
Write a short note on "Firewall".
Write a short note on "Firewall".
Punch your phone number in the box below
I’II send an OTP on it.
I won’t confide your phone with anyone.
I appreciate your effort.
May I request you to select one of the reasons for purging from below.
Disrespectful or rude towards a person or a group.
Promotes an undisclosed link or product or service.
Not seeking genuine answers .
Vulgar, Obscene, abusive etc..
Not a post on law or business.
Copied from other website or source and pasted here.
Has bad format, grammar, spelling so requires moderatation.
Thank you,
Yours sincerely,
Aaradhika, Thakurani's bestie
I appreciate your effort.
May I request you to select one of the reasons for purging from below.
Disrespectful or rude towards a person or a group.
Promotes an undisclosed link or product or service.
Not seeking genuine answers .
Vulgar, Obscene, abusive etc..
Not a post on law or business.
Copied from other website or source and pasted here.
Has bad format, grammar, spelling so requires moderatation.
Thank you,
Yours sincerely,
Aaradhika, Thakurani's bestie
Write a short note on "Firewall".
Write a short note on "Firewall".
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet
Further, Firewalls are often categorized as either network firewalls or host-based firewalls.
Network firewalls filter traffic between two or more networks and run on network hardware.
Host-based firewalls run on host computers and control network traffic in and out of those machines.
Firewall is a device that forms a barrier between a secure and an open environment when the latter environment is usually considered hostile, for example, the Internet. It acts as a system or combination of systems that enforces a boundary between more than one networks. Access controls are common form of controls encountered in the boundary subsystem by restricting the use of system resources to authorized users, limiting the actions authorized users can take with these resources and ensuring that the users obtain only authentic system resources.
You marked successfully unsatisfactory answer
My Dear ,
I thank you for marking the answer as satisfactory.
I have noted.
It will be very nice and helpful to our other members (and the answerer too) if you mark your satisfaction level on the grade scale below.
Please feel free to mark any point. I don't share it with anyone. I use it for doing my internal calculations only. I use these calculations to evaluate the service performance of the relevant virtuoso.
Here is the grade scale:
Virtuoso could have given a better solution.
I am satisfied with virtuoso's answer.
An excellent answer I am impressed.
I will ask my next question to this virtuoso only.
Thank you,
Yours sincerely,
Anu, Thakurani's bestie
Check your phone. I have messaged an OTP. It is a 6 digit number. Feed it in the box below
Do you want me to resend the OTP? Yes resend itCheck your phone. I have messaged an OTP. It is a 6 digit number. Feed it in the box below
Do you want me to resend the OTP? Yes resend itCheck your phone. I have messaged an OTP. It is a 5 digit number. Feed it in the box below
Do you want me to resend the OTP? Yes resend itThanks, for confirming your phone number.
You can change it in your profile.Are you a tax professional?
If yes, then you can earn
money through me.
download the mobile app
You have successfully created your diary. You can access it from 'Store/Your Stuff' section.
OK