There are two types of firewalls, there is the in-bound firewall that protects against all things that come into your computer. Then there is the two-way firewall. With this firewall it protects both inbound and outbound threats. This type is used quite often these days. Many computer only have a one-way firewall, but many of them like Zone alarm are two way firewalls. Firewalls are used to block or accept information into your computer that is not a threat. It will either send it to where it needs to be or it will block it if the potential of the file is threatening to your device.
A type of firewall is your basic McAfee, which works with Microsoft Corporation on your basic computer it is a program that is already installed into your device. It is a virus protector that works with your computers already installed firewall to keep out and potential harmful viruses or threats to your computer. You can do basic setting for the firewall or you can put it to your liking to make sure of no type of threats can enter your computer.
With the security of a computer it can get very complicating. You have to make sure you are aware of what you are using and how it operates in your system. In today’s society there are a million anti-virus software programs. Many of them have free versions and some just have trail versions you can test drive before buying the full version. McAfee and Norton have trail versions you can sample before getting the full version. With Panda, AVG, and other anti-virus programs they have a free version and full upgraded version you can use.
When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an email with a suspicious name, you click it and it automatically downloads something into your computer and you computers starts to malfunction. When it does this it is because the files that were put on your computer are basically eating up you memory.
It is extremely important to keep your computers malware and anti-virus programs up to date to prevent any type of program getting into your system.
When you back up a system you have different types of backups you can use. For instances you have your full back up which is where you can back up all your information onto a DVD-R or DVD-RW, so you can recover your system at a later time is it crashes or is lost. You should also look at your back up disks periodically to make sure they are in good form if needed to be used.
You also have your deferential back up is where you can select certain things to back up and incremental back up is where your computer sets up a certain time after you have put so much into your system to back it up for later use if needed. Checking back up disks are extremely important to check as well to make sure that they are able to be used on the future. Also it is really important to burn your files to a disk not on your hard drive in case they are lost or damaged.
Five passwords that are good to use in the way of remembering and using are, “Bab1eg1r!”, “Crazy8ight$”, “GoP!a1”, or “Playf00!” They can be used to help protect your passwords by replacing a letter by a number and capitalizing some of the other letters that you choose to use, along with using symbols of some sort. Another way of using passwords is using movie titles and shorting them to remember for instance, the day I left your mother to make our love stronger could be shortened by using the first letters of each word like this, “Tdilymtmols.” Also I can count the ways I love you, “Icctwily.” Many times the world went around, “mttwwa”.
Honey I shrunk the kids,”Histk”. I love the way you love me, “iltwylm.” Many of my passwords were very strong in the aspect of how I wrote them. Passwords are very important and they have a good use to them. To keep people out of your system and protect you information as well as identity you really need to choose wisely and carefully on what ones you use.