Skip to main content

 

Data security week 6 blog


Configuration of firewall and I had to keep your device safe using firewall

There are many firewalls out there some that may cost money and some that are free today we're going to focus on zone alarm firewall. In this example I'll be using the free trial package for zone alarm usually zone alarm does have  annual costs fee for £54.95. Zone Alarm protect home users and small businesses from emerging cyber threats with the same next-generation technology trusted by the world’s largest companies, tailored to your needs. The ZoneAlarm Firewall protects your computer from most of those threats. It defines three security zones Trusted, Public, and Blocked.

By default, the Public Zone works in High security mode, and the Trusted Zone works in Medium security mode:

High security mode for Public Zone lets you connect to network resources but prevents other unauthorized network users and computers from accessing the resources on your computer and compromising your computer protection. Unknown networks and most wireless networks, even secured wireless networks, should be in this High security Public Zone.

Medium security mode for Trusted Zone protects your computer from possible attacks on Windows networking services, but lets you share resources with other computers on the network. Networks you know and trust, such as your home or business LAN and known protected wireless networks, should go in this Medium security Trusted Zone.

Blocked Zone - contains computers and networks you distrust. No traffic to or from this zone is allowed.

The ZoneAlarm Firewall is on by default as soon you as install ZoneAlarm software. You do not need to do anything, unless you want to change the default configuration, or to turn it off temporarily. To learn how to change the default Firewall configuration, see Managing Basic Firewall Zone Settings.

 

Your firewall whitelist contains people, sites or networks you allow access to your computer or you want your computer to access. The opposite of whitelists are blacklists. You blacklist or deny access to services you don't want such as sites that might try to add spyware to your computer.

Firewall Configuration

 

Step 1

Once you have opened the ZoneAlarm programme you will see a list of options similar to below:

Click Antivirus & Firewall to have access to the Firewall.




 

Step 2

Click Advance Firewall or View Zones to set up the Whitelist.





Step 3

When the Whitelist is open click add to insert the IP you want to trust or not.




Step 4

Click IP address.










Step 5

I will show an example of IP address Will react when the zone is on trusted.



Step 6

The result shows when IP address is trusted the website will work.



Step 7


Let's see what happens when I said the zone too blocked, I am going to use the same steps. First I'm going to add another IP address.



Step 8

now I am going to try to block YouTube let's see the results as you can see I have set the zone to blocked and I've entered the IP address of YouTube and then I'm going to click OK.



Step 9


now you can see You Tube has been blocked when I entered IP address 216.58. 213.14



 



Comments

Popular posts from this blog

VADDAL RILEY HOME WORKOUT IN LOCKDOWN!!!

Viddal Riley is a up and coming boxer, he has had 4 professional fight and has won all 4 fights, he also fought in the under card of  Manny Pacquiao in Las Vagas on the 28/02/2020 leading the only KO of that night. Viddal also has a Youtube  channel where he posts quite frequently. He post about Boxing, Coaching, Music and challenges if you want to check it out here it is  https://www.youtube.com/channel/UC9BaJIXnYSyYalbCVfZTZ4A . He has put out a video on a home work out that you can do in the lock down here it is -- Warm up -- 5 mins Skipping at your own level Double jump skipping High knees skipping Ground work -- Sit ups -- x12 Dorsal Raise -- x12 Pike Sit Ups -- x12 Bur-pee Stand Ups -- x12 Thumb Touching Push Ups -- x12 Pike Sit Ups Alternative Legs -- x12  Squat Thrust -- x12 Abdominal Hold -- 25 secs Bur-pee Jumps -- x12 Finger Tip Push Ups -- x12 Elbow To Knee Sit Ups -- x12  Rest Warn Down Done! Here is the link if you need a demonstration :--   h
  Password policies and importance of data Encryption. what is a password? A password is a secret word or phrase that must be used to gain admission to a place. A Password is a word, phrase, or string of characters intended to differentiate an authorized user or process for the purpose of permitting access, from an unauthorized user or put another way a password is used to prove one's identity or authorize access to a resource.   Passwords and passcodes are the most common way of authenticating users. Examples of their use includes the PIN (Personal Identifier Number) you use with your credit and debit card as well as the many passwords you are expected to remember when logging in to computer-based services. An ideal password must satisfy two conflicting aims. It should be: ·         memorable enough that the user can recall it without writing it down ·         long enough and unique enough that no one else can guess it.   How to create a strong password Using e