Firewall: This just is what KEEPS OUT hackers from gaining accesses to your files. and messing up your computer. Most filter and watch your network traffic and if it finds anything out of the ordinary it will block the access, No matter if its Inbound or outbound.
Spyware Software: This will keep your computer from having Programs that can lead to security holes in your system and make it unstable. Some spyware programs will be able to get to your WINDOWS folder on your drive and then mess up windows. Firewalls DO NOT block spyware. But some that monitor your network activity will alert you if a new program trys to connect or access the internet.
2007-03-26 13:46:28
·
answer #1
·
answered by compy_500 3
·
0⤊
0⤋
A firewall blocks unwanted activity on your computer, such as hackers and porno ads. A spyware program will scan your hard drive for tracking cookies that monitor your keystrokes and what you do on the computer. Spyware can also download ads or other files you don't want. Spyware will slow down your computer significantly. A firewall will keep hackers out who can do worse things compared to what a tracking cookie can do. So, you're protected against those threats. I suggest getting an antivirus program as well, to be extremely safe.
2007-03-26 20:45:40
·
answer #2
·
answered by Anonymous
·
0⤊
0⤋
webroot checks what you have and Mcaffee check while opening whatever but its good to have both for best resolts
2007-03-26 20:44:48
·
answer #3
·
answered by ray.cano 1
·
0⤊
0⤋
you shouldn't have bought webroot. microsoft has a free one windows defender
2007-03-26 20:42:05
·
answer #4
·
answered by ryan_macalinao5472 3
·
0⤊
0⤋
One is a firewall, one is anti-spyware. They are different.
A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections set and configured by the organization's security policy. Firewalls can either be hardware and/or software based.
A firewall's basic task is to control traffic between computer networks with different zones of trust. Typical examples are the Internet which is a zone with no trust and an internal network which is (and should be) a zone with high trust. The ultimate goal is to provide controlled interfaces between zones of differing trust levels through the enforcement of a security policy and connectivity model based on the least privilege principle and separation of duties.
A firewall is also called a Border Protection Device (BPD) in certain military contexts where a firewall separates networks by creating perimeter networks in a Demilitarized zone (DMZ). In a BSD context they are also known as a packet filter. A firewall's function is analogous to firewalls in building construction.
Proper configuration of firewalls demands skill from the firewall administrator. It requires considerable understanding of network protocols and of computer security. Small mistakes can render a firewall worthless as a security tool.
Anti-spyware programs can combat spyware in two ways:
* 1. They can provide real time protection against the installation of spyware software on your computer. This type of spyware protection works the same way as that of anti-virus protection in that the anti-spyware software scans all incoming network data for spyware software and blocks any threats it comes across.
* 2. Anti-spyware software programs can be used solely for detection and removal of spyware software that has already been installed onto your computer. This type of spyware protection is normally much easier to use and more popular. With this spyware protection software you can schedule weekly, daily, or monthly scans of your computer to detect and remove any spyware software that has been installed on your computer. This type of anti-spyware software scans the contents of the windows registry, operating system files, and installed programs on your computer and will provide a list of any threats found, allowing you to choose what you want to delete and what you want to keep.
Such programs inspect the contents of the Windows registry, the operating system files, and installed programs, and remove files and entries which match a list of known spyware components. Real-time protection from spyware works identically to real-time anti-virus protection: the software scans disk files at download time, and blocks the activity of components known to represent spyware. In some cases, it may also intercept attempts to install start-up items or to modify browser settings. Because many spyware and adware are installed as a result of browser exploits or user error, using security software (some of which are antispyware, though many are not) to sandbox browsers can also be effective to help restrict any damage done.
Earlier versions of anti-spyware programs focused chiefly on detection and removal. Javacool Software's SpywareBlaster, one of the first to offer real-time protection, blocked the installation of ActiveX-based and other spyware programs. To date, other programs such as Ad-Aware and Windows Defender now combine the two approaches, while SpywareBlaster remains focused on prevention.
Like most anti-virus software, many anti-spyware/adware tools require a frequently-updated database of threats. As new spyware programs are released, anti-spyware developers discover and evaluate them, making "signatures" or "definitions" which allow the software to detect and remove the spyware. As a result, anti-spyware software is of limited usefulness without a regular source of updates. Some vendors provide a subscription-based update service, while others provide updates gratis. Updates may be installed automatically on a schedule or before doing a scan, or may be done manually.
Not all programs rely on updated definitions. Some programs rely partly (for instance many antispyware programs such as Windows Defender, Spybot's TeaTimer and Spysweeper) or fully (programs falling under the class of Hips such as BillP's WinPatrol), on historical observation. They watch certain configuration parameters (such as certain portions of the Windows registry or browser configuration) and report any change to the user, without judgment or recommendation. While they do not rely on updated definitions, which may allow them to spot newer spyware, they can offer no guidance. The user is left to determine "what did I just do, and is this configuration change appropriate?"
2007-03-26 20:41:40
·
answer #5
·
answered by Linux OS 7
·
0⤊
2⤋