{"id":754,"date":"2010-05-19T13:50:00","date_gmt":"2010-05-19T20:50:00","guid":{"rendered":"http:\/\/www.ait-pro.com\/aitpro-blog\/?p=754"},"modified":"2010-08-09T11:56:22","modified_gmt":"2010-08-09T18:56:22","slug":"security-firewalls-security-firewall-history-and-facts-bulletproof-security","status":"publish","type":"post","link":"https:\/\/www.ait-pro.com\/aitpro-blog\/754\/misc-projects\/history-and-facts-project\/security-firewalls-security-firewall-history-and-facts-bulletproof-security\/","title":{"rendered":"Security Firewalls \u2013 Security Firewall History and Facts | BulletProof Security"},"content":{"rendered":"<p><strong><span style=\"color: #000066;\">Description:<\/span><\/strong>\u00a0 A security firewall is a system designed to prevent unauthorized access to or from a private network. Security firewalls can be either a hardware firewall (router) or software firewall (firewall software application), or a combination of both.\u00a0 Security firewall history and facts.<\/p>\n<table style=\"width: 570px;\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td><span style=\"color: #000066;\"><strong>1951<\/strong> <\/span>\u2013 First commercially available computer was the Ferranti Mark 1.<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #000066;\">1957<\/span> <\/strong>\u2013 The development of what is now called the Internet started by the Soviet Union.<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #000066;\">1969<\/span> <\/strong>\u2013 ARPANet created by the US Defense Department (now known as the Internet) first went live in October 1969. It used the NCP protocol (Network Control Protocol).<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #000066;\">1970<\/span> <\/strong>\u2013 The world&#8217;s first wireless packet-switched network was ALOHAnet.<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #000066;\">1972<\/span> <\/strong>\u2013 ALOHAnet was the first network to connect to ARPANET in 1972.<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #000066;\">1974<\/span> <\/strong>\u2013 First routers &#8211; Xerox routers came into operation sometime after early 1974.<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #000066;\">1983<\/span> <\/strong>\u2013 TCP\/IP protocol replaced the NCP protocol.<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #000066;\">1985<\/span> <\/strong>\u2013 Wi-Fi technology origins &#8211; FCC released several bands of radio spectrum for unlicensed use.<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #000066;\">1986<\/span> <\/strong>\u2013 NSFNET (formerly ARPANet) went online and connected to the CSNET network.<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #000066;\">1980\u2019s Late<\/span> <\/strong>\u2013 First security firewall was created in the Late 1980\u2019s.<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #000066;\">1991<\/span> <\/strong>\u2013 Official launch of the World Wide Web for public use by Tim Berners-Lee and colleagues at CERN.<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #000066;\">1994<\/span> <\/strong>\u2013 Carnegie Mellon University built the first wireless Internet network in the world at their Pittsburgh campus in 1994.<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #000066;\">1997<\/span> <\/strong>\u2013 WEP encryption was introduced for wireless security firewalls. WEP encryption is easily cracked within minutes.<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #000066;\">2003<\/span> <\/strong>\u2013 WPA and WPA2 encryption for wireless security firewalls became available in devices in 2003.<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 570px;\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td colspan=\"3\"><strong>Bullet proof &amp; security related items with interesting History &amp; Facts<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"180\"><a title=\"Bullet Proof Vests History\" href=\"http:\/\/www.ait-pro.com\/aitpro-blog\/746\/misc-projects\/history-and-facts-project\/bullet-proof-vests-bullet-proof-vest-history-and-facts-bulletproof-security\/\"><span style=\"color: #000066; text-decoration: underline;\">Bullet proof vests<\/span><\/a><\/td>\n<td width=\"218\"><a title=\"Security Cameras History\" href=\"http:\/\/www.ait-pro.com\/aitpro-blog\/756\/misc-projects\/history-and-facts-project\/security-cameras-security-camera-history-and-facts-cctv-surveillance-cameras-bulletproof-security\/ \"><span style=\"color: #000066; text-decoration: underline;\">Security cameras CCTV<\/span><\/a><\/td>\n<td width=\"172\"><a title=\"Bullet Proof Body Armor History\" href=\"http:\/\/www.ait-pro.com\/aitpro-blog\/749\/misc-projects\/history-and-facts-project\/bullet-proof-body-armor-bullet-proof-body-armor-history-and-facts-bulletproof-security\/ \"><span style=\"color: #000066; text-decoration: underline;\">Bullet proof body armor<\/span><\/a><\/td>\n<\/tr>\n<tr>\n<td><a title=\"Wireless Routers History\" href=\"http:\/\/www.ait-pro.com\/aitpro-blog\/751\/misc-projects\/history-and-facts-project\/wireless-security-routers-wireless-security-routers-history-and-facts-bulletproof-security\/\"><span style=\"color: #000066; text-decoration: underline;\">Wireless security routers<\/span><\/a><\/td>\n<td><a title=\"Security Appliances History\" href=\"http:\/\/www.ait-pro.com\/aitpro-blog\/758\/misc-projects\/history-and-facts-project\/security-appliances-network-security-appliances-history-and-facts-bulletproof-security\/\"><span style=\"color: #000066; text-decoration: underline;\">Network security appliances<\/span><\/a><\/td>\n<td><a title=\"Security Firewall History\" href=\"http:\/\/www.ait-pro.com\/aitpro-blog\/754\/misc-projects\/history-and-facts-project\/security-firewalls-security-firewall-history-and-facts-bulletproof-security\/\"><span style=\"color: #000066; text-decoration: underline;\">Security firewalls<\/span><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 570px;\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>History and Facts Projects<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a title=\"Video Games History and Facts\" href=\"http:\/\/www.ait-pro.com\/aitpro-blog\/439\/misc-projects\/history-and-facts-project\/video-games-history-and-facts\/\"><span style=\"color: #000066; text-decoration: underline;\">Video Games<\/span><\/a> &#8211; History and facts about video games, computer video games, arcade video games and home video game consoles.\u00a0 A historical timeline of the first analog electronic games to digital electronic\u00a0video games.<\/td>\n<\/tr>\n<tr>\n<td><a title=\"Television History and Facts\" href=\"http:\/\/www.ait-pro.com\/aitpro-blog\/915\/misc-projects\/history-and-facts-project\/television-history-and-facts-electromechanical-tv-to-3d-tv-crt-lcd-led-plasma-hdtv-and-3d-tv-history-and-facts\/ \"><span style=\"color: #000066; text-decoration: underline;\">Televisions<\/span><\/a> &#8211; History and facts about the invention of the television. A historical timeline of the first electromechanical television to 3D TV.<\/td>\n<\/tr>\n<tr>\n<td><a title=\"Computers History and Facts\" href=\"http:\/\/www.ait-pro.com\/aitpro-blog\/437\/misc-projects\/history-and-facts-project\/computer-history-and-facts\/\"><span style=\"color: #000066; text-decoration: underline;\">Computers<\/span><\/a> &#8211; History and facts about the invention of the computer. A historical timeline of the first mechanical and electronic computers to modern day computers.<\/td>\n<\/tr>\n<tr>\n<td><a title=\"Phonograph to iPod History\" href=\"http:\/\/www.ait-pro.com\/aitpro-blog\/445\/misc-projects\/history-and-facts-project\/music-sound-devices-history-and-facts\/\"><span style=\"color: #000066; text-decoration: underline;\">Music<\/span><\/a> &#8211; History and facts\u00a0about the first mechanical sound recording devices to\u00a0the iPod Touch.\u00a0 A historical timeline of the first recording and sound playing devices to the modern day iPod line of MP3 and MP4 video players.<\/td>\n<\/tr>\n<tr>\n<td><a title=\"Camera History and Facts\" href=\"http:\/\/www.ait-pro.com\/aitpro-blog\/453\/misc-projects\/history-and-facts-project\/cameras-history-and-facts\/\"><span style=\"color: #000066; text-decoration: underline;\">Cameras<\/span><\/a> &#8211; History and facts about the invention of the camera. A historical timeline of the invention of the Pinhole camera to IP cameras.<\/td>\n<\/tr>\n<tr>\n<td><a title=\"Gold, Silver, Diamond, Sapphire, Ruby and Emerald Information\" href=\"http:\/\/www.ait-pro.com\/aitpro-blog\/461\/misc-projects\/history-and-facts-project\/gold-silver-diamond-sapphire-ruby-and-emerald-country-resources-information\/\"><span style=\"color: #000066; text-decoration: underline;\">Jewelry<\/span><\/a> &#8211; Complete list of countries where Gold, Silver, Diamonds, Emeralds, Sapphires and Rubies are found. List of the top Gold, Silver and natural Diamond producing countries.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Description:\u00a0 A security firewall is a system designed to prevent unauthorized access to or from a private network. Security firewalls can be either a hardware firewall (router) or software firewall (firewall software application), or a combination of both.\u00a0 Security firewall history and facts. 1951 \u2013 First commercially available computer was the Ferranti Mark 1. 1957 [&hellip;]<\/p>\n","protected":false},"author":167,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[231],"tags":[151,150],"class_list":["post-754","post","type-post","status-publish","format-standard","hentry","category-history-and-facts-project","tag-security-firewall-facts","tag-security-firewall-history"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/posts\/754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/users\/167"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/comments?post=754"}],"version-history":[{"count":0,"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/posts\/754\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/media?parent=754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/categories?post=754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/tags?post=754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}