 'deep packet inspection (DPI),' and stateful inspection. 

 

Unlike other types of firewalls, it acts as a separate agent (or proxy) between external networks and internal computers. 

 

A proxy firewall is like a real physical barrier; that is, it acts as a guard at the gate to watch and evaluate incoming data, allowing the data to pass through to the user if no problems are detected. is

 

The downside of this type of heavy security is that it sometimes interferes with incoming data that poses no threat, causing network disruptions. 

 

*Next Generation Firewall (NGFW)*

Evolving threats demand new solutions, and these firewalls stay on top by combining traditional firewall features with network intrusion prevention systems. 

 

*Hybrid Firewall*

As the name implies, hybrid firewalls use two or more firewalls together in a private network. 

 

*Firewall Example and Key Events*

Real-world applications of firewalls in practice have attracted both praise and controversy. 

 

Although firewalls have a long history of success, this type of security must be properly implemented to prevent exploitation. 

 

Also, firewalls have been known to be utilized in morally sketchy ways.

 

*China's Great Firewall and Internet Censorship*

Since 2000, China has built an internal firewall framework for the Internet in the country. 

 

China's firewall system allows its government to restrict Internet services to local companies, making it much easier to control things like search engines and email services. 

 

*US Federal Agency*

In 2020, a misconfigured firewall security led to a cyber attack on the network of a US federal agency. 

 

*American Powerhouse*

 

In 2019, a US power network was impacted by a Disavowal of Administration (DoS) weakness that was taken advantage of by programmers.

 

*Firewalls on the border network* were trapped in a reboot circle for around ten hours after not being set in stone to be the consequence of a shortcoming in the firewalls.

 

These occurrences feature the significance of normal programming refreshes.

 

Without it, a firewall is a network security system whose vulnerability can be harmful. 

Comments

Popular posts from this blog

Logic

 – Logic There are two types of logic, formal logic and informal logic. In this article, we will look at formal logic in more detail, so there are many types of formal logic, but among them there are three most important types that cover the rest to a great extent, they are; 1) Deductive logic 2) Inductive Logic 3) Abductive Logic 1) Deductive logic In deductive reasoning we always derive something new from something we already know. Deductive reasoning (if done correctly) is guaranteed to be 100% correct.  – Types of deductive logic (Tips of Inductive Logic) 1) Categorical syllogism Argument in deductive logic is also done in a way that we call categorical syllogism. It has a Major Premise which is a statement that holds for everything. That is, there is a general statement and a minor premise that is only about something specific. And there is a middle term that connects the two but is not present in the result. An example of deductive logic reasoning would be something like...

The design of the sky and the depiction of the Qur'an

 The design of the sky and the depiction of the Qur'an Allah expresses plainly in the Qur'an that We made the sky a rooftop and the earth a story The whole ground under our feet is a story and on the off chance that we utilize our insight, no floor is round, it is in every case level. The Quran is a book of direction, not a book of science. Each stanza of the Quran is an aide. On the off chance that every one of the sections of the Qur'an are caught up in our psyches, the construction of the earth and the sky outsideWe should explore anything hypotheses and realities are being expressed about it. Presently, since the sets of Allah are not been aware of the construction of the earth and the sky, we are misdirected by current logical hypotheses and when the whole strict tip top likewise On the off chance that an everyday person takes part in this trickery, it is extremely challenging to escape from this deceptionIt becomes troublesome. For what reason does the strict tip top ...

*The tale of Libya- - - - - - * *May God not let this happen here*,

 *The tale of Libya- - - - - - * *May God not let this happen here* Right from the start, the power went off, the public framework stumbled, and around 50% of the nation was dove into dimness, individuals had to run individual generators, and on the subsequent day, the circumstance deteriorated. "TV, radio and the Web were likewise answered and the distribution of papers was additionally stopped."Due to the absence of power, the water and sewage frameworks in the city likewise halted. The water ran out in the houses and individuals began strolling in the roads with containers. Petroleum siphons were additionally shut on the third day. The inventory of petroleum was cut off. Around the same time, the police, officers and mystery administration authorities additionally left their obligation and left for their particular homes. They likewise took weapons with them. The other weapons were caught by going after the police headquarters' on the fourth day close to BenghaziThe ca...