<quo;Breakwave” One of the characteristics of worms is to use a vulnerable operating system for port attacks. Therefore, an easy way to prevent such viruses is to block unnecessary ports. Firewall software has this function. Windows 2003 or Windows XP users do not need to install any other software, because they can use the system's own "Internet Connection Firewall" to prevent hacker attacks.
<quo;Breakwave” One of the characteristics of worms is to use a vulnerable operating system for port attacks. Therefore, an easy way to prevent such viruses is to block unnecessary ports. Firewall software has this function. In fact, users of Windows 2003 or Windows XP do not need to install any other software, because they can use the system's own "Internet Connection Firewall" to prevent hacker attacks.
First, the basic settings
1, right click on the "My Network Places", select "Attributes".
2, then right click on “local connection", select “property", the interface of Figure 1 appears. As shown in the figure, select the “Advanced” option and select “Internet Connection Firewall” to confirm that the firewall will function.
Fig. 1
Second, test basic settings
1, ping this machine on another machine, Request timed out means ping different local
2 Another vulnerability scan tool was used on a machine to scan the port that was found to be not open.
After these two tests passed, the firewall has already played a role.
Three, advanced settings
Click on the "Settings (G)...” button in Figure 1 to display the interface of Figure 2 for advanced settings.
Figure 2
1, select the service to be opened
As shown in Figure 3, if the machine needs to open the corresponding service to select the service, this example selects the FTP service, so from other The machine can FTP to the machine, scanning the machine can find that port 21 is open. You can increase the corresponding service port by pressing the “Add” button.
Figure 3
2, setting the log
As shown in Figure 4, select the item to be recorded, the firewall will record the corresponding data, the log defaults to c:\\windows\\pfirewall.log, Notepad can be opened to see.
Figure 4
Open the registry editor, find PendingFileRenameOperations in HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet
1. Create a new website under IIS6 and use that port 80. 2, remember that IIS default ASP.NET is 2.0
registry can not open how to do? My computer, when the registry is opened, the prompt is disabled by
1. Right-click My Computer → attribute 2. In the System Properties window that appears, switch
Win2003 server maximum support for how much memory
Form a Windows Server 2003 R2 file server operation steps
Windows 2003 as a transit VPN server multi-route sharing Internet access method
Win2003 add custom user settings specific steps
Win Server 2003 Tips and Tricks
Windows2003 Server build domain environment diagram
How to set up Win2003's own firewall to prevent hacker attacks (illustration)
Integrate the IBM ServeRAID 8i card driver into the Win2003 installation CD
The theme of win2003 system is not good to see how to use xp theme style
A simple way to exchange NTFS and FAT32 file system
Windows2003 IIS can not specify IP when building a website (previously modified computer name)
Win2003 remote login (remote desktop) maximum connection number modification method
How to disable the optical drive in Win7?
How to cancel the software icon in the win10 computer start menu?
Notebook U disk installation Win8 tutorial
Windows 7 system changes the time zone method graphic tutorial
Microsoft spends $130 million to expand green data center
Win7 home basic home regular version of the method of displaying desktop icons
How to open the Windows8 system taskbar transparency effect
Win7 system upgrade key input error modification method
Win10 system application uninstall method (simple four steps)