Chapter 17. Securing Your Computer by Using a Firewall

How Hack Attacks Work 562

Configuring a Host Firewall 564

Identifying Intruders 577

Fighting Back 582

Now that nearly every personal computer is connected to the Internet, either directly or indirectly, malicious hackers have plenty of tempting targets to attack. Widespread adoption of high-speed, always-on Internet connections presents new opportunities for vandals, thieves, and hostile code. Infections can spread quickly, and anyone who uses a computer is vulnerable to a wide range of troubling threats, including the following:

  • Unauthorized users can access private data on a computer via the computer's Internet connection.

  • Attackers can use an unprotected computer as a gateway to a corporate network ...

Get Microsoft® Windows® XP Networking and Security Inside Out: Also Covers Windows 2000 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.