To find objects in the hacking, most use Ping command to test the host, if Ping barrier, the level of bad "hackers" will quit most. In fact, can create a false impression, even if we are online, but can not be connected when the other Ping This can avoid a lot of attacks.
The first step: Add Standalone Snap-in
Start - Run, type: mmc, start to open "Control Panel" window. Then click "Control Panel" menu under "Add / Remove Snap-in", click "Add" button in the pop-up window, select "IP Security Policy Management" item, click "Add" button. In the Open window, select managed objects for the "local computer", click "Finish" button, and close the "Add / Remove Snap-in" window, return to the console.
(Figure 1)
Step two: Create IP Security Policy
Right-click the newly added "IP Security Policies on Local Machine" (Figure 2), select "Create IP Security Policy", click "Next" and then enter a policy described as "no Ping" (Figure 3). Click "Next", select "Activate the default response rule to" restore options, click "Next." Began to set the authentication mode, select "This string is used to protect the key exchange (preshared key)" option, then enter some random characters (the characters following will be used) (Figure 4). Click "Next", will be prompted to complete the IP security policy has been confirmed to select the "Edit Properties" check box, click the "Finish" button, will open its Properties dialog box.
(Figure 2)
(Figure 3)
[Next]
(Figure 4)
[Next]
Step Three: Configure Security Policy
Click the "Add" button and open the Security Rule Wizard, click "Next" to set the end of the tunnel, where select "This rule does not specify a tunnel." (Figure 6) Click "Next" and select "All network connections" to ensure that all computers are Ping unreasonable. Click "Next", set the authentication method, and as the third option above, "This string is used to protect the key exchange (preshared key)" and fill in with just the same content. Click "Next" in the open window, click the "Add" button, open the "IP Filter List" window. (Figure 7) Click the "Add", click "Next", set the source address to "My IP address", click "Next", set the destination address as "any IP address", click "Next ", select the protocol as ICMP, can now click" Finish "and" Close "button to return. At this point, you can see IP filter list you just created a filter, to select after click "Next", select the filter action is "required security settings" option (Figure 8), followed by clicking "Done", "Close" button to save the settings related to returns management console.
(Figure 5)
(Figure 6)
[Next]
(Figure 7)
(Figure 8)
Step four: assign security policies
Last only in the "Console Root" in the right-configured "against Ping" strategy, select "assign" command to configure the entry into force (Figure 9). After the above settings, when the other computer and then Ping the computer, no longer connected the. However, if your Ping local computer, still connected. This method is valid for Windows 2000/XP.
(Figure 9)
Recommended links:
Youtube to MPEG Pro
Free DVD RIPPER and Burner
Cartoons - Screen Savers reviews
How to enhance the productivity of textile and garment factories?
Mkv
Apolo DVD Editor
Open AVI to iPod
AVI to 3gp
Bliss M4P VQF to M3U Editing
Review Health And Nutrition
.m4v File
How the statistics of the time difference BETWEEN the two time points
Explosion DAT to DVD
Convert avi to mpeg4
No comments:
Post a Comment