<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>FIREWALL &#8211; Palmacedar Limited</title>
	<atom:link href="https://palmacedar.com/tag/firewall/feed/" rel="self" type="application/rss+xml" />
	<link>https://palmacedar.com</link>
	<description>ICT &#124; Digital Services &#124; Web &#38; Application &#124; SEO Company in Nigeria</description>
	<lastBuildDate>Thu, 09 Jun 2022 12:19:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://palmacedar.com/wp-content/uploads/2020/04/cropped-Palmacedar_Limited-New-Logo-1-150x150.png</url>
	<title>FIREWALL &#8211; Palmacedar Limited</title>
	<link>https://palmacedar.com</link>
	<width>32</width>
	<height>32</height>
</image> 

<!-- This file should primarily consist of HTML with a little bit of PHP. -->
<div class="wc_public_wrapper wc_tool_text">
			<p id="wc_tooltip"><a href="https://api.whatsapp.com/send?phone=+2348092520066&#038;text=I%20Have%20Doubts!" class="wc_icon_display wc_small wc_bottom_left" tooltip="How can we help you! just message us." target="_blank" style="background-color:#189d0e;border-color:#ffffff;display:inline-block !important;"><i class="fa fa-whatsapp" aria-hidden="true"></i></a>
		<input type="hidden" id="wc_main_hvr_color" value="#000000">
			<input type="hidden" id="wc_main_bdr_color" value="#ffffff">
		</p>
		</div>  	<item>
		<title>How to Bring Hybrid Core into Web</title>
		<link>https://palmacedar.com/blog/how-to-bring-hybrid-core-into-web/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-bring-hybrid-core-into-web</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 09 Jun 2022 12:19:09 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Anti-Virus]]></category>
		<category><![CDATA[API development company in lagos]]></category>
		<category><![CDATA[APIs]]></category>
		<category><![CDATA[Application Development company]]></category>
		<category><![CDATA[Application Interfaces Developer]]></category>
		<category><![CDATA[Article]]></category>
		<category><![CDATA[batteries]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[CCTV]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Threat]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[data center]]></category>
		<category><![CDATA[digital services]]></category>
		<category><![CDATA[digital services in lagos nigeria]]></category>
		<category><![CDATA[ems]]></category>
		<category><![CDATA[entrepreneur]]></category>
		<category><![CDATA[FIREWALL]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[ICT and Network services]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[internet sercurity]]></category>
		<category><![CDATA[IT Training]]></category>
		<category><![CDATA[Network integration]]></category>
		<category><![CDATA[network solutions]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[Networks Solution]]></category>
		<category><![CDATA[palmacedar]]></category>
		<category><![CDATA[raised floor]]></category>
		<category><![CDATA[Renewable energy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SEO company in Lagos Nigeria]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Software magement]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Trading]]></category>
		<category><![CDATA[Web and Application Development]]></category>
		<category><![CDATA[Web development]]></category>
		<category><![CDATA[Web developments]]></category>
		<category><![CDATA[website design]]></category>
		<category><![CDATA[websites development training]]></category>
		<guid isPermaLink="false">https://palmacedar.com/?page_id=12181</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p class="sub_section_element_selectors"><span class="sub_section_element_selectors">According to the usage statistics of user application from Microsoft, 60% of the time people spend on the PC is within the web browser. Google Chrome is a cross-platform web browser developed by Google based on Chromium project. According to StatCounter website stats, by January 2022, the market share of Chrome browser is over 63% across all platforms worldwide. </span></p>
<p class="sub_section_element_selectors"><span class="sub_section_element_selectors">Hybrid core architecture combining high performance cores and power-efficient cores became more and more popular, especially after Intel launched the Alder Lake CPU product. Performance cores are designed to provide maximum compute performance, while efficient cores are designed for maximum power efficiency. Usually OS schedulers can manage hybrid core scheduling, but they lack details of application behaviors, like critical paths. It’s difficult for OS schedulers to cover all scenarios. </span></p>
<p class="sub_section_element_selectors"><span class="sub_section_element_selectors">We come from the Web Optimization team, and focus on power and performance optimization for Web platforms, mainly Chromium, aiming for better user experience on IA. This article introduces our work to utilize hybrid core capability to schedule specific threads/processes’ execution in Chrome browser to efficient cores, which adopts dynamic policies to reduce power consumption on different levels based on device state. All the analysis and tests below are performed on the Chrome OS platform.</span></p>

		</div>
	</div>
<h2 style="text-align: left;font-family:Abril Fatface;font-weight:400;font-style:normal" class="vc_custom_heading vc_do_custom_heading" >Overview</h2></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>On the hybrid core platform, Chrome can schedule threads to efficient cores to save power consumption. However, putting browser threads on efficient cores all the time is impractical since lots of threads may surge and demand higher performance. So we propose a hybrid core scheduling technology in Chrome browser to apply dynamic throttles on specific non-critical threads through scheduling them to efficient cores to execute. The technology is based on Web runtime scenarios, like background/idle/ads/video, as the importance of threads would change in different scenarios. Moreover, device information, like battery/thermal status and hybrid core information, need to be exposed to Chrome. Based on them, hybrid core scheduling would apply different core allocation policies to balance power and performance. Normally we schedule low priority threads to efficient cores. But when the device is in a critical stage like running out of battery, the scheduling policy would be more aggressive to prolong device usage time. The application of scheduling policy relies on the OS support, and we can use thread priority or QoS mechanism according to the customs of the OS. On Chrome OS, currently we change thread priority and its cgroup association. Whole architecture of the proposal is shown in Figure 1.</p>
<p><img fetchpriority="high" decoding="async" class="alignnone size-medium wp-image-12183" src="https://palmacedar.com/wp-content/uploads/2022/06/Hong_Zheng_0-1653901017480-300x245.png" alt="" width="300" height="245" /></p>
<p>Figure 1: hybrid core scheduling in Chrome browser</p>

		</div>
	</div>
<h2 style="text-align: left;font-family:Abril Fatface;font-weight:400;font-style:normal" class="vc_custom_heading vc_do_custom_heading" >Implementation</h2>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>On the hybrid core platform, Chrome can schedule threads to efficient cores to save power consumption. However, putting browser threads on efficient cores all the time is impractical since lots of threads may surge and demand higher performance. So we propose a hybrid core scheduling technology in Chrome browser to apply dynamic throttles on specific non-critical threads through scheduling them to efficient cores to execute. The technology is based on Web runtime scenarios, like background/idle/ads/video, as the importance of threads would change in different scenarios. Moreover, device information, like battery/thermal status and hybrid core information, need to be exposed to Chrome. Based on them, hybrid core scheduling would apply different core allocation policies to balance power and performance. Normally we schedule low priority threads to efficient cores. But when the device is in a critical stage like running out of battery, the scheduling policy would be more aggressive to prolong device usage time. The application of scheduling policy relies on the OS support, and we can use thread priority or QoS mechanism according to the customs of the OS. On Chrome OS, currently we change thread priority and its cgroup association. Whole architecture of the proposal is shown in Figure 1.</p>
<p><img fetchpriority="high" decoding="async" class="alignnone size-medium wp-image-12183" src="https://palmacedar.com/wp-content/uploads/2022/06/Hong_Zheng_0-1653901017480-300x245.png" alt="" width="300" height="245" /></p>

		</div>
	</div>
</div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><h2 style="text-align: left;font-family:Abril Fatface;font-weight:400;font-style:normal" class="vc_custom_heading vc_do_custom_heading" >Implementation</h2></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The implementation of hybrid core scheduling technology mainly contains three parts, scenario detection, scheduling policy, and OS support work.</p>

		</div>
	</div>
</div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><h3 style="text-align: left;font-family:Abril Fatface;font-weight:400;font-style:normal" class="vc_custom_heading vc_do_custom_heading" >Scenario detection</h3></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>First we need to determine the current scenario of a process based on inputs from various browser components. For example, the Chrome render process has a status about background state, which indicates whether the process is foreground or background scenario. For another example, Chrome has an Ad Tagging mechanism to detect ads and the resources they load in the browser. Ad Tagging works by matching resource requests against a filter list to determine if they’re ad requests. An iframe will be marked as an ad iframe if its url matches the filter list, if the tagged script is involved in the creation of the iframe, or if its parent frame is an ad iframe. If all frames are ad frames, the render process would be tagged as an ad process. The browser collects all these inputs and uses a prioritization mechanism to decide the overall mode for the process. Based on the scenario, we adopt an appropriate scheduling policy next.</p>

		</div>
	</div>
<h3 style="text-align: left;font-family:Abril Fatface;font-weight:400;font-style:normal" class="vc_custom_heading vc_do_custom_heading" >Scheduling policy</h3>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p class="sub_section_element_selectors"><span class="sub_section_element_selectors">The scheduling policy varies based on the device status. As shown in Figure 1, the browser will monitor the power status of the device via APIs provided by the OS, including the battery level, charging status and the thermal state. For hybrid core scheduling, two stages are defined below.</span></p>
<p class="sub_section_element_selectors"><span class="sub_section_element_selectors">The first one is the normal stage, which means the battery level is over 20% or the device is charging, meanwhile the thermal state is normal. In this stage, the users care more about the performance than power consumption, so we only schedule low priority threads/processes to efficient cores, like the background processes or the threads handling low priority tasks such as logging/profiling.</span></p>
<p class="sub_section_element_selectors"><span class="sub_section_element_selectors">The second one is the critical stage, which means the battery level is very low without charging, or the device is in critical thermal states, or the web developer explicitly wants to enter power saving mode, like using battery-savings meta tag. In this stage, we’re going to apply more aggressive policies to save more power, prolong device usage time or avoid thermal throttling due to high CPU temperature. Under this circumstance, many threads/processes in normal priority will be scheduled to efficient cores as long as they are not involved in UX critical tasks.</span></p>

		</div>
	</div>
<h3 style="text-align: left;font-family:Abril Fatface;font-weight:400;font-style:normal" class="vc_custom_heading vc_do_custom_heading" >OS support work</h3>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p class="sub_section_element_selectors"><span class="sub_section_element_selectors">There is some work required to be done to make Chrome utilize OS capability. Battery and thermal status are two important factors to UX. Based on them, Chrome could make appropriate policies to balance performance and power consumption. Previously, there was only battery status exposed to Chrome. Our team has landed a thermal status notification feature in Chrome. In the feature, we introduced 4 thermal levels: Nominal, Fair, Serious, and Critical referring to Apple&#8217;s Thermal Hinting API. So that Chrome can get the real-time thermal status. With battery level, charging and thermal status reported, Chrome would decide which stage to enter and apply different scheduling policies.</span></p>
<p class="sub_section_element_selectors"><span class="sub_section_element_selectors">Furthermore, we have built a bridge between Chrome threads and efficient cores on Chrome OS using the existing cgroup mechanism. Background priority threads are placed in a specific cgroup, which has a specified CPU set. On hybrid core platforms, efficient cores are likely to be allocated for the group. So if we want to schedule unimportant threads to efficient cores to execute, we can lower the thread priority and put them in the non-urgent cgroup. The scheduling is dynamic. When the threads become important (e.g. switch to foreground), we would raise the thread priority to normal right away, hence remove from the specific cgroup.</span></p>

		</div>
	</div>
<h3 style="text-align: left;font-family:Abril Fatface;font-weight:400;font-style:normal" class="vc_custom_heading vc_do_custom_heading" >Experiments </h3>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p class="sub_section_element_selectors"><span class="sub_section_element_selectors">We use the local build Chromium browser to evaluate the power impact of hybrid core scheduling per each scenario, currently focusing on background renderer processes, ads processes, and idle processes (idle is a state defined in the Chrome RAIL model). According to the experiments performed on Alder Lake Chromebook, we observe 4.2% CPU package power reduction for web browsing when scheduling idle processes to efficient cores, and 3.8% CPU package power reduction when dispatching advertisement processes. At the same time, we use a 4-tab browsing workload to test the power impact of placing background processes on efficient cores, and see 0.9% CPU package power reduction. The power saving would be larger when the number of background tabs and page activities increase.</span></p>
<p class="sub_section_element_selectors"><span class="sub_section_element_selectors">The experiment data shows that we achieve distinct power reduction by utilizing hybrid core capability in Chromium browser to schedule non-UX critical processes/threads to efficient cores in chosen scenarios, which helps extend device battery life.</span></p>

		</div>
	</div>
</div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><h2 style="text-align: left;font-family:Abril Fatface;font-weight:400;font-style:normal" class="vc_custom_heading vc_do_custom_heading" >Future Work</h2></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p><span class="sub_section_element_selectors">We will continue to explore more scenarios, which don’t demand high performance, and corresponding processes/threads can be scheduled to efficient cores. Besides, as for some scenarios like ads and idle, running on efficient cores might have performance impact, we are about to conduct performance evaluation soon and adjust the scheduling policy accordingly. Furthermore, we intend to extend our analysis and hybrid core scheduling optimization to Windows and Linux platforms.</span></p>

		</div>
	</div>
</div></div></div></div></div>
</div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WHAT TYPES OF BIOLOGICAL AND HEALTH EFFECTS CAN BE EXPECTED FROM 5G WIRELESS NETWORKING TECHNOLOGY?</title>
		<link>https://palmacedar.com/blog/what-health-effects-can-be-expected-from-5g-wireless-networking/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-health-effects-can-be-expected-from-5g-wireless-networking</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 02 Jun 2022 11:10:50 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[5g]]></category>
		<category><![CDATA[5gNetwork]]></category>
		<category><![CDATA[Article]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[digital services]]></category>
		<category><![CDATA[FIREWALL]]></category>
		<category><![CDATA[ICT and Network services]]></category>
		<category><![CDATA[IT Training]]></category>
		<category><![CDATA[Network integration]]></category>
		<category><![CDATA[palmacedar]]></category>
		<category><![CDATA[Renewable energy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Trading]]></category>
		<guid isPermaLink="false">https://palmacedar.com/?page_id=12165</guid>

					<description><![CDATA[Wireless communications have been expanding globally at an exponential rate. The latest imbedded version of mobile networking technology is called 4G (fourth generation), and the next version (called 5G &#8211; fifth generation) is in the early implementation stage. Neither 4G nor 5G have been tested for safety in credible real-life scenarios. Alarmingly, many of the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Wireless communications have been expanding globally at an exponential rate. The latest imbedded version of mobile networking technology is called 4G (fourth generation), and<br />
the next version (called 5G &#8211; fifth generation) is in the early implementation stage. Neither 4G nor 5G have been tested for safety in credible real-life scenarios. Alarmingly, many of the<br />
studies conducted in more benign environments show harmful effects from this radiation. The present article overviews the medical and biological studies that have been performed to date<br />
relative to effects from wireless radiation, and shows why these studies are deficient relative to safety. However, even in the absence of the missing real-life components such as toxic<br />
chemicals and biotoxins (which tend to exacerbate the adverse effects of the wireless radiation), the literature shows there is much valid reason for concern about potential adverse<br />
health effects from both 4G and 5G technology. The studies on wireless radiation health effects reported in the literature should be viewed as extremely conservative, substantially underestimating the adverse impacts of this new technology.</p>
<p>&nbsp;</p>
<p><img decoding="async" class=" wp-image-12166 aligncenter" src="https://palmacedar.com/wp-content/uploads/2022/06/3GPP_5G_logo-300x181.png" alt="" width="396" height="239" /></p>
<p>&nbsp;</p>
<p>The potential 5G adverse effects derive from the intrinsic nature of the radiation, and its interaction with tissue and target structures. 4G networking technology was associated mainly with carrier frequencies in the range of ~1-2.5 GHz (cell phones, WiFi). The wavelength of 1 GHz radiation is 30 cm, and the penetration depth in human tissue is a few centimeters. In its highest performance (high-band) mode, 5G networking technology is mainly associated with carrier frequencies at least an order of magnitude greater than the 4G frequencies, although, as stated previously, “ELFs (0–3000Hz) are always present in all telecommunication EMFs in the form of pulsing and modulation”.</p>
<p>Penetration depths for the carrier frequency component of high-band 5G wireless radiation will be on the order of a few millimeters. At these wavelengths, one can expect resonance phenomena with small-scale human structures. Additionally, numerical simulations of millimeter-wave radiation resonances with insects showed a general increase in absorbed RF power at and above 6 GHz, in comparison to the absorbed RF power below 6 GHz. A shift of 10% of the incident power density to frequencies above 6 GHz was predicted to lead to an increase in absorbed power between 3–370%.</p>
<p>The common ‘wisdom’ presented in the literature and media is that, if there are adverse impacts resulting from high-band 5G, the main impacts will be focused on near-surface phenomena, such as skin cancer, cataracts, and other skin conditions. However, there is evidence that biological responses to millimeter-wave irradiation can be initiated within the skin, and the subsequent systemic signaling in the skin can result in physiological effects on the nervous system, heart, and immune system.</p>
<p>Additionally, consider the following reference [Zalyubovskaya, 1977]. This is one of many translations of articles produced in the Former Soviet Union on wireless radiation (also, see<br />
reviews of Soviet research on this topic by McRee [1979, 1980], Kositsky [2001], and Glaser and Dodge [1976]). On p. 57 of the pdf link, the article by Zalyubovskaya addresses biological effects of millimeter radiowaves. Zalyubovskaya ran experiments using power fluxes of 10,000,000 microwatts/square meter (the FCC (Federal Communications Commission) guideline limit for the general public today in the USA), and frequencies on the order of 60 GHz.</p>
<p>Not only was skin impacted adversely, but also heart, liver, kidney, spleen tissue as well, and blood and bone marrow properties. These results reinforce the conclusion of Russel (quoted above) that systemic results may occur from millimeter-wave radiation. To re-emphasize, for Zalyubovskaya’s experiments, the incoming signal was unmodulated carrier frequency only, and the experiment was single stressor only. Thus, the expected real-world results (when human beings are impacted, the signals are pulsed and modulated, and there is exposure to many toxic stimuli) would be far more serious and would be initiated at lower (perhaps much lower) wireless radiation power fluxes.</p>
<p>The Zalyubovskaya paper was published in 1977. The referenced version was classified in 1977 by USA authorities and declassified in 2012. What national security concerns caused it (and the other papers in the linked pdf reference) to be classified for 35 years, until declassification in 2012? Other papers on this topic with similar findings were published in the USSR (and the USA) at that time, or even earlier, but many  never saw the light of day, both in the USSR and the USA. It appears that the potentially damaging effects of millimeter-wave radiation on the skin (and other major systems in the body) have been recognized for well over forty years, yet today’s discourse only revolves around the possibility of modest potential effects on the skin and perhaps cataracts from millimeter-wave wireless radiation.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Google Brings Exciting Features To Android Phones Ahead Of Christmas</title>
		<link>https://palmacedar.com/google-brings-exciting-features-to-android-phones-ahead-of-christmas/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=google-brings-exciting-features-to-android-phones-ahead-of-christmas</link>
					<comments>https://palmacedar.com/google-brings-exciting-features-to-android-phones-ahead-of-christmas/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 06 Dec 2021 11:56:52 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Anti-Virus]]></category>
		<category><![CDATA[Application Development company]]></category>
		<category><![CDATA[Application Interfaces Developer]]></category>
		<category><![CDATA[batteries]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[data center]]></category>
		<category><![CDATA[digital services]]></category>
		<category><![CDATA[ems]]></category>
		<category><![CDATA[entrepreneur]]></category>
		<category><![CDATA[FIREWALL]]></category>
		<category><![CDATA[ICT and Network services]]></category>
		<category><![CDATA[internet sercurity]]></category>
		<category><![CDATA[IT Training]]></category>
		<category><![CDATA[network solutions]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[Networks Solution]]></category>
		<category><![CDATA[raised floor]]></category>
		<category><![CDATA[Renewable energy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SEO company in Lagos Nigeria]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Software magement]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Trading]]></category>
		<category><![CDATA[Web and Application Development]]></category>
		<category><![CDATA[Web development]]></category>
		<category><![CDATA[Web developments]]></category>
		<category><![CDATA[website design]]></category>
		<category><![CDATA[websites development training]]></category>
		<guid isPermaLink="false">https://palmacedar.com/?p=12051</guid>

					<description><![CDATA[As the Christmas holiday continues to draw closer daily, packed with so much excitement in view, Google is about to make the season even more exciting with a number of new value-added features to Android phones all around the world. New features the global tech giant is introducing include the Family Bell – new visually appealing widgets, [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid">
<div class="sizers clearfix">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element " >
<div class="wpb_wrapper">
<p>As the Christmas holiday continues to draw closer daily, packed with so much excitement in view, <strong>Google</strong> is about to make the season even more exciting with a number of new value-added features to Android phones all around the world. New features the global tech giant is introducing include the Family Bell – new visually appealing widgets, new memories on the Google Photos app, and the Car Key feature via Android Auto to more phones.</p>
</p></div></div>
<div class="wpb_text_column wpb_content_element " >
<div class="wpb_wrapper">
<p><img decoding="async" class="wp-image-12055 aligncenter" src="https://palmacedar.com/wp-content/uploads/2021/12/AndroidWinter_BlogIllustration_2096x1182.max-1000x1000-1-300x169.jpg" alt="" width="637" height="359" srcset="https://palmacedar.com/wp-content/uploads/2021/12/AndroidWinter_BlogIllustration_2096x1182.max-1000x1000-1-300x169.jpg 300w, https://palmacedar.com/wp-content/uploads/2021/12/AndroidWinter_BlogIllustration_2096x1182.max-1000x1000-1-18x10.jpg 18w, https://palmacedar.com/wp-content/uploads/2021/12/AndroidWinter_BlogIllustration_2096x1182.max-1000x1000-1.jpg 768w" sizes="(max-width: 637px) 100vw, 637px" /></p>
<p>The tech giant says the new feature called the Family Bell is a special delivery on Android devices for the festive season expected to make creating, capturing, and sharing holiday memories more joyful— all while strengthening security and personalization. <a href="https://jeffsimmonds.co.nz/78626634/" target="_blank" rel="noopener">ربح الاموال</a>  Family Bell has been built to help users and their loved ones stay on track with their daily schedules, irrespective of location. When Family Bell is set up on an Android phone, it will be integrated into all allied devices such as a home speaker or smart display, and bells, notifications, everyone within your Family Bell gets a notification when it’s time for important moments throughout the day. Whether it’s getting out the door in the morning, picking up your kids from sports practice, or getting to bed on schedule the Family Bell features have been proven to notify you and the rest of the family. Family members also come with the ability to set bells on their own devices in other to stay on top of their individual goals. For the Christmas holidays, Family Bells comes with suggestions of bells for new activities that include watering a tree, a family movie night, or volunteering to support a local cause. Family Bell basically comes as easy to edit, manage and customize from your most preferred device.</p>
</p></div></div>
</div>
</div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid">
<div class="sizers clearfix">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element " >
<div class="wpb_wrapper">
<p><img decoding="async" class="alignnone wp-image-12054" src="https://palmacedar.com/wp-content/uploads/2021/12/FamilyBell_Thumbnail_02.max-1000x1000-1-300x300.png" alt="" width="646" height="646" srcset="https://palmacedar.com/wp-content/uploads/2021/12/FamilyBell_Thumbnail_02.max-1000x1000-1-300x300.png 300w, https://palmacedar.com/wp-content/uploads/2021/12/FamilyBell_Thumbnail_02.max-1000x1000-1-150x150.png 150w, https://palmacedar.com/wp-content/uploads/2021/12/FamilyBell_Thumbnail_02.max-1000x1000-1-768x768.png 768w, https://palmacedar.com/wp-content/uploads/2021/12/FamilyBell_Thumbnail_02.max-1000x1000-1-12x12.png 12w, https://palmacedar.com/wp-content/uploads/2021/12/FamilyBell_Thumbnail_02.max-1000x1000-1-500x500.png 500w, https://palmacedar.com/wp-content/uploads/2021/12/FamilyBell_Thumbnail_02.max-1000x1000-1.png 1000w" sizes="(max-width: 646px) 100vw, 646px" /></p>
<p>Google is also rolling out new Memories in Google Photos, this feature has been developed to help users do a quick throwback on the moments they celebrate. These Memories have been programmed to appear in the photo grid and will feature a curated selection of photos and videos selected from holidays like New Year’s Eve or Halloween. Also important milestones like birthdays and graduations. This feature comes with the ability that allows users to flex controls like rename, personalize, correct, or even opt for removing these Memories from your photo grid.</p>
</p></div></div>
</div>
</div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid">
<div class="sizers clearfix">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element " >
<div class="wpb_wrapper">
<p>Another way Google is using to boast excitement for all her users this festive season is the introduction of Widgets. Widgets that have been reported will make it easier for users to view the content available in all their favorite Google apps right from the Home screen. Google has developed three new widgets with the guarantee to ultimately bring users to enjoy this holiday season:</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>Gain access to your full library of books with ease as you go through the holiday. Keep track of your audiobook progress with the new Google Play Books widget.</li>
<li>The new YouTube Music widget guarantees users the ability to enjoy their favorite holiday tunes. Comes with the ability to flex playback controls and recently played tracks right from your Home screen.</li>
<li>Starting to roll out next week, Google will help family, friends, loved ones, and favorite furballs feel and stay closer with the new Google Photos People &amp; Pets widget. <a href="http://www.kasmirhird.com/aue7v7po2/" target="_blank" rel="noopener">لعب البوكر على الانترنت</a>  This widget puts your family right on your Home screen. Simply select a few faces and an appropriate frame and voila the widget will do the rest, you get a decorated Home screen with your nearest and dearest.</li>
</ul>
</li>
</ul>
<p><img decoding="async" class="wp-image-12053 alignleft" src="https://palmacedar.com/wp-content/uploads/2021/12/PhotoWidget_Thumbnail_08.max-1000x1000-1-300x300.png" alt="" width="593" height="593" srcset="https://palmacedar.com/wp-content/uploads/2021/12/PhotoWidget_Thumbnail_08.max-1000x1000-1-300x300.png 300w, https://palmacedar.com/wp-content/uploads/2021/12/PhotoWidget_Thumbnail_08.max-1000x1000-1-150x150.png 150w, https://palmacedar.com/wp-content/uploads/2021/12/PhotoWidget_Thumbnail_08.max-1000x1000-1-768x768.png 768w, https://palmacedar.com/wp-content/uploads/2021/12/PhotoWidget_Thumbnail_08.max-1000x1000-1-12x12.png 12w, https://palmacedar.com/wp-content/uploads/2021/12/PhotoWidget_Thumbnail_08.max-1000x1000-1-500x500.png 500w, https://palmacedar.com/wp-content/uploads/2021/12/PhotoWidget_Thumbnail_08.max-1000x1000-1.png 1000w" sizes="(max-width: 593px) 100vw, 593px" /></p>
<p>&nbsp;</p>
<p>Google has again proved how helpful Android can be on the road, so whether you’re driving home for the Christmas holidays or simply going for a last-minute grocery shopping at a store nearby, a suite of updates enhances just made the experience better. Google now allows you to stay connected on every drive, your Android Auto can now launch automatically when you connect your Android phone to your compatible car. As soon as you hit the road, Android Auto helps you stay focused on the road while getting things done. With smart reply options rolling out shortly, responding to a text message can be carried out more easily with Google Assistant available on Android Auto. Users would need to simply tap to respond or create a custom message. With a single tap of the new always-on play button, Users can listen to their music right from the comfort of the Home screen. Another feature for this that would be rolling pretty soon is the ability to use the voice to search for music faster in your media apps on Android Auto. With a tap on the new search icon, your favorite artist or song is playing. Google also introduces a new way to bring your phone and car closer together. The use will be able to use their Android phones to carry out certain functions like locking, unlocking, and even starting your compatible car. Digital car key is now available in select countries on Pixel 6, Pixel 6 Pro, and Samsung Galaxy S21 for compatible BMW cars.</p>
</p></div></div>
</div>
</div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid">
<div class="sizers clearfix">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element " >
<div class="wpb_wrapper">
<p>You thought that was the end, well there is more.  Do you recall that mobile game you recently downloaded? Probably not. With permissions auto-reset on Android, your device will automatically turn off runtime permissions—which allow apps to access data or take actions on your behalf—for downloaded apps you haven’t used in a while. Users can always have this permission turned back on anytime, either through the settings menu or by reopening the app again. This wonderful feature will come with expanded support to billions more devices with Google Play services that run Android 6.0 or higher and is expected to launch next month.</p>
<p><img decoding="async" class="alignnone wp-image-12052" src="https://palmacedar.com/wp-content/uploads/2021/12/AutoReset_Thumbnail_02.max-1000x1000-1-300x300.png" alt="" width="648" height="648" srcset="https://palmacedar.com/wp-content/uploads/2021/12/AutoReset_Thumbnail_02.max-1000x1000-1-300x300.png 300w, https://palmacedar.com/wp-content/uploads/2021/12/AutoReset_Thumbnail_02.max-1000x1000-1-150x150.png 150w, https://palmacedar.com/wp-content/uploads/2021/12/AutoReset_Thumbnail_02.max-1000x1000-1-768x768.png 768w, https://palmacedar.com/wp-content/uploads/2021/12/AutoReset_Thumbnail_02.max-1000x1000-1-12x12.png 12w, https://palmacedar.com/wp-content/uploads/2021/12/AutoReset_Thumbnail_02.max-1000x1000-1-500x500.png 500w, https://palmacedar.com/wp-content/uploads/2021/12/AutoReset_Thumbnail_02.max-1000x1000-1.png 1000w" sizes="(max-width: 648px) 100vw, 648px" /></p>
<p>Finally, Google says sometimes due to the unlimited excitements associated with the time of the year, those end-of-year messages you want to be sent to your loved ones can have you lost for words—and really one emoji may not adequately tell the full story. Google introduces the Emoji Kitchen that allows you to combine emojis into stickers so you can tell the full story as you share it with your friends, family, and loved ones. Celebrate the Christmas holidays by sharing your most preferred emoji in a beautifully wrapped gift box. Or maybe you’re more of a dog person, let people know it with an all-new collection of furry friends’ in emojis. With thousands of new additions, Emoji Kitchen is the gift that keeps on giving and a great way to spread a little holiday cheer. The latest stickers are rolling out to Gboard Beta users starting today and will be available to all Gboard users in the coming weeks.</p>
</p></div></div>
<div class="wpb_text_column wpb_content_element " >
<div class="wpb_wrapper">
<p>Like and Follow us on our social media pages.. <a href="http://www.forexinitiate.com/22543983/" target="_blank" rel="noopener">اون لاين كازينو</a> </p>
<p><img decoding="async" class="alignnone wp-image-11922" src="https://palmacedar.com/wp-content/uploads/2021/10/b763699fd1fa3bfb374442593ae642e1-300x300.png" alt="" width="31" height="31" srcset="https://palmacedar.com/wp-content/uploads/2021/10/b763699fd1fa3bfb374442593ae642e1-300x300.png 300w, https://palmacedar.com/wp-content/uploads/2021/10/b763699fd1fa3bfb374442593ae642e1-150x150.png 150w, https://palmacedar.com/wp-content/uploads/2021/10/b763699fd1fa3bfb374442593ae642e1-12x12.png 12w, https://palmacedar.com/wp-content/uploads/2021/10/b763699fd1fa3bfb374442593ae642e1-500x500.png 500w, https://palmacedar.com/wp-content/uploads/2021/10/b763699fd1fa3bfb374442593ae642e1.png 640w" sizes="(max-width: 31px) 100vw, 31px" /> <a title="@palmacedarlimited" href="https://www.facebook.com/palmacedarlimited" target="_blank" rel="noopener">@palmacedarlimited</a></p>
<p><a title="@palmacedarlimited" href="https://www.instagram.com/palmacedarlimited/" target="_blank" rel="noopener"><img decoding="async" class="alignnone wp-image-11920" src="https://palmacedar.com/wp-content/uploads/2021/10/download-4.png" alt="" width="23" height="23" srcset="https://palmacedar.com/wp-content/uploads/2021/10/download-4.png 224w, https://palmacedar.com/wp-content/uploads/2021/10/download-4-150x150.png 150w, https://palmacedar.com/wp-content/uploads/2021/10/download-4-12x12.png 12w" sizes="(max-width: 23px) 100vw, 23px" /> @palmacedarlimited</a></p>
<p><a title="@palmacedarlimited" href="https://www.linkedin.com/company/palmacedarlimited/" target="_blank" rel="noopener"><img decoding="async" class="alignnone wp-image-11921" src="https://palmacedar.com/wp-content/uploads/2021/10/favpng_cfo-systems-llc-social-media-linkedin-black-white-300x300.png" alt="" width="24" height="24" srcset="https://palmacedar.com/wp-content/uploads/2021/10/favpng_cfo-systems-llc-social-media-linkedin-black-white-300x300.png 300w, https://palmacedar.com/wp-content/uploads/2021/10/favpng_cfo-systems-llc-social-media-linkedin-black-white-150x150.png 150w, https://palmacedar.com/wp-content/uploads/2021/10/favpng_cfo-systems-llc-social-media-linkedin-black-white-768x768.png 768w, https://palmacedar.com/wp-content/uploads/2021/10/favpng_cfo-systems-llc-social-media-linkedin-black-white-12x12.png 12w, https://palmacedar.com/wp-content/uploads/2021/10/favpng_cfo-systems-llc-social-media-linkedin-black-white-500x500.png 500w, https://palmacedar.com/wp-content/uploads/2021/10/favpng_cfo-systems-llc-social-media-linkedin-black-white.png 1024w" sizes="(max-width: 24px) 100vw, 24px" /> @palmacedarlimited</a></p>
</p></div></div>
</div>
</div>
</div>
</div>
</div>
</div>]]></content:encoded>
					
					<wfw:commentRss>https://palmacedar.com/google-brings-exciting-features-to-android-phones-ahead-of-christmas/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WHAT YOU NEED TO KNOW ABOUT FIREWALL</title>
		<link>https://palmacedar.com/what-you-need-to-know-about-firewall/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-you-need-to-know-about-firewall</link>
					<comments>https://palmacedar.com/what-you-need-to-know-about-firewall/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 14 Jul 2021 08:55:50 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Article]]></category>
		<category><![CDATA[FIREWALL]]></category>
		<guid isPermaLink="false">https://palmacedar.com/?p=1177</guid>

					<description><![CDATA[What you need to know about Firewall! The Internet has made much information available to the average computer user at home, in business, and education. For many people, access to this information is no longer just an advantage; it is important. By connecting a private network to the Internet it can reveal sensitive or confidential [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>What you need to know about Firewall! The Internet has made much information available to the average computer user at home, in business, and education. For many people, access to this information is no longer just an advantage; it is important.</p>
<p>By connecting a private network to the Internet it can reveal sensitive or confidential information to malicious attacks from anywhere in the world. Attackers may gain access to your sites’ private information or interfere with your use of your systems.</p>
<p>Users who connect their computers to Internetwork should be aware of low-level risks, their consequences, and how to protect their personal information and sensitive systems. Therefore, network security is a key factor here and logs provide this protection.</p>
<p>Internet firewalls keep the flames of an Internet hell out of your network or, keep members of your LAN clean by denying them access to all the worst Internet temptations.</p>
<p><img alt="5 Reasons Why You Should Use a Firewall" width="433" height="335" /></p>
<p><strong>WHAT IS A FIREWALL?</strong></p>
<figure class="wp-block-image size-large is-resized"><img decoding="async" class="wp-image-1178" src="https://palmacedar.com/wp-content/uploads/2021/07/2-1024x576.jpg" sizes="(max-width: 464px) 100vw, 464px" srcset="https://palmacedar.com/wp-content/uploads/2021/07/2-1024x576.jpg 1024w, https://palmacedar.com/wp-content/uploads/2021/07/2-300x169.jpg 300w, https://palmacedar.com/wp-content/uploads/2021/07/2-768x432.jpg 768w, https://palmacedar.com/wp-content/uploads/2021/07/2-16x9.jpg 16w, https://palmacedar.com/wp-content/uploads/2021/07/2.jpg 1280w" alt="" width="464" height="260" /></figure>
<p>A firewall is simply a program or hardware device that filters information that comes with an Internet connection to your network or computer program.</p>
<p><strong>What Is Application Firewall?</strong></p>
<figure class="wp-block-image size-large is-resized"><img decoding="async" class="wp-image-1179" src="https://palmacedar.com/wp-content/uploads/2021/07/3-1-1024x463.png" sizes="(max-width: 511px) 100vw, 511px" srcset="https://palmacedar.com/wp-content/uploads/2021/07/3-1-1024x463.png 1024w, https://palmacedar.com/wp-content/uploads/2021/07/3-1-300x136.png 300w, https://palmacedar.com/wp-content/uploads/2021/07/3-1-768x347.png 768w, https://palmacedar.com/wp-content/uploads/2021/07/3-1-16x7.png 16w, https://palmacedar.com/wp-content/uploads/2021/07/3-1.png 1459w" alt="" width="511" height="231" /></figure>
<p>An application firewall is a special firewall specifically written for the type of traffic you are testing. The most advanced application firewall is a web application firewall. The web app’s firewall doesn’t care much about the source and local addresses and focuses on real-time data to see if requests sent to a web server, and responses from a web server, meet its rules. For example, a web application firewall may have a rule that the requested URL may not be more than 256 characters long. When a package with a long URL is found in the application field it can be downloaded without giving it to the webserver.</p>
<p><strong>What Is The Difference Between A Host-Based Firewall And A Network-Based Firewall</strong>?</p>
<figure class="wp-block-image size-large is-resized"><img decoding="async" class="wp-image-1180" src="https://palmacedar.com/wp-content/uploads/2021/07/4-1.jpg" sizes="(max-width: 587px) 100vw, 587px" srcset="https://palmacedar.com/wp-content/uploads/2021/07/4-1.jpg 960w, https://palmacedar.com/wp-content/uploads/2021/07/4-1-300x225.jpg 300w, https://palmacedar.com/wp-content/uploads/2021/07/4-1-768x576.jpg 768w, https://palmacedar.com/wp-content/uploads/2021/07/4-1-16x12.jpg 16w" alt="" width="587" height="440" /></figure>
<p>A host-based firewall is installed on each computer to protect it from activities occurring on its network. The policy may affect computer-generated traffic to the Internet, local network, or itself.</p>
<p>A network-based firewall is used somewhere in the network and protects all computers on the “internal” side of the firewall on all computers on the “external” side of the firewall.</p>
<p>A network-based firewall can be installed on the perimeter, or on the edges of the network to protect the company from Internet executives, or internally to protect one part of the community from another, such as separating business and residential systems, or research programs from marketing programs. A network-based firewall cannot protect one computer from another in the same network, or another computer itself.</p>
<p><strong>SOFTWARE FIREWALL VS HARDWARE FIREWALL</strong></p>
<figure class="wp-block-image size-large is-resized"><img decoding="async" class="alignnone wp-image-1181" src="https://palmacedar.com/wp-content/uploads/2021/07/5-1.jpg" sizes="(max-width: 495px) 100vw, 495px" srcset="https://palmacedar.com/wp-content/uploads/2021/07/5-1.jpg 900w, https://palmacedar.com/wp-content/uploads/2021/07/5-1-300x140.jpg 300w, https://palmacedar.com/wp-content/uploads/2021/07/5-1-768x358.jpg 768w, https://palmacedar.com/wp-content/uploads/2021/07/5-1-16x7.jpg 16w" alt="WHAT YOU NEED TO KNOW ABOUT FIREWALL" width="495" height="231" /></figure>
<ul>
<li><strong>Software Firewall</strong></li>
</ul>
<p>Software firewalls are installed on individual servers. They stop each connection request and decide whether the application is valid or not. The software firewall processes all applications through server resources. Apart from the performance limit, a software firewall has many advantages.</p>
<p><strong>Key advantages of a software firewall.</strong></p>
<ol type="1">
<li>While comparing with the hardware firewalls, software firewalls are easier to configure and set up.</li>
<li>.Through the software firewall, we can restrict some specific applications from the Internet. This makes the software firewall more flexible.</li>
<li>The software firewall gives users complete control over their Internet traffic through a nice user-friendly interface that requires little or no knowledge.</li>
</ol>
<ul>
<li><strong>Hardware Firewalls</strong></li>
</ul>
<p>Hardware firewalls are connected to a router that sits between a computer and the Internet. They usually use packet filtering, which means they scan the package header to find out their background, origin, address, and destination and look at the user’s existing rules to decide to approve/deny.</p>
<p><strong>Key advantages of hardware firewall.</strong></p>
<ol type="1">
<li>Speed: Hardware firewalls are tailored for faster response times, so they can handle more traffic loads.</li>
<li>Security: A firewall with its operating system is less prone to attacks. This in turn reduces the security risk and in addition, hardware firewalls have enhanced security controls.</li>
<li>No Interference: Since the hardware firewall is an isolated network component, it can be managed better, and does not load or slow down other applications. The firewall can be moved, shut down, or reconfigured with minimal interference to the network.</li>
</ol>
<p><strong>History of Firewalls</strong></p>
<figure class="wp-block-image size-large is-resized"><img decoding="async" class="wp-image-1182" src="https://palmacedar.com/wp-content/uploads/2021/07/6-1.jpg" sizes="(max-width: 464px) 100vw, 464px" srcset="https://palmacedar.com/wp-content/uploads/2021/07/6-1.jpg 926w, https://palmacedar.com/wp-content/uploads/2021/07/6-1-300x246.jpg 300w, https://palmacedar.com/wp-content/uploads/2021/07/6-1-768x630.jpg 768w, https://palmacedar.com/wp-content/uploads/2021/07/6-1-16x12.jpg 16w" alt="" width="464" height="381" /></figure>
<p><img alt="The life of the firewall – A history | ITProPortal" width="404" height="332" />Firewall technology first appeared in the late 1980s. The Internet was still a relatively new technology in terms of global usage and connectivity. The first theory was developed in response to a major cybersecurity breach, which occurred in the late 1980s. In 1988 an employee of the NASA Ames Research Center in California sent an e-mail invitation to colleagues: “We are currently under attack by the Internet VIRUS! It has attacked Berkeley, UC San Diego, Lawrence Livermore, Stanford, and NASA. Ames.” it was delivered by e-mail and is now a common problem even for an innocent domestic user. Morris Worm was the first major cybersecurity attack, an online community that was unexpected, and unprepared. The online community took the lead in combating any future attacks and began collaborating on new ideas, programs, and software to make the internet safer again. The first paper published in firewall technology was in 1988 when Jeff Mogul of Digital Equipment Corp. developed a filtering system known as package filter filters. This basic program was the first generation of what would become a very emerging online security feature. From 1980-1990 two colleagues from AT&amp;T Bell Laboratories, Dave Presetto, and Howard Trickey, developed the second generation of firewalls known as firewalls at the regional level.</p>
<p>The books by Gene Spafford of Purdue University, Bill Cheswick at AT&amp;T laboratories, and Marcus Ranum described a third-generation firewall application called a layered firewall, also known as proxy-based firewalls. Marcus Ranum’s work in technology led to the creation of the first commercial product. The product is produced by Digital Equipment Corporation’s (DEC) branded as SEAL product. The first major sale of the DEC was on June 13, 1991, to a chemical company based on the East Coast of the USA. At AT&amp;T Bill Cheswick and Steve Bellovin were continuing their research on package filtering and developing their company’s performance model based on their first-generation architecture. In 1992, Bob Braden and Annette DeSchon at the University of Southern California were developing their fourth-generation package fire protection program. The product known as “Visa” was the first system to have a color-coded visual interface, which can be used and easily accessible on a computer program such as Windows Microsoft, or Apple’s Mac / OS. In 1994 an Israeli company called Check Point Software Technologies developed this easily accessible software known as FireWall-1. The second generation of proxy firewalls was based on Kernel Proxy technology. The project is ongoing but its basic features and codes are currently widely used in commercial and home computer programs. Cisco, one of the world’s largest Internet security companies, released the product to the public in 1997.</p>
<p><strong>Design Goals For A Firewall</strong></p>
<figure class="wp-block-image size-large"><img decoding="async" class="wp-image-1183" src="https://palmacedar.com/wp-content/uploads/2021/07/7.jpg" sizes="(max-width: 469px) 100vw, 469px" srcset="https://palmacedar.com/wp-content/uploads/2021/07/7.jpg 451w, https://palmacedar.com/wp-content/uploads/2021/07/7-300x136.jpg 300w, https://palmacedar.com/wp-content/uploads/2021/07/7-16x7.jpg 16w" alt="" width="469" height="212" /></figure>
<ul>
<li>The first design goal for a firewall is that collectively the sum of all the network traffic from internal to external must go through the firewall physically cutting off all access to the local network except via the firewall.</li>
<li>The second design goal would be only authorized traffic which is delineated by the local security policy will be allowed to proceed.</li>
<li>Finally, the last design goal is that the firewall itself is resistant to penetration inclusive is a solid trustworthy system with a protected operating system.</li>
</ul>
<p><strong>Types of Firewalls</strong></p>
<figure class="wp-block-image size-large is-resized"><img decoding="async" class="wp-image-1184" src="https://palmacedar.com/wp-content/uploads/2021/07/8.jpg" sizes="(max-width: 450px) 100vw, 450px" srcset="https://palmacedar.com/wp-content/uploads/2021/07/8.jpg 600w, https://palmacedar.com/wp-content/uploads/2021/07/8-300x200.jpg 300w, https://palmacedar.com/wp-content/uploads/2021/07/8-16x12.jpg 16w" alt="" width="450" height="300" /></figure>
<p>Three common types of Firewalls:</p>
<ol type="i">
<li>Packet-filtering routers</li>
<li>Application-level gateways</li>
<li>Circuit-level gateways (Bastion host)</li>
</ol>
<ol type="i">
<li><strong>Packet-Filtering Router</strong></li>
<li>Applies a set of rules to each incoming IP packet and then forwards or discards the packet</li>
<li>Filter packets going in both directions</li>
<li>The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header</li>
<li>Two default policies (discard or forward)</li>
</ol>
<figure class="wp-block-table">
<table>
<tbody>
<tr>
<td><strong>Advantages of Packet-Filtering Router</strong></td>
<td><strong>Disadvantages of Packet-Filtering Router</strong></td>
</tr>
<tr>
<td>· Simplicity · Transparency to users · High speed <strong> </strong></td>
<td>· Difficulty of setting up packet filter rules · Lack of Authentication <strong> </strong></td>
</tr>
</tbody>
</table>
</figure>
<ol type="i">
<li><strong>Application-level Gateway</strong></li>
<li>Also called a proxy server</li>
<li>Acts as a relay of application-level traffic</li>
</ol>
<figure class="wp-block-table">
<table>
<tbody>
<tr>
<td><strong>Advantages of Application-level Gateway</strong></td>
<td><strong>Disadvantages of Application-level Gateway</strong></td>
</tr>
<tr>
<td>Higher security than packet filters Only need to scrutinize a few allowable applications Easy to log and audit all incoming traffic</td>
<td>Additional processing overhead on each connection (gateway as splice point)</td>
</tr>
</tbody>
</table>
</figure>
<ol type="i">
<li><strong>Circuit-Level Gateway</strong>
<ol>
<li>Sets up two TCP connections</li>
</ol>
<ol>
<li>The gateway typically relays TCP segments from one connection to the other without examining the contents</li>
</ol>
<ol>
<li>Stand-alone system</li>
</ol>
<ol>
<li>The specialized function performed by an Application-level Gateway</li>
</ol>
<ol>
<li>The security function consists of determining which connections will be allowed</li>
</ol>
<ol>
<li>Typically use is a situation in which the system administrator trusts the internal users</li>
</ol>
<ol>
<li>An example is the SOCKS package</li>
</ol>
</li>
</ol>
<p>Bastion Host</p>
<ul>
<li>A system identified by the firewall administrator as a critical strong point in the network´s security</li>
<li>The bastion host serves as a platform for an application-level or circuit-level gateway</li>
</ul>
<h2>WHAT YOU NEED TO KNOW ABOUT FIREWALL</h2>
<p><strong>BASIC CONCEPTS OF A FIREWALL</strong></p>
<p>To understand what a firewall is, one can only imagine it in terms of living things as a human organ known as the skin. Skin does not kill hostile foreign bodies, it simply interferes with them. For a person, for example, the loss of more than 50% skin will lead to death, simply because the immune system is unable to repel invaders in a large and exposed area. The same can be said of firewalls that do not have IDS (Intrusion Detection Systems) that can detect hostile attackers but simply reduce their access to your sensitive internal servers.</p>
<p>Well-designed and well-distributed, the firewall acts as a shield around your network like human skin. A firewall operates traffic by its policy. The policy contains a set of rules. A rule is an action performed in traffic that corresponds to a specific procedure. One rule has four basic elements:</p>
<p><strong>SOURCE</strong></p>
<ul>
<li>This is where the IP traffic is coming from and is comprised of the following</li>
<li>Single IP address or multiple IP addresses</li>
<li>One or more networks in the form of a network ID and subnet mask</li>
<li>A combination of IP addresses and Network addresses</li>
</ul>
<p><strong>DESTINATION</strong></p>
<ul>
<li>This is where the IP traffic is going to and is comprised of the following</li>
<li>Single IP address or multiple IP addresses</li>
<li>One or more networks in the form of a network ID and subnet mask</li>
<li>A combination of IP addresses and Network addresses</li>
</ul>
<p><strong>SERVICE</strong></p>
<ul>
<li>This is the type of protocol that the traffic is using and is comprised of the following</li>
<li>One or more destination TCP ports</li>
<li>One or more destination UDP ports</li>
<li>A group or combination of destination TCP and UDP ports</li>
<li>Although the source port can be limited to a certain range, it is generally left wide open. It is the destination port that is primarily specified.</li>
</ul>
<p><strong>ACTION</strong></p>
<ul>
<li>The administrator chooses from the following options if all the above three criteria match</li>
<li>Reject the traffic</li>
<li>Drop the traffic</li>
<li>Permit the traffic</li>
<li>Encrypt the traffic on IPSEC VPN capable firewalls</li>
</ul>
<p><strong>THE ROLE OF FIREWALLS</strong></p>
<figure class="wp-block-image size-large"><img decoding="async" class="wp-image-1185" src="https://palmacedar.com/wp-content/uploads/2021/07/9.jpg" sizes="(max-width: 416px) 100vw, 416px" srcset="https://palmacedar.com/wp-content/uploads/2021/07/9.jpg 400w, https://palmacedar.com/wp-content/uploads/2021/07/9-300x200.jpg 300w, https://palmacedar.com/wp-content/uploads/2021/07/9-16x12.jpg 16w" alt="" width="416" height="278" /></figure>
<p>A firewall is a term used for  “host”’ between a network of equipment and users operating under the same security policy and who is more trustworthy, as well as the outside world. In recent years, fireworks have become quite popular on the Internet. For the most part, this is because most existing apps are insecure, and are designed under the assumption that the equipment and users will trust each other.</p>
<p>There are two basic reasons for using a firewall right now: saving money on focusing your security on a small number of items, and simplifying system configuration by restricting access to only trusted devices. Firefighters are often viewed as annoying because they are often viewed as an obstacle to accessing resources. This is not a significant mistake of firewood, but rather the result of failure to comply with firewall upgrade requirements.</p>
<p>There is a large enough group of willing and capable people all over the world who are happy to get into the programs. Aside from the feeling of insecurity that has plagued society, the amount of real damage caused is very small. It emphasizes the fact that in reality any system can be disrupted if the enemy is adequately determined. It is a proven and authentic way to improve security within DOD projects so that a “ black hat ” organization tries to break into the systems rather than be found by your real enemies. By bringing system vulnerabilities forward, Internet hackers have provided this service, as well as the impetus to upgrade existing programs. It is probably a simple matter of saying thank you, but I believe it is better to raise these issues at a time when our society will be almost 100% dependent on information systems.</p>
<p><strong>Advantages Of A Firewall</strong></p>
<ul>
<li>Extended logging, in which a firewall can concentrate extended logging of network traffic on one system;</li>
<li>Centralized and simplified network services management, in which services such as FTP, electronic mail, gopher, and other similar services are located on the firewall system(s) as opposed to being maintained on many systems.</li>
<li>The concentration of security all modified software and logging is located on the firewall system as opposed to being distributed on many hosts;</li>
<li>Protocol filtering, where the firewall filters protocols and services that are either not necessary or that cannot be adequately secured from exploitation;</li>
<li>Information hiding, in w hic h a firewall can “hide”  name s of internal systems or electronic mail addresses, thereby revealing less information to outside hosts;</li>
<li>Application gateways, where the firewall requires inside or outside users to connect first to the firewall before connecting further, thereby filtering the protocol;</li>
</ul>
<p><strong>Disadvantages Of A Firewall</strong></p>
<ul>
<li>The most obvious being that certain types of network access may be hampered or even blocked for some hosts, including telnet, FTP, X Windows, NFS, NIS, etc. However, these disadvantages are not unique to firewalls; network access could be restricted at the host level as well, depending on a site’s security policy.</li>
<li>A second disadvantage with a firewall system is that it concentrates security in one spot as opposed to distributing it among systems, thus a compromise of the firewall could be disastrous to other less-protected systems on the subnet. This weakness can be countered; however, with the argument that lapses and weakness in security are more likely to be found as the number of systems in a subnet increase, thereby multiplying how subnets can be exploited.</li>
<li>Another disadvantage is that relatively few vendors have offered firewall systems until very recently. Most firewalls have been somewhat “hand-built” by site administrators, however, the time and effort that could go into constructing a firewall may outweigh the cost of a vendor solution. There is also no firm definition of what constitutes a firewall; the term “firewall” can mean many things to many people.</li>
</ul>
<p><strong>CONCLUSION</strong></p>
<figure class="wp-block-image size-large is-resized"><img decoding="async" class="wp-image-1186" src="https://palmacedar.com/wp-content/uploads/2021/07/10.jpg" sizes="(max-width: 383px) 100vw, 383px" srcset="https://palmacedar.com/wp-content/uploads/2021/07/10.jpg 1000w, https://palmacedar.com/wp-content/uploads/2021/07/10-300x200.jpg 300w, https://palmacedar.com/wp-content/uploads/2021/07/10-768x512.jpg 768w, https://palmacedar.com/wp-content/uploads/2021/07/10-16x12.jpg 16w" alt="" width="383" height="255" /></figure>
<p>The network design that suits your environment depends on the type of application and the risks you are trying to minimize by setting up a secure environment around your servers. As we discussed, relying on a single firewall or merging system tiers on a single subnet often lowers the amount of control you have over how app components are accessed.</p>
<p>One of the best things about a firewall with security is that it prevents anyone outside from accessing the computer on your private network. While this is a big deal for businesses, many home networks will probably not be threatened in this way. However, setting the firewall in place provides peace of mind.</p>
<p>At Palmacedar Limited we deal with network solutions. <a href="https://palmacedar.com/contact/">Get in touch</a> with us today</p>
]]></content:encoded>
					
					<wfw:commentRss>https://palmacedar.com/what-you-need-to-know-about-firewall/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
