Home & Home Office
SSL Certificates Email and Identity Code Signing Certificate Authentication PCI Compliance PC Support Email Security Site Seals Endpoint Security E-Commerce Bundle
EV SSLManaged DNS
Business & Enterprise
SSL Certificates Code Signing Certificate PKI Management cCloud Endpoint Security Authentication PCI Compliance PC Support Email Security Email and Identity Hosted DNS
- Social Media
How Firewalls Protect Your PC
At their most basic, firewalls work like a filter between your computer/network and the Internet. You can program what you want to get out and what you want to get in. Everything else is not allowed. There are several different methods firewalls use to filter out information, and some are used in combination. These methods work at different layers of a network, which determines how specific the filtering options can be.
Firewalls can be used in a number of ways to add security to your home or business. Large corporations often have very complex firewalls in place to protect their extensive networks. On the outbound side, firewalls can be configured to prevent employees from sending certain types of emails or transmitting sensitive data outside of the network. On the inbound side, firewalls can be programmed to prevent access to certain websites (like social networking sites). Additionally, firewalls can prevent outside computers from accessing computers inside the network. A company might choose to designate a single computer on the network for file sharing and all other computers could be restricted. There is no limit to the variety of configurations that are possible when using firewalls. Extensive configurations typically need to be handle and maintained by highly trained IT specialists, however.
For home use, firewalls work much more simply. The main goal of a personal firewall is to protect your personal computer and private network from malicious mischief. Malware, malicious software, is the primary threat to your home computer. Viruses are often the first type of malware that comes to mind. A virus can be transmitted to your computer through email or over the Internet and can quickly cause a lot of damage to your files. Other malware includes Trojan horse programs and spyware. These programs are usually designed to acquire your personal information for the purposes of identity theft of some kind. There are two ways a Firewall can prevent this from happening. It can allow all traffic to pass through except data that meets a predetermined set of criteria, or it can prohibit all traffic unless it meets a predetermined set of criteria.
Comodo Firewall uses the latter way to prevent malware from installing on your computer. This free software firewall, from a leading global security solutions provider and certification authority, use the patent pending "Clean PC Mode" to prohibit any applications from being installed on your computer unless it meets one of two criteria. Those criteria are a) the user gives permission for the installation and b) the application is on an extensive list of approved applications provided by Comodo. With this feature, you don't have to worry about unauthorized programs installing on your computer without your knowledge.
Comodo Firewall is rated as a top firewall recommended for both beginners and advanced users. It has a number of unique features including"Defense +," an advanced Host Intrusion Prevention System (HIPS), which prevents changes to critical system resources. This software is highly customizable, so that you can adjust it to suit your specific needs.
Comodo Internet Security Suite combines the award-winning Comodo firewall with a powerful antivirus to protect millions of computers around the world—free.
Product Selection Wizard
Find the Comodo product that best fits your needs or budget. Try it Now
Comodo Internet Security Pro 6
Find the Comodo product that best fits your needs or budget.