Technology in Action, IntroductionFeatures
|
From inside the book
Results 1-3 of 34
Page 275
... firewall , you can close off open logical ports to invaders and potentially make your computer invisible to other ... FIREWALLS 275 Computer Safeguards: Firewalls Types of Firewalls Is Your Computer Secure?
... firewall , you can close off open logical ports to invaders and potentially make your computer invisible to other ... FIREWALLS 275 Computer Safeguards: Firewalls Types of Firewalls Is Your Computer Secure?
Page 278
... firewall , you should install one as soon as possible . If the firewall is already configured and specific ports are shown as being vulner- able , consult your firewall documentation for instructions on how to close or restrict access ...
... firewall , you should install one as soon as possible . If the firewall is already configured and specific ports are shown as being vulner- able , consult your firewall documentation for instructions on how to close or restrict access ...
Page 302
... Firewall Software Firewall URL Norton Personal Firewall www.norton.com McAfee Firewall Zone Alarm www.mcafee.com FIGURE www.zonelabs.com 11 BlackICE PC Protection http://blackice.iss.net Dealing with Online Annoyances As you learned in ...
... Firewall Software Firewall URL Norton Personal Firewall www.norton.com McAfee Firewall Zone Alarm www.mcafee.com FIGURE www.zonelabs.com 11 BlackICE PC Protection http://blackice.iss.net Dealing with Online Annoyances As you learned in ...
Contents
Specialty Computers | 21 |
IN FOCUS | 22 |
Choosing the Right Internet Connection Option | 73 |
Copyright | |
27 other sections not shown
Other editions - View all
Common terms and phrases
allows application software audio BITS AND BYTES browser cable cell phone chapter chip computer system computer's create database delete designed desktop dial-up digital cameras display document drive bays e-mail electronic Ethernet example files firewall FireWire flash memory floppy floppy disk folder graphics hackers hard drive hardware images inkjet inkjet printers input install Internet connection keyboard laptop line network located Mbps Microsoft Microsoft Word modem monitor mouse multimedia nodes operating system options phone line power line network printer processor puter screen search engine server shown in Figure software applications Sound Byte spam speed spreadsheet system unit tablet PC tasks TechTV tion transfer upgrade users viruses ware Windows XP Word Zip disk