click on the link below. It will take you to zonealarm firewall free download page. Download it on your computer. After download is complete, double click on it to start installation process. complete the process by filling in the simple queries. Once installation is complete, it will restart the computer and take you through a guided tour to explain the use of firewall. The program is simple to use, and has help files included.
http://www.zonelabs.com/store/content/company/products/znalm/freeDownload.jsp
2006-10-10 23:48:24
·
answer #1
·
answered by Anonymous
·
0⤊
0⤋
A system designed to prevent unauthorized access to or from a private network.
Firewalls can be implemented in both hardware and software, or a combination of both.
Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.
All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Configuring is something which varies from product to products. However, I would suggest you to undergo some courses for security system. Bcoz to configure any Firewall you need to have some basic knowledge about security systems
2006-10-11 07:07:37
·
answer #2
·
answered by Upal 4
·
0⤊
0⤋
In computer science, a firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction. A firewall is also called a Border Protection Device (BPD), especially in NATO contexts, or packet filter in BSD contexts. A firewall has the basic task of controlling traffic between different zones of trust. Typical zones of trust include the Internet (a zone with no trust) and an internal network (a zone with high trust). The ultimate goal is to provide controlled connectivity between zones of differing trust levels through the enforcement of a security policy and connectivity model based on the least privilege principle.
Proper configuration of firewalls demands skill from the administrator. It requires considerable understanding of network protocols and of computer security. Small mistakes can render a firewall worthless as a security tool.
2006-10-11 06:42:44
·
answer #3
·
answered by Anonymous
·
0⤊
0⤋
see all the things in www.microsoft.com
2006-10-11 06:47:44
·
answer #4
·
answered by Arjun 1
·
0⤊
0⤋