You are here: hacking technology > firewall > Content
Hot Articles
Recommend Articles
New Articles
Under CMD establishes the WINDOWS firewall as well as the actual use
  Add date: 12/11/2008   Publishing date: 12/11/2008   Hits: 60
Comes to select simply first, generally we are must close this firewall, completes with net stop sharedaccess, opening is net start sharedaccess naturally, but this I actually am must open it, for other, did not do a server preparation to continue to seep, the result by person ddos+Cc, my any operation which harmed cannot realize, does not have the means that my ip address which netstat - under an examination possibly attacked, forbade ip inside noisy most ominous several first, is mainly completely must prevent cc to attack, because I must use the database.
     netsh firewall set portopening ALL 80 HTTP DISABLE CUSTOM 0.0.0.0   Here 0.0.0.0 is the ip open words which must forbid alters to front DISABLE ENABLE, from this analogizes forbids 1433 ports to that machine's opening is again: netsh firewall set portopening ALL 1433 MSSQL DISABLE the CUSTOM 0.0.0.0, here Is the agreement type, may alter to TCP/UDP.
   Again appendix several orders  

netsh firewall show portopening   This may examine firewall's port establishment,
netsh firewall show allowedprogram   Examined the firewall allows to pass procedure
netsh firewall delete allowedprogram exp.exe establishes to exp.exe for is not allowed to pass the condition
under netsh firewall add allowedprogram C:\A.exe A ENABLE increase procedure C plate's A.exe and allows to pass

Prev:Installs firewall's 12 matters needing attention Next:The novice fosters the HIPS system firewall chat

Comment:

Category: Home > firewall