Solved

Problem with 2nd Networked PC

Posted on 2000-03-22
10
139 Views
Last Modified: 2013-12-28
If I have Zone Alarm enabled, my second PC won't connect to the Internet. If I disable Zone Alarm it will connect. Any suggestion as to why ?
0
Comment
Question by:nar321
  • 5
  • 4
10 Comments
 

Accepted Solution

by:
Corvax666 earned 100 total points
Comment Utility
What are you using to share you're internet connection?
0
 
LVL 12

Expert Comment

by:Otta
Comment Utility
The web-page at http://WWW.ZoneAlarm.COM documents this problem as a "restriction" in the software.
0
 

Author Comment

by:nar321
Comment Utility
What is a "restriction"? I paid $40 for Black Ice Defender to find upon visiting www.hackerwhacker.com that port139 is wide open. So tried Zone Alarm (and expect for the fact that if it is enabled and I try to access the Internet off my second computer it doesn't happen.)I'm very pleased with its abilitys. If this "restriction" means I have to get something else,so be it. Win98SE ICS is a joke .
0
 

Author Comment

by:nar321
Comment Utility
I'm using Sybergens ICS
0
 
LVL 12

Expert Comment

by:Otta
Comment Utility
http://www.zonelabs.com/support_quick.htm#9
------


            If you install ZoneAlarm on the ICS computer, set the Security level to medium.
            ZoneAlarm will still provide application control to the computer running ICS, but not
            protect the network. You can then install ZoneAlarm on the other computers and all
            the features will work properly. Alternatively you can add your computers IP
            addresses to the trusted local Zone on the ICS machine, and leave the local security
            level to medium or low, and it should work fine.
0
Why spend so long doing email signature updates?

Do you spend loads of your time carrying out email signature updates? Not very interesting are they? Don’t let signature updates get you down. Let Exclaimer Cloud - Signatures for Office 365 make managing email signatures a breeze.

 
LVL 12

Expert Comment

by:Otta
Comment Utility
> upon visiting http://www.hackerwhacker.com that port139 is wide open.

Click your mouse's 2nd button on "Network Neighbourhood", and click on "Properties".

Remove all protocols, except for TCP/IP.
Disable "File and Print Sharing".
0
 

Author Comment

by:nar321
Comment Utility
At the security levels that show me as "Sleath" on Zone Alarm, going up with only Black Ice Defender enabled shows Port 139 as open and all that having that port does. This translates to me as I didn't get much for my forty dollars.
0
 

Author Comment

by:nar321
Comment Utility
Now this is more like it, regarding responses. Thanks
0
 
LVL 12

Expert Comment

by:Otta
Comment Utility
When port 139 is "open", then it is your "internal" security which becomes important.

Do _NOT_ allow "NetBIOS over TCP/IP" to be installed -- uninstall NetBIOS.

Within Windows Explorer, right-click on the 'C:' drive icon, and select "sharing", and click "disable sharing".
Repeat for any/all other drive icons.

Then, you'll _NOT_ be "sharing" any folders, and NetBIOS will _NOT_ be communicating with other computers on the Internet.

So, port 139 becomes a "door to an empty room", and it does not matter that the door is not locked.
0
 

Author Comment

by:nar321
Comment Utility
Thanks again. What I did was raise Black Ice Defenders protection level to Paranoid, which shows me as" Stealth"on Steve Gibsons "SheildsUP" web page for everything expect IDENT which is closed.

I tried changing the Network Security Level on Zone Alarm= it still wouldn't let me connect on the 2nd Computer. Trying to enter a computer name or computer ip address into Zone Alarm causes a error message.

So went into the Win98 Configuration and had it not load Zone Alarm, so I could see if it was still working in the background.Then did the previously explained.Unbound File and print sharing from TCP and used NetBeui instead. Can see and use both computers, can print if the second one is on and can access the Internet from either. Now will uninstall Zone Alarm and pay Sybergen for there ICS program.












t
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
If you need to start windows update installation remotely or as a scheduled task you will find this very helpful.
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now