WHAT IS EMAIL BOMBARDMENT?

Image
An email bombing is an attack on your inbox that involves sending massive amounts of messages to it. Sometimes these messages are incomprehensible. But more often, they will be confirmation emails for newsletters and subscriptions. Thus, in the latter case, the attacker uses a script to search for forums and newsletters on the internet. Then they sign up for an account with your email address. Each will send you a confirmation email, asking you to confirm your address. Also, this process is repeated on as many unprotected sites as the script can find. The term Email Bombing or Email Bombing; it can also refer to flooding an email server with too many emails. In an attempt to overwhelm the server and disable it. But that's not the goal here; it would be a challenge to cut down on the modern email accounts used. Meanwhile, Google or Microsoft email servers, anyway. So instead of a denial of service (DOS) attack; against the email servers you are using. Also, the flood of messages

FIREWALL AND ITS IMPORTANCE

Having our team protected against threats is important. For this, there are numerous types of software aimed at defending ourselves from possible attacks. Each of them can be focused on a different one. In this article we are going to talk about a firewall, what they are and why it is important to have one installed on our computer. We are going to analyze its main characteristics, and we recommend the best open-source firewall for your local or business network.

Firewall acts a wall

What is a firewall?

The first thing we are going to talk about is what exactly a firewall is. In Spanish, its name is firewall and it basically acts as a wall between the Internet and our computer. It allows us to filter the traffic that enters our devices through the network. We can create white lists of which applications can use the network and send and receive data, for example.

We must add that a firewall can be software, which is the program that we can install on our device, or hardware, which is a device that connects between the network and the computer. It can also be a program installed on the router itself and that acts as a firewall.

How it works?

A firewall system has a series of defined rules and this is how it works. You can authorize or block a connection, depending on what we have configured. You can also redirect it.

For example, we could only allow the connections that we have previously configured to be authorized and blocking the rest. With this we would ensure that we have our equipment safe, but we must define precisely what we want to authorize so that we do not suffer problems.

Basically we could say that its usefulness is to protect our computer from possible intruders who may connect and steal personal data, information, etc. That is why its function is to preserve our security and privacy, protect our network and keep the information stored on the equipment safe.

 

It also protects us against possible unwanted users who can access our network or equipment. It also prevents possible denial of services attacks. A well-configured firewall could defend us against IP address spoofing attacks or source routing attacks, for example. If we do not have a firewall, even if we have a well configured and quality antivirus, we would always leave a door open to possible threats. That is why it is a good complement to our security programs.

Configurable

We give the basic rules to the firewall. If the traffic complies with the rules that have been configured, it could enter or exit. If, on the contrary, it does not comply with the rules that we have established, it would be blocked without reaching its destination.

We can, therefore, filter addresses , manage access to users who we want to connect or not, filter protocol (for example, only connect to https pages), control the number of connections made from the same period, control which applications can connect to the network and which cannot, etc.

However, a firewall has its limitations. It can protect us against Internet threats, but for example, it could not prevent someone from inserting a USB into our computer and stealing information.

Comments

Popular posts from this blog

WHAT IS EMAIL BOMBARDMENT?

TESTING THE ANTIVIRUS THAT YOU USE

BOOT SECTOR VIRUS