[Editor's note: if we find that the network is disconnected on weekdays, we will use the ping command to see what went wrong. However, many hackers are using the ping command to see which computers are suitable for BOTs .]
As campus networks become more and more popular, and users have improved their awareness of network knowledge, many people download some hacking tools online or use Ping commands to scan ports and IP addresses to find bots, it has a bad influence.
The Ping Command can send a small packet to the address you provide, and then listen on whether the machine has "answers ". Find which machines are active on the network. Ping intrusion is an ICMP intrusion. The principle is to send a large number of requests to the computer in a period of time through Ping, so that the CPU usage of the Computer remains high to 100%, and the system crashes or even crashes. Based on this, write this article anti-Ping IP Security policy to protect your system security.
In fact, anti-Ping installation and firewall setting can also solve the problem, but not every computer will install the firewall. Consider resource occupation and setting skills. It is useless if you have installed a firewall but have not modified or added IP rules. Some configurations are not very high. To avoid occupying resources for the firewall, You can manually set security in your system.
The specific creation process is as follows:
[Content navigation] |
Page 7: IP Security policy learning how to prevent ports from being pinged and closed |
Page 7: IP Security policy learning how to prevent ports from being pinged and closed |