Home Print Presentation

Bookmark us

Contact Guestbook



Windows XP
Internet Explorer
Outlook Express
  Optimization 1
  Optimization 2
Short Cuts

Random Wallpaper





To find quickly information :

A small game ?


English version Version française


A firewall is a physical system (material) or logic (software) filtering the flood of information which enters and which leaves a computer or a network. It is the tool complementary to the antiviruses.

The purpose of it is to protect us from the external ill will and interns. The firewalls make it possible to avoid:
-) The curious ones which generates traffic, which makes more for fear of evil, but which sometimes ends up being expensive.
-) the vandals, those which want to annoy to annoy, (saturation of connections, saturation of CPU, corruption of data, masquerade of identity...)
-) Spies.
-) The escape of information towards outside.

As for the antiviruses, one finds on the market much firewall. According to the specialists, best Stop and Zonealarm Pro would be Look'. Personally I do not know, I always use Zonealarm Pro and I never had concern, it blocks all that I ask him. In a simple click I know all IP addresses of people who wanted to force connection, moreover, in Zonealarm line gives me all the co-ordinates of these companies (postal addresses, telephone, names of responsible people...), and even the exact place on a roadmap!! For the others I think that the same applies but I do not want to advance. Here a small list of alleged the best fire walls. In any event, no fire wall will be never enough effective to prevent somebody penetrating in a computer and from reaching informations.

Look' Stop
Steganos Online Shield
Kerio Personal Firewall
Outpost Pro
McAfee Desktop Firewall
Xelios Personal Firewall
Zonealarm Pro
Norton Personal Firewall
ZoneAlarm Free
Sygate Personal Firewall

Once the fire wall installed and configured, check if it blocks all the intrusions. Sites like those: Cnil.fr or Pcflank.com will be able to inform you about the state of protection of your PC.
Last example on the intrusions and the diversion of PC: Botnets.

Think of decontaminating the report/ratio of errors Internet Explorer. With Each time Internet Explorer plant it sends a report/ratio at Microsoft without you to prevent. To avoid Microsoft of all knowing about you this procedure should be decontaminated: go in the base of register, click on start , Execute and type regedit. To seek key HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Internet To explore \ Hand. If the IEWatsonDisabled key does not exist in the right shutter, create. You will give him like value 0.

To close one of the doors of your PC against the hackers, it is necessary that you parameterized connections network.
For Windows 98 :
Go in the Control panel and choose Connections network and remote access, in connexion used, you click on Properties. There, choose the Type mitre of waiter and strip NetBEUI, in the selection authorized Protocoles network.
For Windows Millenium :
Always in Options Internet, the mitre Connections, choose your FAI and its Properties. In the mitre multiple Connections, notch the box not to use additional peripherals.
For Windows XP :
Always in the window Network, go in the mitre Network management and deselection File sharing... and click on the Avanced mitre. Notch then Protect my computer and the network...

- To decontaminate UPnP urgently.
The function Universal Plug and Play (UPnP) is activated by default under Windows. It reveals your PC as a waiter as soon as you are connected to Internet. It harms seriously the safety of your environment by opening two ports. To mitigate this fault, use the small free program UnPlugn' Play of GRC.COM. not requiring any installation, it is enough to open it, the fire wall will warn you if you want leave the opened port, said not, and the ports will be blocked.

Will know that the majority of the pirates, is 80% of the attacks on the family PC, are due to Script-Kiddies. Script-Kiddies are small hackers which is exerted to improve. They can seek financial information in your documents, to go to see in the history to see the sites banks which you will visit to pump you without your knowledge your money. Always pay attention, crypt your files, to see do not leave no tracks : print all the documents, zipp them with a code. For more explanations, see the Cryptage chapter.

hight of Page