Article published on:

Nowadays operating systems have a function within their program, to block certain functions that may be harmful. Indeed, it is designed to protect the data of a network. To do this, it filters the data entering and leaving the computer network. This tool is governed by the system administrator in order to operate as the system administrator does. wishes.
This system includes a function to govern the authorizations of the various connections on the network. Indeed, it is possible for us to help of this tool to refuse all incoming connections, thus avoiding various situations compromising, such as remote access to the platform. These rules allow to implement a filtering method depending on the policy of security adopted by an entity.
In companies, there are two main types of security policy of the the next two:

  • This is either to allow only communications that have been explicitly authorized.
  • Either to prevent exchanges that have previously been prohibited.

The first method is the safest, as it avoids trade diversion prohibited by the administrator, which allows you to reduce the chances of hackers to control connections. However, this requires a precise and binding definition of the needs in communication.
To implement this filtering principle, go to the configuration, then to define the parameters of the firewall mode. For maximum security you can block all incoming connections. However, if you are using applications that require a incoming connection it is recommended to use the first method which consists in authorizing only communications that have been explicitly authorized.

My different projects


Card image cap

System and Networks

In this section you will find various articles on the creation of systems/softwares infrmatic, in particular the creation of servers (mail, active directory server, etc.) ...

Card image cap


In this section you will find documents explaining different programming languages but also some of my achievements.

Card image cap

Technological Watch

Technological monitoring makes it possible to keep abreast of new technologies implemented. Here you will find a technological watch oriented towards the world of computer science. Come and discover the new technologies implemented by these in the last few years.

Card image cap

Legal Watch

Legal monitoring is specialized in the field of law. It consists in being aware of be aware of the new legal provisions. This consists of know its implementation, with the rights and duties that we must provide. Here the legal watch will be focused on the IT world.