Personal User Anti-Black guide _ Security related

Source: Internet
Author: User
Tags get ip
One day, I turn on my computer and surf the Internet as usual. Suddenly the firewall strange call repeatedly. Open log to see, port scan, remote connection ... The old feeling this time the computer is not normal, originally is has "The high Man" to visit. Looks like me and so on the good netizen is also the victim's object, OK, let me save a bit and I as innocent crowd, talk about individual user's protection!


   security protection for proxy users


What is a proxy user? Due to the IP tension of telecommunications, the majority of households, individual users to provide proxy services form the Internet, such as the latest introduction of ADSL virtual dial-up users. It is characterized by the need for a virtual dial-up access to the Internet, and there is no real IP address on the Internet, only the type of LAN-like IP that is provided by the telecom after virtual dialing.

This kind of user, security protection is more relaxed. Because the telecommunications in the interior has installed a physical firewall, can be relatively isolated from outside the attack and intrusion. But this relatively open LAN user may pose a threat to you. For example--after virtual dialing to get IP 192.168.0.6, the other home user, after dialing the IP to 192.168.0.8, they can communicate with each other, of course, can also attack.

How do you guard against virtual dialing attacks? Use the network firewall, the precautionary rule joins the LAN rule to be possible. The following is an example of the latest Skynet Personal Edition, which describes the steps to set up.


After opening Skynet, click "Custom IP Rules" on the main interface. The Drop-down list box for the IP rule appears, select the IP rule entry, the IP Rule Modification window appears, select the network address of the LAN in the offset IP rule drop-down list box, and select "When the above conditions are met" in the list box. Intercept and tick the "record", "warning", "audible" three items (Figure 1) next to the "also" item. After the setup is complete, the illegal packets sent over the LAN form will be intercepted unconditionally.


  Security protection for ordinary users


1. With antivirus software with the firewall

Now, the major anti-virus software manufacturers have launched with their own anti-virus software with the network firewall, such as: "Jinshan Poison Tyrants" "Jinshan Net Dart", "Rising anti-virus software" "Rising Personal Firewall", "KV3000" "Jiangmin against the Black king." This matching firewall software, for individual users is enough to use. The following is "Jiangmin against the Black king" as an example, talk about its use.

Note: Generally these anti-virus software with the firewall, in the anti-virus software installation CD-ROM, after the anti-virus software installation is completed, it will prompt you whether you need to install a firewall, but also some in the CD starting directory, you just according to the instructions, you can easily fix the installation.



This is the main interface of the "anti-Black King" (Figure 2), in the "Settings" item, check "Automatically load anti-black king at startup", "Log Logs", "sound alarm" three options, so that when the computer is attacked, it will sound prompted and record the way and the source of the attack.



In the rule item shown in Figure 3, it is recommended that ordinary users do not make any modification settings. But if you are relatively familiar with the Web form, and there have been attacks, you can select the corresponding options, and then click the [Modify Rules] button on the right to make further settings in the Rule Settings window shown in Figure 4 (it is recommended that normal users use only the default settings).

2. Pure firewall software

These software are generally developed by professional network security vendors, powerful, more safety factor. such as "Skynet Firewall", "Norton Internet security" and so on, are used more extensive. In addition to being attacked, the firewall will alert and withstand attacks, log logs, "Skynet firewall" can also prevent others to use ping command detection, "Norton Internet Security" can hide IP. This type of professional firewall also has some additional security features that are included.



Well, good luck to be a "traveling Superman", all the cyber disaster will not befall you.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.