"Graphics" BlackICE Firewall download installation and settings Tutorial _ Application Tips

Source: Internet
Author: User
Here for you to introduce a firewall BlackICE firewall ...

In fact, this firewall has several advantages; I personally recommend BlackICE Firewall, BlackICE has two versions, one is a stand-alone version, one is the server version, these two versions of the main difference is that the server version of a little more features ...
This firewall inside the setting is very fine, he is mainly security, why say so. Because he first put the port to enter and leave the strict control and settings ...

Unlike other firewalls, it may be that he first closes all the ports, and then there is a need to open a port or IP. Otherwise the passage is not allowed.

believe that for individuals and security is not high people, this firewall is very good, (only think the ugly may be a bad icon)

I'm giving you the download address for these two software,

Software name BlackICE PC Protection v3.6 COO Chinese version
Address: http://down.egogoo.com/software/5893.Html  
Software name BlackICE PC Server v3.6 COO Chinese version
Address: http://www.crsky.com/soft/1550.html

Here I mainly explain the installation of software and the process of needing attention to ...
I will explain the server version of it. Because the server version contains the features of the Professional edition ... Server Edition features a little more, so if the server version can be very skilled settings and use, I believe that the professional version can also be used handy.

This is the file we downloaded will be seen in the inside as shown in Figure 1

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

The first file is to install the software. The second one is a key, and the third is the BlackICE Chinese software.

Double-click Installation to appear Figure 2

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

Direct Next
It means to say some welcome words, every software has,
Appears in Figure 3

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

Do we agree to install, first I Accept
Appears as follows.
Figure 4


screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

Here we need to register code: 34519A2-RS-E4A0B (this registration code stand-alone version can also be used)
Enter and then ntxt as shown in Figure 5

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

Tell us which plate to install on, and we'll set it by default under C disk.
Next Figure 6

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

This is not to care about it, because everyone knows it. Select the following program, direct next
Figure 7

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

Here to explain ...
"AP off" and "AP on" Two options, where AP on means program control, which is to scan all files in the system after installation, and if a Trojan or some virus program is found to kill it immediately. Because he will find the program that will be the Internet, and all the applications running control, so that the trojan can prevent access to the network. For security reasons, we select AP on.
AP off means no detection, jump directly over.
When you select AP on, we use next he scans the files on the hard drive ...
Then the next installation is done ...


screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

Finsh complete .... Do you want to read the above tick? We don't have to get rid of it directly.



Below we also have to install the Chinese software, this is relatively simple

Just after we installed to the lower right corner of the small figure punctuation right button, stop BlackICE engins is first it off, quit to install Chinese software ...


Double-click Setup to show Figure 9

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >


Next comes the path we just installed ...
Figure 10
We're in C, so just direct next.
Note: "Then the path should be changed." D:\Program Files\iss\blackice "

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

The next step is OK ... Now it's all in Chinese ... Can see the ...
Installation finally completed
screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

Then we can rerun the BlackICE.

Install to some basically complete.

Just now we have the blcakice installed, so let's take a look at his setup.


Right-click the small icon in the taskbar and select Edit BlackICE Settings
Figure 1 below
We are here step-by-step to explain how he set up, first look at the first firewall ...
screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >


Now what we see is the default level ...
The default level of protection is full trust, allowing all inbound information, and this, setting the security level is too low ... Generally do not choose this, I also suggest that you choose "High vigilance" "or suspicion of everything", because now the hacker too bad ... Especially for some people with low safety awareness ... I suggest the highest {doubt everything} first. It will intercept all inbound information that is not requested. The following three options are "Enable blocking", "Allow Internet Files", "Share allow NetBIOS network Neighbors"

We can actually use the ....

Let's look at the second one, packet log Figure 2

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

In fact, we should not be all right in this area ... Because this log is of little use to us,
If you choose, just tick it off.
The file prefix log is generally. log, the maximum size, which refers to the size of the log, the maximum number of files, refers to how many logs can be put.
I'm not a choice here.

Now let's take a look at Figure 3
Evidence Log
screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

The main function here is to record the intruder's information, suggest a tick, can be used as an intruder's sentence ... This is the default, okay?

Now let's take a look at Figure 4
Backtracking
screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

This option is to track and analyze the attacker's network information, the first of which is to enable DNS tracing, and the second is to enable NetBIOS node tracking, all of which are recommended
Information used to track intruders. You can use the default.

Take another look at Figure 5
Intrusion detection

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >


Here is what IP allowed to come in ... Add directly to ...

Take another look at Figure 6
Notice that this setting indicates whether an exception event occurs and whether a sound alarm is made. Should usually be selected.

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >


It's all ticked off. There are three kinds of graphs that can be displayed on the left, the sound that can be heard on the right, and we let him sing at the highest possible time.
Here is the update notification ... Enable check, tick every three days he will automatically update.

Look at Figure 7 hint, this default can ...


screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

Take another look at Figure 8
Application program control, this is that we run the program when he will prompt, see also know.



screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

What should happen when an unlicensed application accesses the network? For security reasons, you can choose to ask me what to do under this tab.
Here's the same thing, when you modify an application to load ... Also ask me how to do ...

Take another look at Figure 9

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

This is actually the same as in Figure 8 just now. This is when the program to access the network when asked me what to do?
are generally used as hints,

Remember that figure 8 and Figure 9 are open only after the previous tick to select it ...


Now let's take a look at the advanced firewall settings ....

Figure 10


screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >
Here we see the black rep above forbids, the green represents the passage,
Here can add IP also can, add Port ...

As shown in Figure 11

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >


I add here is the IP, here to see the know, direct point add this 192.168.0.30 permanent prohibition of traffic.

Let's see how the port is shielded as shown in Figure 12


screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >


The port is almost like this set ... If you have UDP, then select the type where ...

Here you can look at Figure 13 again.


screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 Resized= "true" >

Advanced application Settings,





This you see no, this can be in the default disk software to scan ...



Here are a few of the people who invaded my pattern ....

Figure 14


screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >

When we double click on something, he shows some of the intruders ... Such as

Figure 15


screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >



We can see each other's IP, workgroup, MAC address ... With DNS ....


For history as shown in Figure 16

screen.width*0.7) {this.resized=true; this.width=screen.width*0.7 this.alt= ' Click here to open New window ';} ' border=0 >


The general use of hours on it ....

Almost BlackICE is like this set .... In fact, it is relatively simple, he is a powerful firewall, it can be said that the security performance is relatively high ... It's good for people with a weak sense of security.

By: The Shadow Madman

It took me three hours to finish it. Let's see ....

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.