Configuring Your Internet Connection and Firewall on Linux
Even with the many new Internet service providers available today, people still use the Internet for all their basic needs. The Internet has become so intertwined into our daily lives that we no longer think about it as a way to do things. Instead, most people see the Internet as being a helpful means to getting information and staying in touch with family and friends. It is also a source of entertainment, shopping, and communication. What most people do not realize is that the Internet also provides you with a wealth of opportunities for making money.
The Internet works on data packets of information sent and received. In a simple Internet usage example, when you visit a website, it takes a “data packet” from your computer to the website you are visiting and then to the server where that data packet is stored until it is received by the website you were previously at. Assuming you have a high-speed internet connection, the data packets usually travel at the same speed regardless of whether they have originated in the network of your own computer or in the network of another web address. When it arrives, the data packet is encapsulated within an outgoing IP (Internet Protocol) address.
Based on how the Internet is setup, any machine that gets access to this IP address has the rights to continue to use and receive data packets, even though they may not be able to view them. This makes the Internet vulnerable to hackers. If an unauthorized person gains access to your internet connection, they can read your email, change your passwords and screens, delete files, lock your system, perform unauthorized online services such as social networks and search online using keywords, and much more. Some of these activities are done without you knowing it.
To protect against this type of attack, there are some improvements that can be made to internet systems, such as security authentication, and adding sensors to help prevent intrusion attempts. In addition to security authentication, you should also consider adding Internet cameras to your network. Internet cameras are helpful in deterring intruders because they record IP addresses, which are useful in tracking down perpetrators. You can install Internet cameras at several points to ensure that your system is not only safe but well protected from intruders.
There is also the option of using transport control protocol (TCP) to filter and manage all outgoing packets. The TCP/IP protocol controls the way packets are transmitted and received on a network. It is imperative that you familiarize yourself with all of the protocols that are involved so you can establish rules for controlling what types of traffic are allowed through your firewall and network. Traffic that you do not want to be allowed to pass through will be shown as an “excluded host” on your Internet screen. Similarly, traffic that you do want to be allowed to enter will be shown as a “target host” on your screen.
Lastly, you need to consider how your IP network will interact with other internet devices. If you have any wireless enabled devices, such as laptops, you will need to configure them to use a specific network if you intend to configure your firewall and Internet connection in the same manner. The same goes for wired devices. If you connect a cable modem to a wireless router, for example, they will automatically use the default wireless network unless you specify otherwise. Similarly, if you connect other internet devices to your router, they will only communicate with each other if they know and use a secure connection.