THE WHATIS.COM WORD-OF-THE-DAY March 4, 2004 firewall
_____________ SPONSORED BY: PC Lifecycle Info Center Visit the new PC Lifecycle Info Center on SearchCIO.com. You'll find news, tips, webcasts, white papers and targeted Web resources focused on all aspects of managing the PC lifecycle - from purchase to retirement. Get valuable advice and insight on how your IT organization can make smart PC investment decisions. Topics covered include PC replacement cycles, patch management, ROI, mobile workforce management, desktop security, data backup, wireless LAN -- and much more! http://WhatIs.com/r/0,,25773,00.htm?track=NL-34&ad=477740&intel ______________________ TODAY'S WORD: firewall See our complete definition with hyperlinks at http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html?track=NL-34&ad=477740 A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to. Basically, a firewall, working closely with a router program, examines each network packet to determine whether to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources. There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logon procedures and authentication certificates. A number of companies make firewall products. Features include logging and reporting, automatic alarms at given thresholds of attack, and a graphical user interface for controlling the firewall. Computer security borrows this term from firefighting, where it originated. In firefighting, a firewall is a barrier established to prevent the spread of fire. _________________________ RELATED TERMS: gateway http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212176,00.html?track=NL-34&ad=477740 router http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212924,00.html?track=NL-34&ad=477740 packet http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212736,00.html?track=NL-34&ad=477740 proxy server http://whatis.techtarget.com/definition/0,,sid9_gci212840,00.html?track=NL-34&ad=477740 ______________________ SELECTED LINKS: Browse the latest news about firewalls http://searchsecurity.techtarget.com/search/1,293876,sid14,00.html?track=NL-34&ad=477740&filter=on&query=firewall&within=text&ctype=NEWS Get expert advice about firewalls http://searchsecurity.techtarget.com/search/1,293876,sid14,00.html?track=NL-34&ad=477740&filter=on&query=firewall&within=text&ctype=ADVICE Find whitepapers about firewalls http://searchsecurity.techtarget.com/search/1,293876,sid14,00.html?track=NL-34&ad=477740&filter=on&query=firewall&within=text&ctype=WP ______________________ WEBCAST | Application-layer firewalling: Raise your perimeter IQ Traditional perimeter firewalls perform Layer 3 and 4 port and protocol filtering, stateful inspection, NAT and VPN. Now, firewall vendors are introducing new technologies to perform application-layer filtering in both proxy- and stateful configurations. Join us on March 10 at Noon ET as Joel Snyder, senior partner with consulting firm Opus One, uncovers the hype versus reality of application-layer firewalling. Joel will explore issues such as cost/benefit, technology maturity, configuration and administration challenges, and integration with existing intra-LAN security devices. >> Pre-register for this live webcast on March 10 at Noon ET http://searchsecurity.com/firewall2?track=NL-34&ad=477740 ______________________ TODAY'S TECH NEWS: Experts see IM as foundation for new-age apps Experts at the Instant Messaging Planet Conference & Expo said that, in the absence of an IM strategy, "stealth" IM use could have dangerous consequences in the enterprise. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci953583,00.html?track=NL-34&ad=477740 Face-off: Oracle vs. SQL Server Two site editors square off on the topic of SQL Server versus Oracle, a debate with equally loud fans on either side of the issue. http://searchdatabase.techtarget.com/originalContent/0,289142,sid13_gci953120,00.html?track=NL-34&ad=477740 Software upgrade costs irk mainframe users Users laughed at a recent Search390.com article on the cost incentives of upgrading the mainframe. The joke? Hardware is cheap. It's the software upgrades that are killing users -- and forcing many onto other platforms. http://search390.techtarget.com/originalContent/0,289142,sid10_gci953638,00.html?track=NL-34&ad=477740 >> Catch up on all the latest IT news at http://searchtechtarget.techtarget.com?track=NL-34&ad=477740 ______________________ SECRET WORD-OF-THE-DAY | What is IT? A vulnerability in the way this wireless communication specification is implemented in some devices has enabled a new type of attack called bluesnarfing. Do you think you know the Secret Word? Click to see if you're right! http://searchcio.techtarget.com/gDefinition/0,294236,sid19_gci211680,00.html?track=NL-34&ad=477740 ______________________ FAST REFERENCE | How many bytes for... (NEW!) How many bytes would it take to store all the words ever spoken by human beings? Our newest Fast Reference provides tables and other information about how many bytes are required (how much computer storage) for various information objects or purposes. http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci944596,00.html?track=NL-34&ad=477740 ______________________ HOROSCOPES FOR GEEKS | March Find out what the stars have in store for you this month! http://searchcio.techtarget.com/sDefinition/0,,sid19_gci919205,00.html?track=NL-34&ad=477740 ______________________ LEARN IT | Software development Here's how it works: We give you a little background about the concept, a glossary to look up related terms, some outside reading, and a self-assessment quiz. You spend as much (or as little) time as you like moving through the ten steps and exploring the concept. http://searchwin2000.techtarget.com/sDefinition/0,,sid1_gci936454,00.html?track=NL-34&ad=477740 ______________________________ RECENT ADDITIONS AND UPDATES [1] spim http://searchcio.techtarget.com/sDefinition/0,,sid19_gci952820_top1,00.html?track=NL-34&ad=477740 [2] bluesnarfing http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci952393,00.html?track=NL-34&ad=477740 [3] vulnerability disclosure http://searchcio.techtarget.com/sDefinition/0,,sid19_gci952151,00.html?track=NL-34&ad=477740 [4] GMPLS http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci950984,00.html?track=NL-34&ad=477740 [5] Power over Ethernet http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci846792,00.html?track=NL-34&ad=477740 ____________________________________________________________________ ::::::::::::::::::: WHATIS.COM CONTACTS ::::::::::::::::::: MARGARET ROUSE, Site Editor ([EMAIL PROTECTED]) IVY WIGMORE, Consulting Editor ([EMAIL PROTECTED]) LOWELL THING, Consulting Editor and Founder ([EMAIL PROTECTED]) GABRIELLE DERUSSY, Advertising ([EMAIL PROTECTED]) ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This e-newsletter is published by WhatIs.com, a targeted Web site from TechTarget, the most targeted IT media and events company. TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals. Copyright 2004 TechTarget. All rights reserved. _____________________________________________________________________ To unsubscribe from "Word of the Day": Go to unsubscribe: http://WhatIs.com/u?cid=477740&lid=430801&track=NL-34&ad=477740 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed. Contact us: WhatIs Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494