Dell GX240 User's Guide - Page 270

Internet Connection Firewall - review

Page 270 highlights

www.dell.com | support.dell.com The checklist leads you through the steps necessary to set up a home or small office network and provides extensive references for each step. When you have completed the necessary connections and preparations, return to the Network Setup Wizard. 4 Select the Internet connection method and click Next>. 5 Select the Internet connection and click Next>. 6 Type a description of the computer and a computer name, and then click Next>. 7 Review the network settings and click Next> to finish the setup. 8 When the setup process is complete, click Finish to close the wizard. Internet Connection Firewall Today's always-on cable modem and DSL Internet access connections offer unprecedented bandwidth to the home, but also leave the connected computer or home network vulnerable to hacker attacks. The nature of these attacks varies, but the goal is to gain access to individual computers attached to the Internet. With this access, a hacker can browse the hard drive and add or delete files, discover passwords and credit card numbers, and set the system up to launch attacks on other systems or websites. As a result, firewall protection from these attacks is increasingly required on computers. Recognizing this need, Microsoft provides an integrated firewall in Windows XP to provide immediate protection from outside access attempts. When enabled, the Internet Connection Firewall provides basic protection suitable for most home and small office users. NOTE: Enabling the Internet Connection Firewall does not reduce the need for virus-checking software. The firewall is automatically enabled when you run the Network Setup Wizard. When the firewall is enabled for a network connection, its icon appears with a red background in the Network Connections portion of the Control Panel. The Internet Connection Firewall can be applied to each Internet connection on the computer. The firewall also provides basic logging capabilities. Not all events that appear in the log are hacker attacks. Many different types of harmless events can appear in the log, such as routine checks by an Internet Service Provider to verify the presence of your computer (pings). 18 M i c r o s o f t ® W i n d o w s ® X P Fe a t u r e s

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298

18
Microsoft® Windows® XP Features
www.dell.com | support.dell.com
The checklist leads you through the steps necessary to set up a home
or small office network and provides extensive references for each step.
When you have completed the necessary connections and
preparations, return to the
Network Setup Wizard
.
4
Select the Internet connection method and click
Next>
.
5
Select the Internet connection and click
Next>
.
6
Type a description of the computer and a computer name, and then
click
Next>
.
7
Review the network settings and click
Next>
to finish the setup.
8
When the setup process is complete, click
Finish
to close the wizard.
Internet Connection Firewall
Today's always-on cable modem and DSL Internet access connections offer
unprecedented bandwidth to the home, but also leave the connected
computer or home network vulnerable to hacker attacks. The nature of
these attacks varies, but the goal is to gain access to individual computers
attached to the Internet. With this access, a hacker can browse the hard
drive and add or delete files, discover passwords and credit card numbers,
and set the system up to launch attacks on other systems or websites. As a
result, firewall protection from these attacks is increasingly required on
computers. Recognizing this need, Microsoft provides an integrated firewall
in Windows XP to provide immediate protection from outside access
attempts. When enabled, the Internet Connection Firewall provides basic
protection suitable for most home and small office users.
NOTE:
Enabling the Internet Connection Firewall does not reduce the need
for virus-checking software.
The firewall is automatically enabled when you run the Network Setup
Wizard. When the firewall is enabled for a network connection, its icon
appears with a red background in the
Network Connections
portion of the
Control Panel. The Internet Connection Firewall can be applied to each
Internet connection on the computer. The firewall also provides basic
logging capabilities. Not all events that appear in the log are hacker attacks.
Many different types of harmless events can appear in the log, such as
routine checks by an Internet Service Provider to verify the presence of your
computer (pings).