manuela has researched a third-party software firewall she wants to install on her pc since she believes it is a better quality than the operating system's onboard firewall. she has read the installation instructions. the firewall is compatible with her operating system and has gotten good customer reviews. after performing the installation last week, she notices that numerous malicious exploits are successfully hacking her computer. what went wrong?