Loading…
Fight adware, spyware, viruses and more before it's too late
A firewall is the next item you need in your toolbox. Simply put, a firewall is there to protect your computer from unauthorized access through "unprotected ports." A good firewall will block unauthorized inbound access (coming from another computer) or outbound access (a program on your c...
Saved in:
Published in: | Professional distributor 2008-09, Vol.16 (7), p.26 |
---|---|
Main Author: | |
Format: | Magazinearticle |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | 7 |
container_start_page | 26 |
container_title | Professional distributor |
container_volume | 16 |
creator | Woodman, Craig |
description | A firewall is the next item you need in your toolbox. Simply put, a firewall is there to protect your computer from unauthorized access through "unprotected ports." A good firewall will block unauthorized inbound access (coming from another computer) or outbound access (a program on your com- puter trying to send something). Sometimes programs, unknown to you, will wander the Internet looking for computers that are open to communication. |
format | magazinearticle |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_230473357</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1583451141</sourcerecordid><originalsourceid>FETCH-proquest_miscellaneous_2304733573</originalsourceid><addsrcrecordid>eNqNyksKwjAUQNEgCtbPHjLrxEI-pnHgTCwuwHmJ9lUjaVPzEsXdi-gCHJ07uCOSCa5YIdiGjUnGlZJFKTifkhnijTGpS60zsq3s5RqpaZ4mwIri8PrGw4aEgNT0De18AHqC9oONOdLoPXUmwoJMWuMQlj_nJK_2x92hGIK_J8BYdxbP4JzpwSeshWRrLaXS8v_zDcenO7M</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>230473357</pqid></control><display><type>magazinearticle</type><title>Fight adware, spyware, viruses and more before it's too late</title><source>Nexis UK</source><creator>Woodman, Craig</creator><creatorcontrib>Woodman, Craig</creatorcontrib><description>A firewall is the next item you need in your toolbox. Simply put, a firewall is there to protect your computer from unauthorized access through "unprotected ports." A good firewall will block unauthorized inbound access (coming from another computer) or outbound access (a program on your com- puter trying to send something). Sometimes programs, unknown to you, will wander the Internet looking for computers that are open to communication.</description><identifier>ISSN: 1553-6211</identifier><identifier>EISSN: 2150-2080</identifier><language>eng</language><publisher>Fort Atkinson: Endeavor Business Media</publisher><subject>Anti-virus software ; Customer information files ; Cybersecurity ; Data integrity ; Distributors ; Firewalls ; Internet access ; Software upgrading ; Spyware ; Viruses</subject><ispartof>Professional distributor, 2008-09, Vol.16 (7), p.26</ispartof><rights>Copyright Cygnus Business Media Sep 2008</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>780,784</link.rule.ids></links><search><creatorcontrib>Woodman, Craig</creatorcontrib><title>Fight adware, spyware, viruses and more before it's too late</title><title>Professional distributor</title><description>A firewall is the next item you need in your toolbox. Simply put, a firewall is there to protect your computer from unauthorized access through "unprotected ports." A good firewall will block unauthorized inbound access (coming from another computer) or outbound access (a program on your com- puter trying to send something). Sometimes programs, unknown to you, will wander the Internet looking for computers that are open to communication.</description><subject>Anti-virus software</subject><subject>Customer information files</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>Distributors</subject><subject>Firewalls</subject><subject>Internet access</subject><subject>Software upgrading</subject><subject>Spyware</subject><subject>Viruses</subject><issn>1553-6211</issn><issn>2150-2080</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2008</creationdate><recordtype>magazinearticle</recordtype><recordid>eNqNyksKwjAUQNEgCtbPHjLrxEI-pnHgTCwuwHmJ9lUjaVPzEsXdi-gCHJ07uCOSCa5YIdiGjUnGlZJFKTifkhnijTGpS60zsq3s5RqpaZ4mwIri8PrGw4aEgNT0De18AHqC9oONOdLoPXUmwoJMWuMQlj_nJK_2x92hGIK_J8BYdxbP4JzpwSeshWRrLaXS8v_zDcenO7M</recordid><startdate>20080901</startdate><enddate>20080901</enddate><creator>Woodman, Craig</creator><general>Endeavor Business Media</general><scope>3V.</scope><scope>4T-</scope><scope>7WY</scope><scope>7XB</scope><scope>883</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>HCIFZ</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L6V</scope><scope>M0F</scope><scope>M7S</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope></search><sort><creationdate>20080901</creationdate><title>Fight adware, spyware, viruses and more before it's too late</title><author>Woodman, Craig</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_miscellaneous_2304733573</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Anti-virus software</topic><topic>Customer information files</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>Distributors</topic><topic>Firewalls</topic><topic>Internet access</topic><topic>Software upgrading</topic><topic>Spyware</topic><topic>Viruses</topic><toplevel>online_resources</toplevel><creatorcontrib>Woodman, Craig</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>ABI/INFORM Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest</collection><collection>Engineering Database</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><jtitle>Professional distributor</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Woodman, Craig</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Fight adware, spyware, viruses and more before it's too late</atitle><jtitle>Professional distributor</jtitle><date>2008-09-01</date><risdate>2008</risdate><volume>16</volume><issue>7</issue><spage>26</spage><pages>26-</pages><issn>1553-6211</issn><eissn>2150-2080</eissn><abstract>A firewall is the next item you need in your toolbox. Simply put, a firewall is there to protect your computer from unauthorized access through "unprotected ports." A good firewall will block unauthorized inbound access (coming from another computer) or outbound access (a program on your com- puter trying to send something). Sometimes programs, unknown to you, will wander the Internet looking for computers that are open to communication.</abstract><cop>Fort Atkinson</cop><pub>Endeavor Business Media</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1553-6211 |
ispartof | Professional distributor, 2008-09, Vol.16 (7), p.26 |
issn | 1553-6211 2150-2080 |
language | eng |
recordid | cdi_proquest_miscellaneous_230473357 |
source | Nexis UK |
subjects | Anti-virus software Customer information files Cybersecurity Data integrity Distributors Firewalls Internet access Software upgrading Spyware Viruses |
title | Fight adware, spyware, viruses and more before it's too late |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T10%3A36%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Fight%20adware,%20spyware,%20viruses%20and%20more%20before%20it's%20too%20late&rft.jtitle=Professional%20distributor&rft.au=Woodman,%20Craig&rft.date=2008-09-01&rft.volume=16&rft.issue=7&rft.spage=26&rft.pages=26-&rft.issn=1553-6211&rft.eissn=2150-2080&rft_id=info:doi/&rft_dat=%3Cproquest%3E1583451141%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_miscellaneous_2304733573%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=230473357&rft_id=info:pmid/&rfr_iscdi=true |