Operation principle: You can use the new advanced security firewall function of Win2008 system to control malicious download behavior. Considering that P2P tools perform malicious download operations, they will communicate with each other through the 3077 and 3078 ports of the system. Allowing the advanced security firewall function to limit the 3077 and 3078 ports to external network communication, it can prevent the Internet users from secretly using P2P tools such as Thunder to make malicious downloads. Specific steps: 1. Enter the Win2008 system desktop with system administrator privileges, and then click the “Start” menu in the “Start” menu, and the “Administrative Tools” command, from the “Server Manager” command. At the left side of the server manager window that appears, position the mouse on the “Configure” node option, and then select the “Advanced Security Firewall” item under the target node option; 2. Open “Advanced Security Firewall” & rdquo; configuration interface, click the "outbound rules" function option on the left side of the interface, and then click the "new rules" function option from the right side of the corresponding function option to open the safe outbound Rule creation wizard dialog box, when the wizard dialog asks us what type of control operation to perform, we should select the "ports" option here, so that the advanced security firewall function is on the network of ports 3077 and 3078 on the local computer. The connection is restricted; 3. Click the “Next” button to select it in the wizard settings dialog box that appears. “TCP” function option, and select the "Specific local port" option, at this time "The specific local port" text box will be automatically activated, directly enter the "3077, 3078" port number in the text box, 4. After clicking the “Next” button, the wizard screen will pop up a prompt asking “What should I do when the connection meets the specified conditions”, this time we must select the “Block connection” option, then set The specific application scope of the security rules, here we can select both "domain", "dedicated", "public", and other application environments, and finally set a suitable one for the newly created outbound rules. Name, then click the “Complete” button to end the creation of the secure outbound rule.
First, the existing environment First of all, please add the Windows 2008 server to the original Wi
Changed to the 2008 system, the website background shows 500 internal errors, open the website http
Windows 2008 turned out to make virtualization technology move forward. Its own Hyper-V technology,
student KEY features: 1. Can activate any version of windows 2008 or 2008 R2, use and genuine no dif
Windows Server 2008 Data Security Protection
Vista and Server08 SP2 RTM-Escrow is distributed to testers
Detailed explanation of the top ten features of Windows Server 2008
Adjusting services to solve Windows Server 2008 troubles
Windows Server 2008 virus stealing account security risks
Steps to activate Windows Server 2008 in a VMware virtual machine
Windows server 2008 R2 upgrade to windows 2012 migration Alwayson AG method
Using the graphical tools to manage account and group graphics on Server Core tutorial
How to make win2008 remote desktop more smooth
Win2008 remote multi-user login configuration method
By means of IIS to build an internal Web-based file sharing platform
No sound processing method after standby recovery
Win7 system directly open docx format file
Win2008 shared resources can not open the fault
How to modify the Windows 7 power button to prevent malfunctions Turn off the computer
Windows7 prohibits software to modify the registry tutorial
LOL 4th Anniversary Activity Points for Permanent Skin Activity Website Share
Computer-connected amp speakers full contact