Wednesday, September 15, 2010

Note: Some people in the Ping you?



Ping command I believe we have been very familiar with it! Only install TCP / IP protocol can play a role after the Ping. Computer communication should install TCP / IP agreement, can communicate with other computers. Therefore, it is necessary ... ... Ping is based on the ICMP protocol, generally we use Ping to test whether the machine can properly communicate with other machines, the normal data packet will be returned. If you do not normal is out, so can not say that this machine can not communicate with other machines . because the operating system can turn off ICMP. it is not possible to return the packet. or other use of the firewall to close the ICMP protocol. You can also prevent type ICMP flood attack.

There are many people on the Internet to carry out large-scale Ping, if the other party to return the packet. They can certainly not closed the ICMP protocol or the other is not installed a firewall. Then they can look at loopholes in the system, if there are loopholes only takes a few minutes invasion of your computer, then upload some horses, so if you later connect to the Internet are used by the other party. We close the ICMP or install a firewall can reduce the opportunity for invasion. maybe because too many incursions Therefore, we feel that network security needs. thank those people who contributed to Internet security.

Tip: We recommend a general user to install a firewall on and update system to reduce vulnerability invasion opportunity. Because of some loopholes in the firewall can not prevent. Step by step teach you install a firewall and prevent PING, I suggest you use the Skynet firewall Because Skynet good quality firewall.

We can go to the official site to download Skynet (http://www.sky.net.cn), or IE input (http://sky.net.cn/files/skynet2.49.exe) to download Skynet Firewall 2.4.9 version. can be installed after the download is complete, the installation is completed will be prompted to restart your computer. Skynet will appear after re-register the software message input dialog, we can go sky net official website for free registration number, because this version is distributed free of charge. registration page for the (http://sky.net.cn/user/signup.php), registration will be available to you after the completion of registration number and registration code.

Note: Now we can set the firewall to filter network Skynet in the packet. If the firewall is not configured, it will affect the network access. That is, you can not communicate with the external computer.

Skynet is divided into three low-level firewall high. Can by their own security to be set. If the firewall is not set up may cause the machine can not communicate with the external machine, so for you you must not miss more secure to prevent other invasive . Skynet interface brief (Figure 1)




1 application rules ---> you can set this in the external access to applications. QQ if you find out, check whether the application to add QQ rules, if not, on the QQ, and then open. Days Net application to access a warning appears, you can choose to allow.

2 Custom IP rules -> Custom Network Access Rules. If this is not set up, you can not communicate with the external machine. Proposed to be located higher level.

3 System Settings -> Settings Skynet firewall rules start and IP address of the LAN address of the designated alarm settings and files. If you selected to allow all programs access to the network, and to record these procedures in the rules, all applications, access networks will not be any prompt. Note Oh!

4 Security Level -> set firewall security level Skynet. General users can be set to high, the LAN and the Internet can not connect to your machine. If you need the other party to access your computer, so you must set IP rules .

5 application network usage -> the current status of the external connections, if the process is the process of trojan or virus, immediately end the application process, the rules will be removed.

6 log -> firewall log file, if the current is PING a computer or scan your computer, the firewall will have the log. Figure 2 for PING log




7 turn off the network -> disconnect the network or connected to the network, if you find that your computer is being controlled by others, they should immediately click off the network.

Skynet safety check and repair system can help you solve operating system loopholes. Because some viruses are written for loopholes, no way a firewall to prevent intruders. Therefore to solve the operating system's vulnerability is also very important ...

If you are a first time installation of a firewall, open the QQ will be a warning, click OK to connect to the external software, if a virus or trojan can see the address and the application process connected in that directory. Users can set their own requirements set firewall security level, you can monitor TCP and UDP packets, only the option selected, and then you can save.

Win2000 operating system can be set to prevent the ICMP packet attacks.

Click Start -> Run -> In the dialog box, enter "mmc" -> click the menu "Control Panel" -> Add / Remove Snap-in -> Click "Add" ; -> select "IP Security Policy Management" -> select "Local Computer" option -> click Finish -> Then right-click the left menu, "IP Strategy Local machine "-> Create IP Policy -> Click Next -> policy name can be any input, where input to" ping "-> click Next -> then appear authentication way, select "This string is used to password protect the key exchange," enter the authentication key, where the input is "19821119" -> click Next -> completed.

Then a new IP strategy Properties -> click Add -> Next -> Next -> network type to "All network connections" -> Next -> Click "This string is used to protect the key exchange," Enter 19821119 -> Next -> then there IP filter list -> click "Add" -> dialog box appears then click the "Add" -> Filter Wizard appears click Next -> IP communications source appears, select the source address as "my IP address" -> click Next -> destination address for the "All IP address -> click on the first step -> select the protocol type as" ICMP "-> click Next -> complete -> Close -> 3 option, select the newly created "new IP filter list -> click Next -> three options, select" Request Security Settings "-> Next -> completed -> Close.

Established, you can assign the name of the newly created rules for the ping. Select the rule and then right-click to complete the assignment. Then you can also PING the other computer to your machine, you will find not return packets, which would also can prevent the type of ICMP flood attack.

Connected to the Internet or LAN suggest that you open the firewall to prevent outside intrusion and spread of the virus. So when the other party using the Ping command does not return data packet, so the chance of reducing the invasion. Generally the initial invasion of a C section would be Ping, if not way back to the user data packet will give up this invasion. We should learn from the knowledge of network security to prevent another invasion.







Recommended links:



50% Stake In MSN China, The Main Message Would Be Easy To Pass And Then Mad



Using the seven combat the Heart Jakarta STRUTS



A flash drive to buy the real experience



In Section North soft, Direct plug in for the "wings"!



Avc-free



Ps3 mts



Big Dragon: China's PR INDUSTRY subversion



mp4 to IPOD converter



Wizard Calculators AND Converters



E-cology In The Pan Micro Series 29



Review Personal Finance



Cool my music box, to create your music kingdom



Videoformat ipod



No comments:

Post a Comment