Solved

Virus & Security on Network

Posted on 2002-06-05
4
166 Views
Last Modified: 2013-11-16
I have a laptop (client) computer which shares cable Internet with my desktop (host) computer.

If my host computer is running an anti-virus program as well as a security program (Zone Alarm), is the client computer protected by these programs when accessing the Internet?
0
Comment
Question by:heat_doctor
  • 2
4 Comments
 
LVL 3

Expert Comment

by:mpltech
ID: 7057616
yes and no

your client computer is essentially using the host system as a firewall, and is therefore protected from being accessed directly from the internet. Zonealarm is not responsible for this protection, rather it is inherant in the way your network is set up. The host system, on the other hand, is directly addressable from the internet, so you've definately got Zonealarm on the right system.

your laptop, however, is not protected from viruses in any way.





0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 7058030
Actually this depends on how things are setup. If your sharing the cable connection via a hub your host pc isn't protecting the laptop from anything, firewall or AV. If it is setup via the Internet Connection Sharing on the host pc then the above statements would apply.

TooKoolKris
MCSE+I, CCNA, A+
0
 
LVL 3

Accepted Solution

by:
mpltech earned 50 total points
ID: 7058203
agreed, I just had a little background info from another question. He's using ICS I believe.




0
 

Author Comment

by:heat_doctor
ID: 7059739
Yes, indeed!
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now