A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It usually establishes a barrier between a trusted network and an untrusted network, such as the Internet.
The main two types of firewalls are network-based or host-based. Network-based firewalls can be located anywhere on a wired or wireless network. Host-based firewalls are installed onto your computer directly to control network traffic or other resources.
Ports are a way to regulate what traffic comes in and out of your device, there is a total of 65,535 ports on every computer.
It is a good Idea to only have 1 port connecting to the Internet. This way traffic that comes in can be analyzed thoroughly before it enters your device. This also gives antivirus a chance to analyze the data.
You can configure a firewall to be stricter on some ports compared to other ports. use windows firewall to set rules for your firewall on ports
A log is a list or official record that records either events that occur in an operating system or other software runs. log files are the primary data source for network observability. Log files on computers track activity for the purposed of keeping records and finding problems. Changers made to a service are logged and tracked, using log files can help you discover changes that have been made to your pc.
there are different kinds of logs, the Application log which is created when an event takes place inside an application, a DNS server log (Domain name System) records activity on a DNS server, System log logs are created for this when events occur within the operating system itself, security logs are created in response to security events that take place on the computer (failed logins, password changes, railed auth requests, and file deletion )
Anti Virus protection is a system that constantly runs on your computer looking for different types of malware. There is constantly new malware being made so anti virus services need to be updated frequently
Common computer problems arise from Power outages, Malware, or other unexpected conditions. Many OS have a backup system, so that if a major problem or corruption occurs, it can recover the system. On windows, this backup is in the form of a "Recovery Drive". If your computer has a Windows OS, you have a few options; one to create a local backup and one to create an online backup. pictured is a Local backup
One way to protect your operating system(OS) is to delete your OS. Don't fret it can be retrieved, this is just used to stop malicious persons from accessing your files. Once the operating system is deleted, you can't boot your computer as expected and files stored on your computer hard drives will be inaccessible. Deleting your operating system can be used for many things, like for example you will need to delete the OS to install another or o reinstall windows from scratch. It can be used as a way to protect and secure your operating system, but it can also harm your computer. people who want to harm your OS will often delete your computers important files to provide them easier access to your computer. A good way to protect your computer from harm is to delete any harmful and suspicious files.