Wednesday, July 21, 2010

Do not Ping My Computer


To find objects in the hacking, most use Ping command to test the host, if Ping barrier, the level of bad "hackers" will quit most. In fact, can create a false impression, even if we are online, but can not be connected when the other Ping This can avoid a lot of attacks.

The first step: Add Standalone Snap-in


Start - Run, type: mmc, start to open "Control Panel" window. Then click "Control Panel" menu under "Add / Remove Snap-in", click "Add" button in the pop-up window, select "IP Security Policy Management" item, click "Add" button. In the Open window, select managed objects for the "local computer", click "Finish" button, and close the "Add / Remove Snap-in" window, return to the console.



(Figure 1)

Step two: Create IP Security Policy

Right-click the newly added "IP Security Policies on Local Machine" (Figure 2), select "Create IP Security Policy", click "Next" and then enter a policy described as "no Ping" (Figure 3). Click "Next", select "Activate the default response rule to" restore options, click "Next." Began to set the authentication mode, select "This string is used to protect the key exchange (preshared key)" option, then enter some random characters (the characters following will be used) (Figure 4). Click "Next", will be prompted to complete the IP security policy has been confirmed to select the "Edit Properties" check box, click the "Finish" button, will open its Properties dialog box.



(Figure 2)



(Figure 3)




[Next]





(Figure 4)




[Next]



Step Three: Configure Security Policy

Click the "Add" button and open the Security Rule Wizard, click "Next" to set the end of the tunnel, where select "This rule does not specify a tunnel." (Figure 6) Click "Next" and select "All network connections" to ensure that all computers are Ping unreasonable. Click "Next", set the authentication method, and as the third option above, "This string is used to protect the key exchange (preshared key)" and fill in with just the same content. Click "Next" in the open window, click the "Add" button, open the "IP Filter List" window. (Figure 7) Click the "Add", click "Next", set the source address to "My IP address", click "Next", set the destination address as "any IP address", click "Next ", select the protocol as ICMP, can now click" Finish "and" Close "button to return. At this point, you can see IP filter list you just created a filter, to select after click "Next", select the filter action is "required security settings" option (Figure 8), followed by clicking "Done", "Close" button to save the settings related to returns management console.



(Figure 5)



(Figure 6)




[Next]





(Figure 7)



(Figure 8)

Step four: assign security policies

Last only in the "Console Root" in the right-configured "against Ping" strategy, select "assign" command to configure the entry into force (Figure 9). After the above settings, when the other computer and then Ping the computer, no longer connected the. However, if your Ping local computer, still connected. This method is valid for Windows 2000/XP.



(Figure 9)






Recommended links:



Youtube to MPEG Pro



Free DVD RIPPER and Burner



Cartoons - Screen Savers reviews



How to enhance the productivity of textile and garment factories?



Mkv



Apolo DVD Editor



Open AVI to iPod



AVI to 3gp



Bliss M4P VQF to M3U Editing



Review Health And Nutrition



.m4v File



How the statistics of the time difference BETWEEN the two time points



Explosion DAT to DVD



Convert avi to mpeg4



No comments:

Post a Comment