Connecting your naked PC to the Internet is like leaving your
house unlocked--eventually, someone will wander in, rifle your underwear
drawer, and empty the jewelry case. To make your system's points of
entry more Net secure, install one of the many free software firewalls
now available, and set up a hardware-based firewall for backup.
Firewalls are difficult to understand and configure, even for
experienced computer users. If you've been putting off installing a
firewall, or if you aren't sure how to determine whether your firewall
is protecting you fully, I'm here to explain it all.
According to Merriam-Webster, the original meaning of
fire wall
was "a wall constructed to prevent the spread of fire." Computer
firewalls are constructed to prevent unwanted intrusions from the
Internet into your PC. But unlike fire, Net threats don't leap onto your
machine through mere proximity. They arise when someone exploits a
combination of your PC's unique IP (Internet protocol) address and one
or more of the thousands of TCP (transmission control protocol) and UDP
(universal datagram protocol) ports that serve as the door to your
system.
Anytime you use a browser, an e-mail program, or other software to
retrieve information from a Web site, ISP, or remote server, the data
flows through one or more of these ports. Whether the malefactor is a
teenage hacker trying to access your PC, a bit of spyware attempting to
talk to a remote server, or a Windows XP Messenger Service spam pop-up,
their strategy is the same: Find an open port leading into your PC, or
trick your system into opening one.
Firewalls watch these thousands of ports--present in both dial-up
and broadband Internet connections--and deny access to unauthorized
traffic. Hardware-based firewalls are usually integrated into router and
gateway products and sit between your PC and a cable or DSL modem.
Software-based firewalls run on your PC. Hardware firewalls are great
for protecting a network of PCs that share a broadband connection.
More important than the router's actual firewall, however, is the
fact that it usually incorporates an NAT (network address translation)
server that hides your networked computers' IP addresses (and thus,
their existence) from anyone outside the local network.
For this reason alone, a hardware firewall is a wise investment
for broadband users, even those who have only one computer. You can
obtain a four-port cable/DSL router such as Linksys's BEFSR41 or
D-Link's DI-704P for just $40 to $50, and models that include a wireless
access point cost only a bit more (
PC World's Product Finder page lists a number of
routers that are currently available ).
A Firewall on Every PC
Hardware routers are highly configurable: You can usually set them
to block all incoming and outgoing traffic except through a few key
ports you designate. Programming an external device to protect your PC
is a lot of work, however.
Firewall software that runs on your PC is
easier to set up and maintain. Besides blocking uninvited traffic at
your ports, software firewalls can prevent programs that run on your
computer (including such malefactors as Trojan horses, spyware, and
backdoor software) from sending data to remote servers, and from
accepting incoming connections.
If you connect to the Internet exclusively through a dial-up
modem, an external, hardware-based firewall won't do you much good. A
software firewall is perfect for protecting a dial-up connection.
Windows XP users may be tempted to rely exclusively on the operating
system's integrated Internet Connection Firewall. To enable it, click
Start, Control Panel, Network Connections (in XP's Category View, first click
Network and Internet Connections). Then right-click the Internet connection you want to protect, choose
Properties, Advanced, put a check next to the option
Protect my computer and network by limiting or preventing access to this computer from the Internet, and click
OK.
Withhold your sigh of relief, however. Though it's better than no
firewall at all--and compatible with any others you may use--XP's
firewall monitors incoming connections only. Should Back Orifice,
NetBus, or any other backdoor program find its way onto your PC, XP's
firewall will do nothing to stop it from granting scoundrels remote
access to your system.
Pick Your Freebie
I've used four no-cost firewalls on various PCs: Kerio Personal
Firewall 2; Outpost Firewall Free, from Agnitum Limited; Sygate Personal
Firewall 5.1; and Zone Labs' ZoneAlarm 3.7. Though they differ in the
features they offer and the help they provide, all of these programs
will stoutly defend your PC . A software firewall is easy to
install, but it requires a brief training period as the firewall
detects your browser, e-mail, network, and other programs that attempt
to connect with remote servers.
All four software firewalls pop up warning dialog boxes when a
program attempts to connect for the first time. You simply click the
button that permits or disallows the connection. Most also provide an
optional check box so you can turn your choice into a permanent,
automatic firewall rule.
After you've gone about your usual online business for a day or two,
creating firewall rules along the way, you may not need to interact with
your firewall again until you add or upgrade an Internet utility.
The trick to responding appropriately to firewall warnings and
creating effective rules is knowing which programs are safe and which
are not. You'll easily recognize many of the more-common applications by
name--Outlook, Internet Explorer, and Netscape, for example. Other
programs, however, aren't exactly household names.
For example, many of
Windows XP's networking features are handled by a program called
svchost.exe, a fact that none of us should be expected to know (though
you do now). Conversely, spyware and other unwanted pests may use
safe-sounding or familiar names like "clever screensaver" that entice
you to grant them network access. What's a firewall jockey to do? For
starters, avoid the temptation to be lax. Instead, deny access to any
program that you're at all unsure about--you'll have plenty of chances
to change your mind later.
If your knowledge of which programs are safe is shaky, choose a
firewall that provides more information about the program in question
than just its file name. Kerio and Sygate don't offer many hints as to
whether a detected program is safe, and they eschew nonfirewall bonus
features. This arrangement may suit expert users, but novices will
benefit from a more informative firewall.
ZoneAlarm offers a bit more information about detected programs,
including a link in the warning dialog box to a description of the
program in question on Zone Labs' Web site .
ZoneAlarm also preconfigures itself by default to permit connections
from Internet Explorer and Windows XP's svchost.exe component,
minimizing the number of decisions you'll need to make about granting
these applications Internet access.
Outpost's pop-up dialog box creates a permanent rule for you by default, but you can opt out of the rule by clicking the
Allow once or
Block once
buttons instead. Despite being laden with nifty features such as ad and
pop-up blocking and e-mail attachment protection, Outpost provides the
same minimal information about the detected program as do Kerio and
Sygate.
Fine-Tuning Filters
Once you've completed the basic firewall configuration, you may
want to change, delete, or fine-tune the rules you created. All four of
these firewalls maintain a list of rules or known programs.
Kerio: Right-click the program's system tray icon and choose
Administration, Firewall, Advanced. In the list of known programs, select the program whose filter rule you want to modify, and click
Edit to open the 'Filter rule' dialog box.
To switch the program's basic default status, select either
Permit or
Deny
at the bottom of the dialog box. Other options let you restrict the
remote server IP addresses and incoming and outgoing ports that the
program uses. If you know what those are and why you'd want to specify
them, you're probably reading this column just to see what errors it
contains. The rest of us can live with the default settings. Click
OK to save any changes.
Outpost: Right-click the program's system tray icon and choose
Options, Application. Select a program in the list of blocked, partially allowed, and trusted applications, and click
Edit. Choose
Always block this app or
Always trust this app
to move it to the appropriate category. Your best step, however, may be
to select a trusted application and move it to the partially blocked
list (by clicking
Edit and choosing
Create rules using preset, Browser,
for example); this maneuver grants the program Internet access, but
under a constrained set of rules.
The browser rule set (Outpost also
comes with rules for e-mail, instant messaging, and other programs)
limits an app to the handful of inbound and outbound protocols (TCP or
UDP) and ports needed by a Web browser, thereby minimizing the damage a
malicious Web site or HTML e-mail message can do.
Sygate: To change program rules,
right-click Sygate's system tray icon and choose Applications. In the
list of known applications, right-click the program whose rule you want
to modify, and choose either Allow or Block. Choosing Ask tells Sygate
to prompt you to allow or deny Internet access every time the program
seeks it.
ZoneAlarm: To modify program permissions, right-click the ZoneAlarm system tray icon and choose
Restore ZoneAlarm Control Center (or just switch to it, if it's already running). Select
Program Control on the left, and then select the
Programs
tab at the upper-right. To change one of the program's four settings
(the ability to access remote servers or to act as a server itself in
both the Internet and Trusted Zones), click the check mark (allowing
access), the X (blocking access), or the question mark (instructing
ZoneAlarm to ask you each time the program seeks access); then choose a
new default action from the pop-up menu.
Working With Windows Networks
Another setting you may want to change, or at least check, is how your firewall works with networks of Windows PCs:
Kerio: By
default, this firewall disables Windows networking because enabling it
would allow other PCs on the local Windows network to access your shared
folders and printers only after you entered their IP addresses. To
allow access to a particular PC, right-click Kerio's system-tray icon
and choose
Administration,Microsoft Networking. To enter a single trusted address, click
Add, select
Single address in the 'Address type' list, enter the allowed IP address in the 'Host address' field, and click
OK.
If your Windows network is shielded from the Internet by a router-based
firewall that blocks the Windows Networking UDP ports (137-139), you
can safely allow any computer on the local network to access your shared
files and printers, by unchecking
From Trusted Addresses Only and clicking
OK.
Outpost: Right-click Outpost's system-tray icon, choose
Options,System, check
Allow NetBios communication, and click
OK.
If your computer connects directly to the Internet, leave this option
unchecked to avoid broadcasting your PC's existence beyond the firewall.
Sygate: By default, Sygate allows
other PCs on a Windows network to browse--but not access--your files and
printers. To enable sharing, right-click the firewall's system tray
icon and choose
Options,Network Neighborhood. From the drop-down list, select the network interface you use to connect to the Windows network, check
Allow others to share my files and printer(s), and click
OK. Sygate's default setting allows only PCs on the local network to browse and access your files and printers (choose the
Security tab to view this and other settings).
ZoneAlarm:
This firewall grants file and printer sharing access to trusted
computers by default--all you have to do is fill in the IP addresses of
those machines. To do so, right-click the ZoneAlarm system-tray icon and
choose
Restore ZoneAlarm Control Center (or just switch to it, if it's already running). Select
Firewall on the left, and then choose the
Zones tab at the upper-right. Click
Add,IP Address, enter the IP address of the system you want to add to the Trusted Zone, and click
OK.
Revision Control: Firewall Free-for-All
With nothing to lose and everything to gain, you should install one of these free firewalls on your PC.
Kerio Personal Firewall 2: The perfect firewall freebie for power users,
Kerio Personal Firewall 2 lets you fine-tune application rules to restrict access to and from specific IP addresses and ports; 2MB.
Outpost Firewall Free:
Agnitum's no-cost
firewall brims with extra features, including ad and pop-up blockers,
Web site content filtering, mail attachment filtering, and a
surf-speeding DNS cache; 2.5MB.
Sygate Personal Firewall 5.1:
Sygate's no-frills interface provides fine-grained control over how and when applications can connect to remote servers; 5.2MB.
ZoneAlarm 3.7.202:
Zone Labs'
novice-friendly firewall includes a mail-scanning feature that
quarantines dangerous Visual Basic Script (.vbs) attachments; 3.6MB.
Send your questions and tips to
nettips@spanbauer.com. We pay $50 for published items.
Click here for more Internet Tips. Scott Spanbauer is a contributing editor for
PC World.