THE WHATIS.COM WORD-OF-THE-DAY   
March 4, 2004

firewall 

_____________
SPONSORED BY: PC Lifecycle Info Center 
 
Visit the new PC Lifecycle Info Center on SearchCIO.com. You'll find
news, tips, webcasts, white papers and targeted Web resources focused
on all aspects of managing the PC lifecycle - from purchase to
retirement. Get valuable advice and insight on how your IT
organization can make smart PC investment decisions. Topics covered
include PC replacement cycles, patch management, ROI, mobile
workforce management, desktop security, data backup, wireless LAN --
and much more!
http://WhatIs.com/r/0,,25773,00.htm?track=NL-34&ad=477740&intel
 
______________________   
TODAY'S WORD: firewall 
 
See our complete definition with hyperlinks at
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html?track=NL-34&ad=477740

A firewall is a set of related programs, located at a network gateway
server, that protects the resources of a private network from users
from other networks. (The term also implies the security policy that
is used with the programs.) An enterprise with an intranet that
allows its workers access to the wider Internet installs a firewall
to prevent outsiders from accessing its own private data resources
and for controlling what outside resources its own users have access
to. 

Basically, a firewall, working closely with a router program,
examines each network packet to determine whether to forward it
toward its destination. A firewall also includes or works with a
proxy server that makes network requests on behalf of workstation
users. A firewall is often installed in a specially designated
computer separate from the rest of the network so that no incoming
request can get directly at private network resources. 

There are a number of firewall screening methods. A simple one is to
screen requests to make sure they come from acceptable (previously
identified) domain name and Internet Protocol addresses. For mobile
users, firewalls allow remote access in to the private network by the
use of secure logon procedures and authentication certificates. 
A number of companies make firewall products. Features include
logging and reporting, automatic alarms at given thresholds of
attack, and a graphical user interface for controlling the firewall. 
Computer security borrows this term from firefighting, where it
originated. 

In firefighting, a firewall is a barrier established to prevent the
spread of fire. 
_________________________
RELATED TERMS:

gateway 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212176,00.html?track=NL-34&ad=477740
 

router 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212924,00.html?track=NL-34&ad=477740
 

packet 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212736,00.html?track=NL-34&ad=477740
 

proxy server 
http://whatis.techtarget.com/definition/0,,sid9_gci212840,00.html?track=NL-34&ad=477740
 

______________________
SELECTED LINKS:

Browse the latest news about firewalls
http://searchsecurity.techtarget.com/search/1,293876,sid14,00.html?track=NL-34&ad=477740&filter=on&query=firewall&within=text&ctype=NEWS
 

Get expert advice about firewalls
http://searchsecurity.techtarget.com/search/1,293876,sid14,00.html?track=NL-34&ad=477740&filter=on&query=firewall&within=text&ctype=ADVICE
 

Find whitepapers about firewalls
http://searchsecurity.techtarget.com/search/1,293876,sid14,00.html?track=NL-34&ad=477740&filter=on&query=firewall&within=text&ctype=WP
 

______________________
WEBCAST | Application-layer firewalling: Raise your perimeter IQ 

Traditional perimeter firewalls perform Layer 3 and 4 port and
protocol filtering, stateful inspection, NAT and VPN. Now, firewall
vendors are introducing new technologies to perform application-layer
filtering in both proxy- and stateful configurations. Join us on
March 10 at Noon ET as Joel Snyder, senior partner with consulting
firm Opus One, uncovers the hype versus reality of application-layer
firewalling. Joel will explore issues such as cost/benefit,
technology maturity, configuration and administration challenges, and
integration with existing intra-LAN security devices.

>> Pre-register for this live webcast on March 10 at Noon ET
http://searchsecurity.com/firewall2?track=NL-34&ad=477740 

______________________
TODAY'S TECH NEWS:

Experts see IM as foundation for new-age apps
Experts at the Instant Messaging Planet Conference & Expo said that,
in the absence of an IM strategy, "stealth" IM use could have
dangerous consequences in the enterprise. 
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci953583,00.html?track=NL-34&ad=477740
 

Face-off: Oracle vs. SQL Server
Two site editors square off on the topic of SQL Server versus Oracle,
a debate with equally loud fans on either side of the issue. 
http://searchdatabase.techtarget.com/originalContent/0,289142,sid13_gci953120,00.html?track=NL-34&ad=477740
 

Software upgrade costs irk mainframe users
Users laughed at a recent Search390.com article on the cost
incentives of upgrading the mainframe. The joke? Hardware is cheap.
It's the software upgrades that are killing users -- and forcing many
onto other platforms. 
http://search390.techtarget.com/originalContent/0,289142,sid10_gci953638,00.html?track=NL-34&ad=477740
 

>> Catch up on all the latest IT news at  
http://searchtechtarget.techtarget.com?track=NL-34&ad=477740

______________________
SECRET WORD-OF-THE-DAY | What is IT?

A vulnerability in the way this wireless communication specification
is implemented in some devices has enabled a new type of attack
called bluesnarfing. 

Do you think you know the Secret Word? Click to see if you're right!
http://searchcio.techtarget.com/gDefinition/0,294236,sid19_gci211680,00.html?track=NL-34&ad=477740
 

______________________
FAST REFERENCE | How many bytes for... (NEW!)

How many bytes would it take to store all the words ever spoken by
human beings?

Our newest Fast Reference provides tables and other information about
how many bytes are required (how much computer storage) for various
information objects or purposes. 
http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci944596,00.html?track=NL-34&ad=477740
 

______________________
HOROSCOPES FOR GEEKS | March

Find out what the stars have in store for you this month!
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci919205,00.html?track=NL-34&ad=477740

______________________
LEARN IT | Software development

Here's how it works: We give you a little background about the
concept, a glossary to look up related terms, some outside reading,
and a self-assessment quiz. You spend as much (or as little) time as
you like moving through the ten steps and exploring the concept. 
http://searchwin2000.techtarget.com/sDefinition/0,,sid1_gci936454,00.html?track=NL-34&ad=477740
 

______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] spim
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci952820_top1,00.html?track=NL-34&ad=477740
 

[2] bluesnarfing
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci952393,00.html?track=NL-34&ad=477740

[3] vulnerability disclosure 
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci952151,00.html?track=NL-34&ad=477740

[4] GMPLS 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci950984,00.html?track=NL-34&ad=477740

[5] Power over Ethernet 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci846792,00.html?track=NL-34&ad=477740

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

MARGARET ROUSE, Site Editor ([EMAIL PROTECTED])

IVY WIGMORE, Consulting Editor ([EMAIL PROTECTED])

LOWELL THING, Consulting Editor and Founder ([EMAIL PROTECTED])

GABRIELLE DERUSSY, Advertising ([EMAIL PROTECTED])

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This e-newsletter is published by WhatIs.com, a targeted Web site
from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2004 TechTarget. All rights reserved.
_____________________________________________________________________

To unsubscribe from "Word of the Day":
 
Go to unsubscribe: http://WhatIs.com/u?cid=477740&lid=430801&track=NL-34&ad=477740
 
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.
 
Contact us:
WhatIs
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to