This is nonsense.
To begin with, there's no such thing as a "hardware firewall". A better (and commonly used) designation is "appliance". A firewall appliance is a dedicated box, running an OS (in many cases a tweaked Linux or *BSD, though there are of course many other possibilities, like IOS on Cisco firewalls), on top of which the actual firewall software sits.
I agree that it is nonsense, but you are adding to it.
To start with, there are devices which are dedicated firewall appliances that run a dedicated firewall OS on them. Many of these devices actually perform the screening in the hardware via programmable asics. Ok, it's still "software" running on dedicated chips, but the traffic is not handled by the operating system and is not inspected by the general processor.
These same firewall appliances will sometimes include more than just ethernet interfaces. Sometimes they have DSL, Cable or T1/T3 and wireless interfaces. Make no mistake, though, they are a firewall first, and a router second. In fact, they make pretty poor routers, but excellent firewalls. These would be like the Cisco PIX, Juniper Netscreen or the SonicWall firewalls. There may be more, but these are the ones I'm more familiar with.
For residential use, these are probably overkill, although I do use a Netscreen at home. Using any broadband router with NAT enabled is going to secure you from MOST incoming connection attempts. The exception would be if you have port forwarding or UPnP enabled.
Sorry, I just couldn't let this one go.
-jt2