{"video_id":"N2sOPGhva1M","title":"Firewalls as Fast As Possible","channel":"Techquickie","show":"Techquickie","published_at":"2015-05-07T14:58:16Z","duration_s":282,"segments":[{"start_s":0.08,"end_s":7.759,"text":"were most people asked to imagine a wall of fire they might think of the pyrot","speaker":null,"is_sponsor":0},{"start_s":4.759,"end_s":10.44,"text":"teic seen on any First Rate metal band","speaker":null,"is_sponsor":0},{"start_s":7.759,"end_s":15.2,"text":"stage but unfortunately firewall Protection Services aren't quite as awe","speaker":null,"is_sponsor":0},{"start_s":12.84,"end_s":19.72,"text":"inspiring as all that that's not to imply though that they aren't terribly","speaker":null,"is_sponsor":0},{"start_s":17.0,"end_s":24.039,"text":"important or that meltdowns caused by failing to ensure proper firewall","speaker":null,"is_sponsor":0},{"start_s":21.64,"end_s":28.84,"text":"protections can't be as damaging as the direct blast of a flamethrower firewalls","speaker":null,"is_sponsor":0},{"start_s":26.84,"end_s":33.559,"text":"adopt their name and function directly from physical structure stres that stand","speaker":null,"is_sponsor":0},{"start_s":30.8,"end_s":37.48,"text":"between danger often fire and fragile stuff like your face and computer","speaker":null,"is_sponsor":0},{"start_s":35.8,"end_s":42.16,"text":"firewalls actually do bear some similarity to their RL counterparts they","speaker":null,"is_sponsor":0},{"start_s":40.32,"end_s":46.12,"text":"work to protect users and their information not from thermal energy but","speaker":null,"is_sponsor":0},{"start_s":43.92,"end_s":49.48,"text":"instead from the scum and villainy which occupy The Wretched hives of the open","speaker":null,"is_sponsor":0},{"start_s":47.76,"end_s":53.76,"text":"internet generally speaking there are two layers of firewall protection which","speaker":null,"is_sponsor":0},{"start_s":51.399,"end_s":58.92,"text":"operate in conjunction with both hard and software to carry out a given set of","speaker":null,"is_sponsor":0},{"start_s":56.44,"end_s":62.719,"text":"rules Hardware firewall Solutions are automatically built into to the routers","speaker":null,"is_sponsor":0},{"start_s":60.68,"end_s":66.56,"text":"that most of us are using today these work by tagging all outgoing traffic","speaker":null,"is_sponsor":0},{"start_s":64.839,"end_s":71.759,"text":"from a private Network like the one in our home with a specific network ID that","speaker":null,"is_sponsor":0},{"start_s":69.72,"end_s":75.6,"text":"is then also attached to any corresponding incoming traffic this","speaker":null,"is_sponsor":0},{"start_s":74.08,"end_s":80.24,"text":"allows the router to determine the origin of incoming packets blocking any","speaker":null,"is_sponsor":0},{"start_s":78.08,"end_s":84.68,"text":"transfers which weren't initiated from behind the firewall it also prevents","speaker":null,"is_sponsor":0},{"start_s":82.72,"end_s":89.32,"text":"files from being downloaded without a user's knowledge and stops firststep","speaker":null,"is_sponsor":0},{"start_s":87.0,"end_s":93.159,"text":"intrusions known as port scan attacks letting us feel feel safe that the","speaker":null,"is_sponsor":0},{"start_s":91.04,"end_s":96.6,"text":"update for our favorite new game is what it says and not some piece of spyware","speaker":null,"is_sponsor":0},{"start_s":95.32,"end_s":101.439,"text":"that will constantly spam us with adverts for pills that improve performance I'm not sure where I got the","speaker":null,"is_sponsor":0},{"start_s":99.119,"end_s":105.32,"text":"idea I need those from software-based protections function by monitoring the","speaker":null,"is_sponsor":0},{"start_s":103.24,"end_s":109.399,"text":"Integrity of flowing traffic processes through variables such as incoming and","speaker":null,"is_sponsor":0},{"start_s":107.079,"end_s":113.88,"text":"destination IP addresses transfer times or download sizes and killing","speaker":null,"is_sponsor":0},{"start_s":111.399,"end_s":117.439,"text":"connections that don't meet expectations these are advantageous because they","speaker":null,"is_sponsor":0},{"start_s":115.439,"end_s":122.6,"text":"monitor outgoing traffic as well as incoming blocking programs such as IP","speaker":null,"is_sponsor":0},{"start_s":120.479,"end_s":126.52,"text":"spoofing ones from attacking individual machines once they've infiltrated a","speaker":null,"is_sponsor":0},{"start_s":124.759,"end_s":130.52,"text":"network these are what allow us to transfer files between our friends","speaker":null,"is_sponsor":0},{"start_s":128.399,"end_s":134.84,"text":"without worrying that a third party has attached something along the way or feel","speaker":null,"is_sponsor":0},{"start_s":132.959,"end_s":139.04,"text":"safe when constantly transferring packets during things such as an online","speaker":null,"is_sponsor":0},{"start_s":137.36,"end_s":144.0,"text":"gaming session knowing that any unapproved packets will be detected by","speaker":null,"is_sponsor":0},{"start_s":141.08,"end_s":148.48,"text":"the firewall in fact often times the largescale data thefts we hear about","speaker":null,"is_sponsor":0},{"start_s":146.12,"end_s":152.92,"text":"come as a result of some entity which has gone and painted a giant Target on","speaker":null,"is_sponsor":0},{"start_s":150.84,"end_s":157.36,"text":"their back by not implementing strong enough active firewall protection","speaker":null,"is_sponsor":0},{"start_s":154.68,"end_s":163.08,"text":"allowing unwanted information transfers to remain disguised as authentic ones so","speaker":null,"is_sponsor":0},{"start_s":161.0,"end_s":167.56,"text":"while in theory firewall protections work as seamlessly as their physical","speaker":null,"is_sponsor":0},{"start_s":165.2,"end_s":171.64,"text":"predecessors in practice these types of solutions can require a little bit more","speaker":null,"is_sponsor":0},{"start_s":169.84,"end_s":176.84,"text":"attention than your average W made of brick pretty well anyone who has ever","speaker":null,"is_sponsor":0},{"start_s":173.8,"end_s":179.0,"text":"installed a new game or component has","speaker":null,"is_sponsor":0},{"start_s":176.84,"end_s":182.68,"text":"run into that annoying Windows prompt asking them if they're really sure they","speaker":null,"is_sponsor":0},{"start_s":180.599,"end_s":185.4,"text":"wish to connect and update the software which won't even be enough if your","speaker":null,"is_sponsor":0},{"start_s":184.28,"end_s":191.84,"text":"router doesn't automatically get configured in the process and they can be used for things like Regional","speaker":null,"is_sponsor":0},{"start_s":189.08,"end_s":195.879,"text":"information censorship as well but while they're not all good news no matter how","speaker":null,"is_sponsor":0},{"start_s":194.04,"end_s":201.12,"text":"arbitrary a warning message might seem or how annoying its accompanying beep is","speaker":null,"is_sponsor":0},{"start_s":198.64,"end_s":205.08,"text":"these grievances are nothing compared to the sound your customers and partners","speaker":null,"is_sponsor":0},{"start_s":202.92,"end_s":210.72,"text":"will make when all of their credit cards and other information has been stolen","speaker":null,"is_sponsor":0},{"start_s":208.08,"end_s":218.159,"text":"why did they put a that logo behind me speaking of logos let's swap that out","speaker":null,"is_sponsor":0},{"start_s":214.239,"end_s":221.4,"text":"fractal Josh has decided to mercifully","speaker":null,"is_sponsor":0},{"start_s":218.159,"end_s":224.239,"text":"spare me this week all I have to do this","speaker":null,"is_sponsor":0},{"start_s":221.4,"end_s":229.04,"text":"time is tell you guys about their Sleek clean Scandinavian design their","speaker":null,"is_sponsor":0},{"start_s":226.92,"end_s":234.519,"text":"excellent cases power supplies and cooling products and how you can check","speaker":null,"is_sponsor":0},{"start_s":231.439,"end_s":236.76,"text":"those out at fractal dasd design.com","speaker":null,"is_sponsor":0},{"start_s":234.519,"end_s":240.56,"text":"that's all I have to say but actually there's another thing I have to say that","speaker":null,"is_sponsor":0},{"start_s":237.959,"end_s":244.0,"text":"was a total lie he's put me through a lot over the last 10 months and","speaker":null,"is_sponsor":0},{"start_s":242.799,"end_s":247.879,"text":"apparently there's going to be a clip show or something like that so it's not","speaker":null,"is_sponsor":0},{"start_s":246.159,"end_s":250.28,"text":"actually really any less embarrassing if I don't have to do those things again if","speaker":null,"is_sponsor":0},{"start_s":249.159,"end_s":256.519,"text":"I'm showing them to you guys again but don't worry too much about that the point is Josh wants you to let fractal","speaker":null,"is_sponsor":0},{"start_s":254.2,"end_s":261.32,"text":"design know what you thought of this whole humiliate Linus promotion on their","speaker":null,"is_sponsor":0},{"start_s":259.32,"end_s":265.52,"text":"Facebook page the should they bring these spots back what do you want to see","speaker":null,"is_sponsor":0},{"start_s":263.4,"end_s":270.28,"text":"from them in the future so that's pretty much it there's","speaker":null,"is_sponsor":0},{"start_s":268.04,"end_s":273.24,"text":"a link in the video description thanks for watching this episode as fast as","speaker":null,"is_sponsor":0},{"start_s":271.96,"end_s":278.12,"text":"possible guys like this video if you liked it dislike it if you thought it stunk leave a comment under the video if","speaker":null,"is_sponsor":0},{"start_s":276.479,"end_s":283.88,"text":"you have suggestions for future episodes and as always don't forget to subscribe","speaker":null,"is_sponsor":0},{"start_s":279.759,"end_s":283.88,"text":"and follow and all that good stuff","speaker":null,"is_sponsor":0}],"full_text":"were most people asked to imagine a wall of fire they might think of the pyrot teic seen on any First Rate metal band stage but unfortunately firewall Protection Services aren't quite as awe inspiring as all that that's not to imply though that they aren't terribly important or that meltdowns caused by failing to ensure proper firewall protections can't be as damaging as the direct blast of a flamethrower firewalls adopt their name and function directly from physical structure stres that stand between danger often fire and fragile stuff like your face and computer firewalls actually do bear some similarity to their RL counterparts they work to protect users and their information not from thermal energy but instead from the scum and villainy which occupy The Wretched hives of the open internet generally speaking there are two layers of firewall protection which operate in conjunction with both hard and software to carry out a given set of rules Hardware firewall Solutions are automatically built into to the routers that most of us are using today these work by tagging all outgoing traffic from a private Network like the one in our home with a specific network ID that is then also attached to any corresponding incoming traffic this allows the router to determine the origin of incoming packets blocking any transfers which weren't initiated from behind the firewall it also prevents files from being downloaded without a user's knowledge and stops firststep intrusions known as port scan attacks letting us feel feel safe that the update for our favorite new game is what it says and not some piece of spyware that will constantly spam us with adverts for pills that improve performance I'm not sure where I got the idea I need those from software-based protections function by monitoring the Integrity of flowing traffic processes through variables such as incoming and destination IP addresses transfer times or download sizes and killing connections that don't meet expectations these are advantageous because they monitor outgoing traffic as well as incoming blocking programs such as IP spoofing ones from attacking individual machines once they've infiltrated a network these are what allow us to transfer files between our friends without worrying that a third party has attached something along the way or feel safe when constantly transferring packets during things such as an online gaming session knowing that any unapproved packets will be detected by the firewall in fact often times the largescale data thefts we hear about come as a result of some entity which has gone and painted a giant Target on their back by not implementing strong enough active firewall protection allowing unwanted information transfers to remain disguised as authentic ones so while in theory firewall protections work as seamlessly as their physical predecessors in practice these types of solutions can require a little bit more attention than your average W made of brick pretty well anyone who has ever installed a new game or component has run into that annoying Windows prompt asking them if they're really sure they wish to connect and update the software which won't even be enough if your router doesn't automatically get configured in the process and they can be used for things like Regional information censorship as well but while they're not all good news no matter how arbitrary a warning message might seem or how annoying its accompanying beep is these grievances are nothing compared to the sound your customers and partners will make when all of their credit cards and other information has been stolen why did they put a that logo behind me speaking of logos let's swap that out fractal Josh has decided to mercifully spare me this week all I have to do this time is tell you guys about their Sleek clean Scandinavian design their excellent cases power supplies and cooling products and how you can check those out at fractal dasd design.com that's all I have to say but actually there's another thing I have to say that was a total lie he's put me through a lot over the last 10 months and apparently there's going to be a clip show or something like that so it's not actually really any less embarrassing if I don't have to do those things again if I'm showing them to you guys again but don't worry too much about that the point is Josh wants you to let fractal design know what you thought of this whole humiliate Linus promotion on their Facebook page the should they bring these spots back what do you want to see from them in the future so that's pretty much it there's a link in the video description thanks for watching this episode as fast as possible guys like this video if you liked it dislike it if you thought it stunk leave a comment under the video if you have suggestions for future episodes and as always don't forget to subscribe and follow and all that good stuff"}