ZyXEL NSA-220 Plus User Guide - Page 150
BitTorrent Security, Use a Hardware-based Firewall - hack
View all ZyXEL NSA-220 Plus manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 150 highlights
Chapter 7 Applications Table 32 Applications > Download Service > Task Info LABEL Priority DESCRIPTION Use this field to set the priority for downloading the task. Select Auto to have the NSA automatically determine the download task's priority. Comment Start Time Completed on Info-Hash Tracker Close Select High to have the NSA download this file before the other files. Enter a description for this download task. This field displays when the NSA started to download files. This field displays when the file was successfully downloaded to the NSA. This information is used to verify the torrent file. This field displays the tracker that NSA is currently connected to. A tracker is a server used for finding peers sharing the file. Click this to close the screen. 7.4.9 BitTorrent Security When you download using BitTorrent, you reveal your IP address. This increases the risk of hacking attacks, which can be protected against by a good firewall. Use a Hardware-based Firewall Place a hardware-based firewall between your network and the Internet (a software-based firewall on your computer would just protect the computer itself, not the NSA since your computer is not between your NSA and the Internet). Ideally your firewall should have all of the following. Figure 39 Firewall Hacking Malicious Packets 150 Viruses • Stateful packet inspection to control access between the Internet and your network and protect your NSA (and computers) from hacking attacks. NSA-220 Plus User's Guide