Results 1 to 4 of 4

Thread: Protect your computer from Hackers while Online

  1. #1
    Join Date
    May 2009
    Posts
    1,611

    Protect your computer from Hackers while Online

    To protect you from hackers on the Internet, we recommend the firewall Jetico: this is the best. And to arrange everything: he is French and free.

    After defining your trusted zone, that is to say the LAN between your computer and your Internet connection before you will allow or not the software you use to connect to the Internet. Usage rules for Web browsers, messaging software, or FTP clients are preset and enable the software to access the Internet safely.

    For other software, you refuse to authorize ad hoc or permanent access to the Internet. If you are unsure, you can reject the connection, even if the permit later if needed.

    Follow the guide to properly deal with Jetico and have optimum protection.

    Download and install Jetico:

    Jetico is a free firewall. You can download it from http://www.techarena.in/download/fir...l-firewall.htm.

    • Once the download is complete, click the Run button.
    • Confirm the launch of Setup Jetico by clicking the Run button.
    • The installation wizard opens Jetico. Click the Next button.
    • Check the box I accept this agreement and click Next three times.
    • Jetico files are copied to your computer. Check the Yes box, I now proceed to the configuration. Click the Finish button when done.

  2. #2
    Join Date
    May 2009
    Posts
    1,611

    Re: Protect your computer from Hackers while Online

    Set the network monitoring:

    You must now define your area of confidence, that is to say your computer or network on which you have your computer (your router or your box for example).
    • The Setup Wizard opens Jetico. Click the Next button.

    • Jetico found himself the address of your network: 192.168.1.0. If in doubt, you can check the documentation for your router or your box. Click the Next button.

    • Ignore the setting of the sensitive area by clicking Next.

    • Finally click the Finish button.

    • Click OK to restart your computer.


    Allow early access:

    When you restart your computer, locate the icon Jetico in the taskbar (it is 2 small gray arrows). This icon indicates that Jetico is operational. At the same time, one or more windows on the screen. Jetico actually detects programs wishing to connect to the Internet. Watch the online application to find out what software is. If the software has the right to connect to the Internet, it may be your antivirus, for example, select the Custom option (reject) and click Edit Rule.

    In the window that appears, scroll down the list and select the option Verdict Accept. Click OK twice. For software which you do not know whether or not allow access to the Internet, select the Block this activity. You can change this permission later if needed. Windows and software that start at boot time to finish loading.

  3. #3
    Join Date
    May 2009
    Posts
    1,611

    Re: Protect your computer from Hackers while Online

    Manage Permissions:

    Now you must assign the rules of predefined software the most important: your web browser, email software, your FTP client, ...
    • Start your first Web browser.

    • A window Setting the event network Jetico opens. Select Treat.

    • Scroll to the right, select the proposal that corresponds to your software, Web browser here.

    • Click the OK button.

    • Then do the same with your mail client, Outlook, Outlook Express or Thunderbird, for example, and choose Treat Customer Messaging.


    Improved browser protection:

    Some predefined rules, like those that manage your Web browser, are content to allow certain types of communication, without preventing other. To improve your security, you can force the blocking of communications that are explicitly permitted.
    • Double click on the icon Jetico in the taskbar to bring up the main program interface.

    • Open the Settings tab.

    • Scroll down and click on Optimal protection Web Browser. Note that this option may also be located in Racine, rules on applications, Ask the user.

    • Click the right mouse button in an empty space right frame of the window and then select the command New Rules for application.

    • In the window that appears, scroll down the list and select the option Verdict Reject.

    • Click the OK button. The rule is added on top of the list of other rules.

    • Then click on this new rule and, while holding the mouse button down, move there at the end of the list.

    • Finally, click on the Save icon, shaped disk.

  4. #4
    Join Date
    May 2009
    Posts
    1,611

    Re: Protect your computer from Hackers while Online

    Manage Alerts:

    As and when you launch the software, check if Jetico need access to the Internet and they must be accessible from the Internet. A dialog box Setting the network event opens for you to specify if the software is allowed or not to connect to the Internet.
    • For specific needs, as for a research update, select the Allow this activity. The software will then have immediate access to the Internet. Uncheck the box Save my answer. Your review will then be asked again during the next attempt to connect the software.

    • To deny access to Internet software, select the Block this activity.

    • If the software require a simple access to the LAN (not internet) to play with friends in the network for example, select Treat and select applications in trusted zone.

Similar Threads

  1. Tips to protect your Online Store
    By Mathrubootham in forum Tips & Tweaks
    Replies: 3
    Last Post: 17-01-2012, 10:21 AM
  2. Protect my site against hackers
    By Gunwant in forum Software Development
    Replies: 5
    Last Post: 19-01-2010, 09:09 PM
  3. What is WPA encryption and How to protect Wi-Fi from hackers ?
    By Kingfisher in forum Networking & Security
    Replies: 4
    Last Post: 23-12-2009, 09:56 PM
  4. What are the measures to protect my online passwords?
    By JAMAAL26 in forum Networking & Security
    Replies: 5
    Last Post: 16-12-2009, 02:24 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,523,871.11485 seconds with 17 queries