A firewall is ready in the Linux kernel called “netfilter” what the programs like (Gufw, Firestarter, Iptables) use.
Linux Firewall Settings editing is needed only if you keep up a server which is open to the world.
Linux firewall can be activated only one at a time, either Gufw or Firestarter.
Gufw is an easy, intuitive, way to manage your Linux firewall.
It supports common tasks such as allowing or blocking pre-configured services, common P2P, or individual IP/port(s), and many others!
Firestarter is a Open Source software, available free of charge Easy to use with graphical interface.
Avoid the drawbacks and dangers of the Internet.
Linux Mint is safe to use
Linux Mint is resistance to viruses (-exe, dll, wmf, flash) and password protection makes Linux Mint extra safe.
Therefore, a separate anti-virus program is not, at least not yet needed.
However, you can install, such as ClamTk virus scanner program from the package manager, if you want to check the files from viruses which are spread for Microsoft Windows.
Keep your Linux home network safe
You can test your Linux Firewall security from the ShieldsUP site.
Below an extract of what the test told me about my Internet connection:
Attempting connection to your computer. . .
Shields UP! is now attempting to contact the Hidden Internet Server within your PC.
It is likely that no one has told you that your own personal computer may now be functioning as an Internet Server with neither your knowledge nor your permission. And that it may be serving up all or many of your personal files for reading, writing, modification and even deletion by anyone, anywhere, on the Internet!
Your Internet port 139 does not appear to exist!
One or more ports on this system are operating in FULL STEALTH MODE!Standard Internet behavior requires port connection attempts to be answered with a success or refusal response.
Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that’s very cool!) which represents advanced computer and port stealthing capabilities.
A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion.
Unable to connect with NetBIOS to your computer.
All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.)
Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet.
Linux Firewall rules