Chapter 17. Securing Your Computer by Using a Firewall
Configuring a Host Firewall 564
Fighting Back 582
Now that nearly every personal computer is connected to the Internet, either directly or indirectly, malicious hackers have plenty of tempting targets to attack. Widespread adoption of high-speed, always-on Internet connections presents new opportunities for vandals, thieves, and hostile code. Infections can spread quickly, and anyone who uses a computer is vulnerable to a wide range of troubling threats, including the following:
Unauthorized users can access private data on a computer via the computer's Internet connection.
Attackers can use an unprotected computer as a gateway to a corporate network ...
Get Microsoft® Windows® XP Networking and Security Inside Out: Also Covers Windows 2000 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.