How The Technology Works - Deepstash
How The Technology Works

How The Technology Works

When a firewall checks if data can enter your network, it'll read a message that comes with it called metadata. This will list a string of numbers indicating where the data has come from (known as the source address), where it's going (the 'destination address' aka your PC) and over which port.

Whether the data has permission will all depend on a set of rules known as a protocol. These rules can be set to prevent you — or any other particular user – from uploading certain files to the internet.

4

20 reads

CURATED FROM

IDEAS CURATED BY

alana_

Unapologetic reader and proud communicator. Chocolate and coffee everyday.

The idea is part of this collection:

Hiring Without an Office

Learn more about technologyandthefuture with this collection

How to build trust in a virtual environment

How to manage remote teams effectively

How to assess candidates remotely

Related collections

Read & Learn

20x Faster

without
deepstash

with
deepstash

with

deepstash

Personalized microlearning

100+ Learning Journeys

Access to 200,000+ ideas

Access to the mobile app

Unlimited idea saving

Unlimited history

Unlimited listening to ideas

Downloading & offline access

Supercharge your mind with one idea per day

Enter your email and spend 1 minute every day to learn something new.

Email

I agree to receive email updates