Anti-Black expert LockDown 2000 Practical Guide

Source: Internet
Author: User

"The forest has all the birds. With the rapid development of the Internet, the number of Internet users has increased dramatically, and hacker intrusions have also increased. According to the latest research by Worldtalk, there is now a virus in every 1000 emails, including trojans from hackers. Unfortunately, most ordinary Internet users do not have professional anti-Black technologies. They are like walking around the sea and naturally become "visiting" targets of hackers, even some people who have been under the surveillance of hackers for a long time do not know. In view of this, I will introduce LockDown 2000, a powerful anti-Black tool that can not only effectively prevent hacker intrusion, but also help you trace the hacker's origins.

The new LockDown 2000 blocks the Security Vulnerabilities detected in Windows 95/98/NT. It can prevent network bomb attacks and clear all existing Trojans, automatic Start, automatic monitoring, automatic blocking of hacker access, automatic tracking of hacker IP addresses and ISP domain names, and provides tools to find the ISP contact information based on the domain name, attackers can find out where to complain and even sue intruders, so that they can be punished. Even if you allow some people to access your computer and share files with you, LockDown 2000 will record their activities throughout the process, such, when did someone come, what was his IP address, and what he did on your computer, lockDown 2000 will first disconnect him and immediately track him. Therefore, installing LockDown 2000 is equivalent to hiring an anti-Black expert. Sometimes you may have not responded to it, and it has already avoided a disaster for you.

The following describes how to use LockDown 2000. First, let's take a look at its interface and settings.

● LockDown 2000 Interface

After LockDown 2000 is started, a yellow icon appears in the system task bar, and a main window (1) with a menu bar, toolbar, Status Bar, and workspace appears ). The status bar displays the current disconnection mode and number of shared connections. As for the menu bar and the toolbar, we will introduce the five tag windows in the workspace.

Main (Main Information Window): displays the running records of LockDown 2000 (2 ). For example, when the system is started, it will show which modules are activated, which modules are disabled, and when a trojan is scanned. There are three Options buttons in the window, from top to bottom, which are used to set the trojan scanner, ICQ bomb/Trojan monitoring module, and automatic hacker path tracking. In addition, there are two buttons on the Right To save and clear window information from top to bottom.

Net Utilities (network tool window): mainly includes TraceRoute and Whois network detection tools (3 ). The former is used to manually track the path of the intruder, while the latter finds the contact information of the ISP based on the information found by the former. Shares: displays shared folders and shared objects (4 ).

Current Share Connections (Current shared connection window): displays all the Connections currently accessing your computer, sharing files with you, and logon information of visitors. Here, you can choose to disconnect, add, or connect to a specified user (5 ).

Former Share Connections (previously shared connection window): displays Connections that have visited your computer and logon information of visitors (6 ).

● LockDown 2000 settings
Although LockDown 2000 can still work normally for novice users without any configuration, you must understand this part to make it better for you.
To enter the LockDown 2000 setting area, there are multiple methods. The simplest is to press the Options button on the toolbar to enter the Options dialog box (7 ), by switching between the five tags, you can modify the main settings of LockDown 2000.

General (General) Labels (8 ):

Network Info Refresh Rate: Network Information Update Rate. The interval between refresh and disconnection. The default value is 1000 milliseconds. For security reasons, you can use a lower update rate, such as 500 milliseconds.

Number of connections oo remember: Number of storage connections. Indicates the maximum number of connections allowed to save. The default value is 100.

Launch LockDown2000 on startup: automatically enable LockDown 2000. LockDown 2000 is automatically enabled when the system is started. The default value is "allow ".

Popup window on new connection: if a new connection exists, the pop-up window is displayed. When selected, the LockDown 2000 dialog box appears when someone tries to connect to your computer. The default value is "allow ".

Log IPC $: IPC is short for Inter Process Communication, meaning "Inter-Process Communication". It is used to exchange specific information between two processes. The default value is "forbidden ".

Warn When Exiting LockDown2000: warning before Exiting. After this option is selected, you will be prompted when you leave LockDown 2000. The default value is "forbidden".

Sound when new connection: generates an alarm if a new connection exists. The default setting is Standard sound (siren). You can also click Custom sound (Custom sound) and specify a sound (wav ).

Default Whois Server: the Default Whois Server. Specifies the Whois server used by default. For more information, see whois.cnnic.net.cn ).

TraceRoute new nonnection: trace the path of the new connection. After this option is selected, LockDown 2000 will track any connection attempts to access your computer. The default value is "allow ".

Disconnect (Disconnect) label (9 ):

Add program button: Add programs that cannot be executed by others to the table. Generally, this is a program that can damage your system or files, such as format.comdeskdebug.exe. When someone does not want to execute a program in the table, the connection between the program and your computer is immediately forcibly disconnected to avoid a disaster.

Disconnect all when executing programs listed abve: when a program in the disconnected list is executed, LockDown 2000 will immediately Disconnect all users currently connected to you. In this case, it is clearly a bit "too powerful". Therefore, the default value is "forbidden ".

Disconnect users after idle time: how long the idle time will be disconnected. This setting is used to disconnect users that have not been connected to your computer for a long time. The default setting is 10 minutes. You can shorten this setting if you want more friends to access your computer.

Maxmium number of connections: Maximum number of connections. That is, the number of users allowed to connect to your computer at the same time. The default value is 10 and the minimum value is 1.

IP Filter (IP Filter) label (10):

Dd IP Filter (add IP Filter) button: "IP Filter" is a more flexible anti-Black weapon inside LockDown 2000. It allows the user to specify an IP address (usually the first three segments) in advance, and then compare the visitor's IP address to allow access. Otherwise, the access is blocked. For example, 207.7.12 can be regarded as an IP Filter. After adding it to the table, if the IP address of a visitor is 207.7.13. *, he will be regarded as an illegal intruder and rejected from outside the host. However, if the visitor's IP address is 207.7.125. *, the user is considered as a legal user and is allowed to access. Note that the IP address filter takes precedence over the Disconnect Mode setting described later.

Filter IP Addresses: After this option is selected, the IP Filter added above takes effect. This option is disabled by default because no IP address filter is available ".

Detection (Detection) label (11 ):

Detect Trojan Connection Attempts: detects a Connection that is attempted through a Trojan horse. After this option is selected, if someone tries to connect to your computer through a Trojan horse, LockDown 2000 will send a sound alarm and monitor and track it. This is the most important option for LockDown 2000, and must be activated. Therefore, the default value is "allow ".

ICQ Nuke Protection: ICQ bomb Protection. This option can prevent others from attacking you with an ICQ bomb. To avoid conflicts, we recommend that you do not start other similar protection software, such as ICQ Protect and WFIPS2, after enabling this function. In addition, this option may cause "memory insufficiency error". Therefore, if you do not use ICQ, do not select it. The default value is "forbidden ".

Nuke Protection: Bomb Protection. After selection, LockDown 2000 will monitor the ports that are usually vulnerable to hacker attacks. Once one of these ports is accessed, LockDown 2000 will immediately disconnect and track the visitor information. Similarly, it is recommended that you do not use it with the same type of protection program. Otherwise, there may be an out-of-memory error. The default value is "forbidden ".

Trojans (Trojan) label (12): sets the scan Trojan Horse method, object, and additional path.

Automatic Trojan Scanner: includes four options, Scan for unknown trojans, which is used to set whether to Scan unknown Trojan Horse. After selection, Windows system file is Windows. INI, AUTOEXEC. BAT, SYSTEM. INI, CONFIG. SYS and so on ("Allowed" by default), you can also choose not to check the above files in the File Change Monitor (File Change monitoring) area on its left; Background scan for trojans, it is used to set whether to scan the Trojan horse in the background. After the Trojan Horse is selected, you can scan the Trojan horse and specify directories for the system and users, for example, for Windows, WindowsSystem, WindowsTemp, and Startup, "Allowed" by default; Background scan at start is used to set whether to perform Background scanning when the system or LockDown 2000 is started. Select Without your consent, any programs or other programs cannot run. The default value is "forbidden". As for Scan interval, it is used to set the background Scan interval. The default value is 20 seconds, for security, it can be shortened to 10 seconds or less. However, no matter how long the interval is, LockDown 2000 will be scanned immediately once the system file or directory changes.

Manual Trojan Scan: Scan the Trojan manually. Select the drive you want to Scan from the drop-down list and press the Scan Srive for Trojans button. LockDown 2000 scans files on the drive at a low priority. The advantage of this method is that, ensure that other applications are running first.

Additional Scan Path: Additional Scan Path. You can specify another directory (for example, storing the downloaded file) so that the trojan scanner can scan it after each activation.

Ignore List: Ignore List. If you add an object to the ignore list for some reason, you can click the Remove button to delete it. The above describes how to modify the main settings of LockDown 2000 under the five tabs in the Options dialog box. In addition, you can also click menu View/Disconnect in the main window ), in the Disconnection Mode dialog box, select the proper Disconnection Mode (13 ):

Disconnect all: all disconnected. This mode is disconnected

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.