Prevent hacker intrusion, close the port, block the door, and the hacker cannot intrude into the door.

Source: Internet
Author: User

Prevent hacker intrusion, close the port, block the door, and the hacker cannot intrude into the door.

Q: How do hackers usually intrude into our computers? How can we prevent hacker intrusion? What preventive measures should be taken?

A: hackers intrude into our computers by entering the computer's "Port". The so-called "Port" refers to the port. We know that computers communicate with the Internet through ports to transmit data. Both normal data and data generated during hacker intrusion must go through ports without exception. Therefore, as long as we block the dangerous port of a computer, it is very difficult for hackers to intrude into our computer. Next let's take a look at how to disable the computer port.

What is a port?

A port is a way for a computer to communicate with the outside world. The server uses different ports to provide different services. Therefore, you only need one IP address to receive different data packets. Because of the port, when a data packet arrives at the computer, it knows which data packet to send to which service program. Therefore, computers can communicate with the outside world through different ports. Simply put, a port is like a door. Only when we open this door can the computer communicate with the outside world, and all data must pass through the door to access our system. For example, the well-known "Shock Wave" and "magic wave" viruses spread through ports 139 and 445, while the famous Trojan "glacier" controls our computers through port 7626. Therefore, as long as we know the ports commonly used by viruses and Trojans and close them, we can avoid many virus and Trojan attacks.

1. Use the built-in function to close the port

Disabling system ports is not an advanced technique. Windows itself has a built-in Management port function, but we seldom use it. This function is called "TCP/IP filtering ".

1) Go to "Control Panel"> "network connection ". We can find a "Local Connection" in it, right click on "Local Connection", select "properties", and then the Properties window will appear.

2) in the middle of the window, there is an option "this connection uses the following selected components", where you can find "Internet Protocol (TCP/IP)", select it, right click again, in the displayed Properties window, click "advanced" to go to Advanced TCP/IP Settings. Switch to the "options" tab. In the "Optional Settings" tab, we can find our main character "TCP/IP filtering ". Double-click "TCP/IP filtering" to set it.

 

Use "TCP/IP filtering"

3) set the TCP port first. Select the "allow only" option in the TCP port settings, and the "add" button below will be activated. We can click to add a port. Here, we only need to add common ports according to our own situation. For example, we need to add Port 80 when browsing the Web page, and add port 110 when receiving emails from mail clients such as Foxmail. As for the port to be closed, you only need to leave it empty. Similarly, UDP port settings are similar. Finally, do not forget to check "enable TCP/IP filtering (all adapters)" to make the settings take effect.

Set the port to be closed

Ii. Use Network Firewall

Disabling a port is a common function of a network firewall. Using network firewall is also the easiest and quickest way to disable ports. Take "Skynet firewall" as an example. Click "IP rule management" and select "add rule ". The "name" and "Description" of the rule can be entered at will. Select "receive" in the "packet direction" drop-down box, select "any address" in "peer IP Address", and select "TCP" in "packet protocol type ", fill in "139-139" in "local port", and select "intercept" when "the above conditions are met. This prevents others from connecting to port 139 of the local machine. If you want to prevent external connections from the local machine, for example, to prevent Trojans that rebound the connection type, select "send" in the "data packet direction" drop-down box ", select "peer port" in the port field.

Use firewall to close the port

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.