LT   EN   RU  
Wednesday 18 September 2019 Straipsniai.lt - Independent and informative portal
Home
Phorum
Contacts
Login
Register   Login
News subscribe
Subscribe   Unsubscribe
Partners
www.slaptai.lt www.gamezone.lt
www.penki.lt www.hakeriai.lt
   
   
Advertising
Statistic
Visits since 2002 09 12 - 65946930
Pages in Straipsniai.lt: 40735
  
  Computers > Computer technologies > Hackers
Lankomumo reitingas Print version Print version
Windows XP SP2 Firewall shows your files and printers to every Internet user
After you set up Windows Firewall in Microsoft Windows XP Service Pack 2 (SP2), you may discover that anyone on the Internet can access resources on your computer when you use a dial-up connection to connect to the Internet. For example, after creating an exception in Windows Firewall for File and Printer Sharing, you may discover that anyone can access shared files and printers.

Because of the way that some dialing software configures routing tables, Windows Firewall in Windows XP SP2 can sometimes interpret the whole Internet to be a local subnet. This can let anyone on the Internet access a Windows Firewall exception if the exception is configured to use the My network (subnet) only scope option.

To resolve this problem, you must download and install Critical Update for Windows XP (KB886185). You can download and install Critical Update for Windows XP (KB886185) by using the Windows Update Web site or the Microsoft Download Center.

Some dial-up software configures the routing tables in a way that leads the Windows Firewall to determine that the whole dial-up connection is on the local subnet. After you install Critical Update for Windows XP (KB886185), Windows Firewall will no longer interpret network connections to be on the local subnet if they have IP Route Table entries that have an IP address of 0.0.0.0 and a mask of 0.0.0.0. This means that any port exceptions or program exceptions that use the My network (subnet) only scope option in Windows Firewall will not be available over most dial-up connections. You will still be able to access exceptions over a dial-up connection if you remove all scope restrictions or if you create a custom scope for exceptions.

Local network subnet configuration varies depending on the network that you are connected to and how that network is configured. Using the My network (subnet) only scope restriction does not guarantee security because it relies on the network subnet configuration to define what is the local network.

Important We strongly recommend that you use the custom scope option when you want to make sure that no unwanted incoming traffic is permitted to pass through your firewall exceptions.

To access the custom scope options for an exception, follow these steps:
1.Log on to your computer as a member of the local Administrators group.
2.Click Start, click Run, type firewall.cpl, and then click OK.
3.In Windows Firewall, click the Exceptions tab. Click the program or service that you want to create an exception for.
4.Click Edit, click Change scope, and then click Custom list.
For more information ~ configuring Windows Firewall, visit the following Microsoft TechNet Web page:

         
Lankomumo reitingas

Diskusijos - Discusions

Versija spausdinimui - Print version

Atgal
Random tags:    Medicine (5)    Hunting (3)    Transport (54)    V.Nabokov (54)    Literature (24)    Martial arts (7)    Pubic Hair Fashion (15)    Pedagogics (10)    Printers (12)    Badminton (3)    Chess (10)    Automobiles (10)    History (4)    Music (10)    Wedding (10)    Sound systems (10)    Fishing (14)    Physics (5)    Travels (2)    Sport (81)    Hardware (43)    Biology (66)    PHP (3)    Feng Shui (14)    Law (11)    S.Valiulis (2)    Education (174)    Countries (43)    Procesors (2)    Horoscopes (4)    Geography (10)    Formula 1 (2)    Cats (14)    Cinema (20)    Sport gymnastics (9)    Agrobusiness (2)    SSL certificates (10)    Fantasy (10)    Aviculture (2)    Ecology (10)    Suckling (10)    Yoga (4)    Gymnastics (9)    Computer games (64)    Mother and child (17)    Software (11)    Mobile communication (9)    Science (163)    Business (25)    Blow-ups (2)
1. Bill Gates and other communists
2. Wi-Fi overtakes Ethernet for home networks
3. Worm plays games with victims
4. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
5. Troy-horses infects Windows Media files?
6. iWork productivity software targets Microsoft's Office
7. Taiwan police seize 60,000 suspect AMD CPUs
8. IDC: 3 future technologies
9. phpBB Attachment Mod: new vulnerabilities discovered
10. Multiple vulnerabilities within PHP <= 4.3.9, PHP5 <= 5.0.2
1. Multiple vulnerabilities within PHP <= 4.3.9, PHP5 <= 5.0.2
2. Taiwan police seize 60,000 suspect AMD CPUs
3. phpBB Attachment Mod: new vulnerabilities discovered
4. Who says safe computing must remain a pipe dream?
5. Bill Gates and other communists
6. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
7. Feds try to take logs from Nmap creator
8. New Internet domains in the works
9. Kazaa creates worst spyware threat, says CA
10. Alert: New Sober variant rapidly spreading
Map