Personal user anti-Black Guide

Source: Internet
Author: User

One day, I open my computer as usual and surf the Internet. Suddenly, the firewall is called a connection. Open log view, Port Scan, remote connection ...... I always felt that the computer was abnormal during this time. It turned out that there was a "high-person" visit. It seems that I am waiting for a kind of Internet users to be killed. Well, let me rescue innocent people like me and talk about personal user protection!

Proxy user security protection

What is a proxy user? Due to the shortage of Telecom IP addresses, proxy services are provided for most families and individual users, such as the latest ADSL virtual dial-up users. It has the following features: one virtual dial-up is required to access the Internet; there is no real IP address on the Internet, and only the IP address similar to the LAN format provided by China Telecom after the virtual dial-up.

This type of user makes security protection easier. Because China Telecom has installed a physical firewall inside it to isolate external attacks and intrusions. However, this relatively open LAN user may pose a threat to you. For example, if the IP address obtained after virtual dial-up is 192.168.0.6, the other home user obtains the IP address 192.168.0.8 after dial-up. The two users can communicate with each other and attack each other.

How can we prevent attacks after virtual dialing? Use the network firewall to add LAN rules to the protection rules. Next, we will take the latest personal version of Skynet as an example to describe how to set it.

After Skynet is opened, click "custom IP rules" on the main interface. The IP rules drop-down list box appears. Select the "IP rules" option and the "Modify IP rules" window appears, select "lan network address" in the "peer IP rules" drop-down list box; select "intercept" in the "when the above conditions are met" drop-down list box "; and check "record", "warning", and "Voice" next to "simultaneous return" (1 ). After the configuration is complete, all illegal packets sent from IP addresses in the LAN form will be intercepted unconditionally.

Security Protection for common users

1. firewall with anti-virus software

Today, Major antivirus software vendors have launched network firewalls that work with their own antivirus software, such as Kingsoft website, Kingsoft website, and rising star personal firewall, of Kingsoft antivirus software. the anti-Black King of Jiangmin in kv3000. Such supporting firewall software is enough for individual users. The following uses Jiang Min's anti-Black King as an example to describe how to use it.

Note: Generally, the firewalls attached to these anti-virus software are in the anti-virus software installation CD. After the anti-virus software is installed, it will prompt you whether to install the firewall, some of them are in the boot directory of the CD. You only need to follow the instructions to install them easily.

This is the main interface of "anti-Black King" (2). In the "Settings" item, select the "automatically load anti-Black King", "record log", and "Sound Alarm" options at startup. In this way, when a computer is under attack, a sound prompt is displayed, record the attack methods and sources.

In the rule items shown in figure 3, it is recommended that common users do not make any modification settings. However, if you have a relatively good understanding of the network type and have been attacked, you can select the corresponding option and then click the [modify rules] button on the right, perform further settings in the Rule settings window shown in Figure 4 (it is recommended that common users only use the default settings ).

2. Pure firewall software

These software is generally developed by professional network security vendors, with powerful functions and a higher security factor. For example, Skynet firewall and Norton Internet Security are widely used. In addition to being attacked, the firewall will trigger alarms, defend against attacks, and record logs. In addition, Skynet firewall can also prevent others from using ping commands for detection. Norton Internet Security can hide IP addresses. This type of professional firewall also has some additional security features.

Well, I wish you a successful success as a "Travel Superman". All Network disasters will not come to you.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.