Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker.

Dial-up may not have seemed like it could have held any advantages, but it actually did have one upside. It is much less prone to hacking. Every time you dialed-in your computer was assigned a new IP address. That unique IP address made you a moving target that was more difficult for hackers to hit.

With a high-speed connection you are assigned a static IP address (it never changes). So, your computer went from being a moving target to staying still with a bulls-eye pasted on the side. That, coupled with the fact that with a high-speed connection your computer is always online, are ideal conditions for a potential hacker attack. That seemingly beneficial always-on connection gives hackers a 24/7 open invitation to try and hack your system. Once inside they can access personal or financial details, compromise your computer's operating system, or unleash a virus, worm, or spyware.

Which Firewall is Right For You?

Now that you know how vital a firewall is to the protection of your PC you have to decide which firewall is right for you. Software or hardware.

A software firewall is designed to monitor your computers activity at all times. Think of it as a bodyguard who won't let anyone into your computer if he doesn't like the look of them. With a software firewall you may to have to assist in protecting your system. The firewall might alert you to certain activity and ask you if you want to grant or deny permission. It's just like the bodyguard that was mentioned before. He needs the okay before telling someone to scram. After you give either the thumbs up or the thumbs down the firewall will take the appropriate action and remember your reply so that you won't be asked in the future.

If you feel comfortable installing and configuring hardware, then you might want to consider a hardware firewall in the form of a Cable/DSL router. The hardware firewall handles everything on its own without any input from you and you also won't have to read any reports or make any decisions. The firewall handles everything on its own. Installation, however, can be tricky, so this option is definitely more suited to the advanced computer user.

My Firewall is Installed. Now I'm Safe, Right?

With your new firewall in place you are probably thinking that your computer is impenetrable, right? Well, maybe not. As important to the security of your system as a firewall is, some do have their limits. Most software firewalls won't scan your system for viruses that can harm your computer and there aren't any hardware firewalls on the market that offer virus protection. That means that you are still vulnerable to attack.

The best line of defense against viruses that can harm your system is anti-virus protection.You can either buy a seperate anti-virus program or shop around for a software firewall with anti-virus protection built-in. You may never be able to make your computer 100% hacker-proof, but the installation of a firewall coupled with anti-virus protection will greatly reduce your chances of becoming a hacker's next victim.

About The Author

Heather Wallace is a writer whose work has been published in national, regional, and online publications. Additionally, she has written articles as a newspaper correspondent. Visit http://www.fetchingsites.com/FreeFirewall.html to download a free firewall that is easy-to-use and will block hackers and other unknown threats.

In The News:


pen paper and inkwell


cat break through


I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More