educational

Using Windows XP Internet Connection Firewall

When you create a small network connected to the Internet, you increase the vulnerability of your computers to unauthorized access, including viruses. To protect your new network, you need to create a type of barrier called a firewall. Windows XP comes with a firewall that you should use when setting up your own network. Here's how...

How Does a Firewall Work?
A firewall is a security system that acts as a protective boundary between a network and the outside world. Like an actual firewall built to prevent fire from spreading between adjoining buildings, computer firewalls prevent the spread of unauthorized communication between an individual computer or group of networked computers and the Internet. One of the most effective and least expensive ways to protect a small network is to create a firewall on your ICS (or Internet Connection Sharing) host computer, and to make sure that computer is the only one on the network with a direct connection to the Internet.

Another way to protect a small network is to use a hardware device called a residential gateway, or router. Residential gateways contain a firewall and replace an ICS host computer as the central Internet connection. Because it contains no files, folders or other data, and cannot be used to manipulate computers to which it is linked, a residential gateway offers a greater degree of protection than a basic ICS host computer. Should a hacker manage to bypass the firewall, the only access gained will be to the device, which is in effect empty. A disadvantage of a residential gateway is the extra cost it adds to putting together a network.

You can create a small network having neither an ICS host computer nor a residential gateway, but at a high cost to security, and convenience. With such a setup, Internet access is obtained by linking each computer directly to the Internet service provider via the computer's own modem, or else all of the computers on the network can be linked to an Ethernet hub, which functions as a central Internet connection. Neither of these methods provides firewall protection; and while Internet Connection Firewall can be enabled on networked computers running Windows XP, doing so prevents those computers from sharing files and devices.

Setting Up Windows' Internet Connection Firewall
Windows XP includes Internet Connection Firewall (ICF) software you can use to restrict what information is communicated between the Internet and your home or small office network. ICF will also protect a single computer connected to the Internet with a cable modem, a DSL modem, or a dial—up modem.

If your network uses Internet Connection Sharing (ICS) to provide Internet access to multiple computers, you should use ICF on the shared Internet connection. However, ICS and ICF can be enabled separately. You should not enable the firewall on any connection that does not directly connect to the Internet; ICF is not needed if your network already has a firewall or proxy server.

You must be logged on to your computer with an owner account in order to complete this procedure. You should not enable Internet Connection Firewall on virtual private networking (VPN) connections or on client computers because ICF will interfere with file and printer sharing. ICF cannot be enabled on the private connections of the Internet Connection Sharing host computer.

To enable or disable Internet Connection Firewall:

» Open Network Connections (Click Start, click Control Panel, and then double—click Network Connections.)

» Click the Dial—up, LAN or High—Speed Internet connection that you want to protect, and then, under Network Tasks, click Change settings of this connection.

» On the Advanced tab, under Internet Connection Firewall, select one of the following:

• To enable Internet Connection Firewall (ICF), select the Protect my computer and network by limiting or preventing access to this computer from the Internet check box.

• To disable Internet Connection Firewall, clear the Protect my computer and network by limiting or preventing access to this computer from the Internet check box. This disables the firewall, your computer and network are then vulnerable to intrusions. If you do not have a firewall on your system, you will likely find yourself wide-open to the world at large.

One of the ways in which you can dramatically compare the before and after effects of using the ICF is to first visit https://probe.hackerwatch.org/probe/probe.asp for an open port scan. This will reveal any potential vulnerabilities in your system — at least as far as port intrusion is concerned. If you do not have a firewall on your system, you will likely find yourself wide-open to the world at large. Enable the ICF on your Win XP machine as outlined above, and then re-run the port scan. Feeling a little better now?

Windows XP makes it easy for you to protect your Internet connected network from unauthorized access as well as malicious viruses. If you have not yet done so, enable ICF on your Windows XP machines today!

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

profile

VerifyMy Seeks to Provide Frictionless Online Safety, Compliance Solutions

Before founding VerifyMy, Ryan Shaw was simply looking for an age verification solution for his previous business. The ones he found, however, were too expensive, too difficult to integrate with, or failed to take into account the needs of either the businesses implementing them or the end users who would be required to interact with them.

Alejandro Freixes ·
opinion

How Adult Website Operators Can Cash in on the 'Interchange' Class Action

The Payment Card Interchange Fee Settlement resulted from a landmark antitrust lawsuit involving Visa, Mastercard and several major banks. The case centered around the interchange fees charged to merchants for processing credit and debit card transactions. These fees are set by card networks and are paid by merchants to the banks that issue the cards.

Jonathan Corona ·
opinion

It's Time to Rock the Vote and Make Your Voice Heard

When I worked to defeat California’s Proposition 60 in 2016, our opposition campaign was outspent nearly 10 to 1. Nevertheless, our community came together and garnered enough support and awareness to defeat that harmful, misguided piece of proposed legislation — by more than a million votes.

Siouxsie Q ·
opinion

Staying Compliant to Avoid the Takedown Shakedown

Dealing with complaints is an everyday part of doing business — and a crucial one, since not dealing with them properly can haunt your business in multiple ways. Card brand regulations require every merchant doing business online to have in place a complaint process for reporting content that may be illegal or that violates the card brand rules.

Cathy Beardsley ·
profile

WIA Profile: Patricia Ucros

Born in Bogota, Colombia, Ucros graduated from college with a degree in education. She spent three years teaching third grade, which she enjoyed a lot, before heeding her father’s advice and moving to South Florida.

Women In Adult ·
opinion

Creating Payment Redundancies to Maximize Payout Uptime

During the global CrowdStrike outage that took place toward the end of July, a flawed software update brought air travel and electronic commerce to a grinding halt worldwide. This dramatically underscores the importance of having a backup plan in place for critical infrastructure.

Jonathan Corona ·
opinion

The Need for Minimal Friction in Age Verification Technology

In the adult sector, robust age assurance, comprised of age verification and age estimation methods, is critical to ensuring legal compliance with ever-evolving regulations, safeguarding minors from inappropriate content and protecting the privacy of adults wishing to view adult content.

Gavin Worrall ·
opinion

Account-to-Account Payments: The New Banking Disruptor?

So much of our industry relies upon Visa and Mastercard to support consumer payments — and with that reliance comes increased scrutiny by both brands. From a compliance perspective, the bar keeps getting raised until it feels like we end up spending half our time making sure we are compliant rather than growing our business.

Cathy Beardsley ·
profile

WIA Profile: Samantha Beatrice

Beatrice credits the sex positivity of Montreal for ultimately inspiring her to pursue work in adult entertainment. She had many friends working in the industry, from sex workers to production teams, so it felt like a natural fit and offered an opportunity to apply her marketing and social media savvy to support people she truly believes in and wants to see succeed.

Women In Adult ·
opinion

Understanding the Latest Server Processors

Over the last decade, we mostly stopped talking about CPU performance. Recently, however, there has been a seismic and exciting change in the CPU landscape, due to innovation by a chip company called Advanced Micro Devices (AMD).

Brad Mitchell ·
Show More