Firewall

Our company is under attack. We have intelligence that someone is trying to send a virus into our computer. It's your job to help us protect ourselves.

Step 1

One way enemies can have access is through open ports on our computer. A port is a way to get into your computer. Imagine a port just like the door to your house. We can open the door or close the door to let people in or out.

But our computer doesn’t just have 1 or 2 'doors' they have lots of ports that information can go in and out of. In fact they have over 65,000 ports! (That's a lot of potential open doors). Each port is used for a different service. For example, when you are using email, the information this often through Port 25.

Let's find out which ports are open on our computer using a tool called nmap. This command will search all ports, so be patient.

Type this command:

nmap -p- localhost

Activity 2: Ring of Firewalls

In this lesson, you will learn how to protect your computer by changing the firewall settings.

By adjusting the setting in the Firewall we can block all unwanted access into our computer. It performs as a protective barrier to prevent all unwanted virus and connections into, out and through our computer.