Absolute Beginner's Guide to Personal Firewalls

by
Edition: 1st
Format: Paperback
Pub. Date: 2001-10-24
Publisher(s): Que Pub
List Price: $29.99

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

TheAbsolute Beginner's Guide to Personal Firewallsis designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal firewall is installed.

Author Biography

Jerry Lee Ford, Jr. is an author, instructor, and a security analyst with over 13 years of experience in the information technology field. He holds a Masters in Business Administration from Virginia Commonwealth University in Richmond, Virginia and has over five years of teaching experience in information technology. Jerry is a Microsoft-certified Systems Engineer and has authored six other books, including Practical Microsoft Windows Peer Networking. He lives in Richmond, Virginia with his wife, Mary, and their sons, Alexander and William.

Table of Contents

Introduction 1(5)
I Introducing Personal Firewalls 5(54)
Why Do You Need a Personal Firewall?
7(16)
The New Age of High-Speed Internet Access
8(3)
Traditional 56 Kbps Internet Access
8(1)
The New Era in High-Speed Internet Access
9(2)
Protecting Yourself with a Personal Firewall
11(1)
The Typical Internet Connection
12(3)
Who Are Hackers Anyway?
15(6)
The Hacker Community
16(3)
Where Do They Get Their Toys?
19(2)
What Do They Want from You?
21(2)
High-Speed Internet Connections Equal Increased Vulnerability
23(18)
Selecting a High-Speed Connection: Cable Versus DSL
24(3)
High-Speed Cable Internet Access
24(2)
High-Speed DSL Internet Access
26(1)
Cable and DSL Modems
27(3)
Features
28(2)
Setting Up Your Cable or DSL Connection
30(1)
Pre-Installation Tasks
31(3)
Updating Your Operating System
31(1)
Speeding Up Your Internet Access
31(3)
NIC Installation
34(1)
Installing the Software Driver
35(6)
Network Configuration
36(1)
Installing Your High-Speed Modem
37(4)
Firewalls Explained
41(18)
Understanding Personal Firewalls
42(6)
What to Look for in a Personal Firewall
42(1)
Hardware Firewalls
43(3)
Software Firewalls
46(2)
Typical Software Firewall Requirements
48(1)
Networking Overview
48(5)
Understanding How Data Is Sent Between Network Computers
49(1)
Understanding How Computers Communicate
50(1)
How ISPs Use MAC Addresses
50(1)
More About TCP/IP
51(1)
TCP/IP Ports
52(1)
Understanding How Firewalls Operate
53(1)
Firewall Functions
54(3)
Intrusion Detection
54(1)
Detecting Attempts to Scan Your Computer
55(1)
Guarding Against Trojan Horses
56(1)
Examining All Network Traffic
57(1)
Firewall Classifications
57(2)
Application-Gateway Firewalls
58(1)
Packet-Filtering Firewalls
58(1)
Circuit-Level Firewalls
58(1)
Stateful Inspection
58(1)
II Tightening Your Security 59(164)
Locking Down Windows Networking
61(20)
An Overview of Microsoft Networking
62(12)
Introducing Microsoft Networking
62(1)
Understanding How Microsoft Networking Is Implemented
63(1)
Trusting Microsoft Networks
64(4)
Closing Down Your NetBIOS Ports
68(1)
Protecting Printers and Disk Drives from Internet Intruders
69(1)
Configuring Communications for Home Networks
70(4)
Improving Your Security
74(5)
Implementing Usernames and Passwords
75(1)
NTFS Security
75(2)
Encrypting Your Files
77(2)
Why You Should Still Get a Personal Firewall
79(2)
Hardware Firewalls
81(18)
Hardware Firewalls
82(1)
The BEFSR41 EtherFast Cable/DSL Router
83(1)
Installing the Hardware Firewall
84(3)
Configuration via the Web Browser
87(7)
Establishing Basic Configuration Settings
87(2)
Changing Your Password
89(1)
Checking the Status of Your Router
89(1)
Configuring Your DHCP Service
90(1)
Setting Your Router/Firewall Logs
91(2)
Finding Help
93(1)
Other Cable/DSL Router Functions
94(2)
Using the Linksys BEFSR41 EtherFast Cable/DSL Router As a Personal Firewall
96(1)
Other Cable/DSL Routers
97(2)
McAfee Personal Firewall
99(26)
Overview of McAfee
100(1)
System Requirements
101(1)
Installation and Setup
102(2)
Working with the Configuration Wizard
104(4)
Normal Operation
108(11)
Saving Configuration Changes
110(1)
Securing Configuration Changes
110(1)
Managing the McAfee Personal Firewall's Log File
111(1)
Starting the Firewall at System Boot
111(1)
Closing the McAfee Personal Firewall
111(1)
Configuring Application Settings
111(1)
System Settings
112(5)
Fragmented Packets
117(1)
Minimize to SysTray
117(1)
Start in SysTray
117(1)
Help
118(1)
Block Everything
118(1)
Filter Traffic
118(1)
Allow Everything
119(1)
Reporting Summary Application Information
119(1)
Reporting Detailed Application Information
119(1)
Working with Report Logs
119(4)
Limitations
123(1)
Testing the McAfee Personal Firewall
124(1)
BlackICE Defender
125(26)
Overview
126(2)
System Requirements
128(1)
Installation and Setup
129(1)
Configuring BlackICE Defender
130(8)
Protection Settings
131(1)
Log Settings
132(1)
Evidence Log Settings
133(1)
Gathering Information About Your Attacker
134(1)
Managing Specific IP Addresses
135(2)
The ICEcap Property Sheet
137(1)
Establishing Interface and Alert Settings
137(1)
Keeping BlackICE Defender's Defenses Up to Date
138(3)
Automatically Updating Your Personal Firewall
138(2)
Manually Updating Your Personal Firewall
140(1)
Normal Operation
141(8)
Working with Report Logs
141(6)
Advanced Firewall Settings
147(2)
Stop BlackICE Engine
149(1)
WWW Network ICE
149(1)
Exit
149(1)
BlackICE Defender's Limitations
149(1)
Testing the BlackICE Defender Personal Firewall
150(1)
ZoneAlarm
151(26)
Overview
152(1)
System Requirements
153(1)
Installation and Setup
153(4)
Getting Started with ZoneAlarm
157(1)
Working with ZoneAlarm
158(9)
Managing Internet Alerts and Firewall Logging
160(1)
Working with Internet Lock Settings
161(1)
Configuring Security Settings
162(2)
Managing Your Internet Applications
164(2)
Basic ZoneAlarm Configuration
166(1)
Working with the ZoneAlarm Desk Band Toolbar
167(1)
ZoneAlarm's Alerts and Log File
168(2)
Working with ZoneAlarm's Log File
168(2)
Working with ZoneAlarm Alerts
170(4)
Program Alerts
171(2)
Firewall Alerts
173(1)
ZoneAlarm's Limitations
174(1)
Testing Your Zone Labs Personal Firewall
174(3)
How Secure Is Your Computer?
177(12)
Testing Your Vulnerability to Internet Hackers
178(5)
Performing a Free Security Scan
178(4)
Port Probing
182(1)
Testing with Your Personal Firewall Up and Running
183(2)
Rerunning the Internet Scan
184(1)
Probing Your Ports a Second Time
184(1)
Testing Security from the Inside Out
185(3)
A Final Analysis
188(1)
Habits of Security-Conscious Surfers
189(14)
Updating Your Personal Firewall
190(1)
Updating McAfee Personal Firewall
190(1)
Updating BlackICE Defender
190(1)
Updating ZoneAlarm
191(1)
Keeping Your Microsoft Operating System Up-to-Date
191(3)
Keeping Your Operating System Locked Down Tight
194(1)
Using Antivirus Software
195(4)
Fighting Viruses
196(2)
Defeating Trojan Horses
198(1)
Don't Become a Zombie--Help Prevent Distributed Denial-of-Service Attacks
199(1)
Beware Cookies
199(2)
Backing Up Your Data
201(1)
Be Vigilant and Test Often
201(2)
Home Networks and Internet Connection Sharing
203(20)
What Is a Home Network?
204(1)
Putting Your Network Together
205(1)
Network Software Configuration
205(2)
Network Administration
207(6)
Setting Up Workgroup and Computer Names
207(2)
Sharing Network Resources
209(4)
Connecting Your Home Network to the Internet
213(5)
Tightening Things Up with a Second Line of Firewalls
218(2)
Microsoft's Internet Connection Sharing
220(2)
Securing Home Networks with NetBEUI
222(1)
A Other Firewall Products 223(8)
Aladdin Knowledge Systems eSafe Desktop 3.0
224(1)
Norton Personal Firewall 2001
225(1)
PGP Desktop Security 7.0
226(1)
Symantec Desktop Firewall 2.0
227(1)
Sygate Personal Firewall
227(1)
ConSeal PC Firewall
228(1)
Tiny Personal Firewall
229(2)
B Other Web Sites That Will Test Your Security 231(8)
HackerWhacker
232(1)
Gibson Research Corporation
233(1)
Secure Design
233(1)
Sygate Online Services
234(1)
Symantec
235(1)
McAfee
236(1)
HackYourself.com
236(3)
Glossary 239(8)
Index 247

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.