I've heard about this before and I'm curious. How does it work; is it transparent to you?

How do you protect against transferring viruses? Would it still work if you have a firewall on your computer? (The concept of someone external accessing my computer to process data kind of creeps me out, as I guess you can tell.) Tell me more about your experience, please.