Solved

block outgoing requests

Posted on 2006-11-12
6
265 Views
Last Modified: 2013-12-04
How can I block outgoing request to a set of ip addresses (any/all ports)?
0
Comment
Question by:jhshukla
  • 4
  • 2
6 Comments
 
LVL 7

Expert Comment

by:dttri
ID: 17929334
Greetings!
You need a firewall to do that. Are you using any firewall?
0
 
LVL 7

Expert Comment

by:dttri
ID: 17929409
The freeware version of ZoneAlarm firewall from Zone Labs has support for outgoing traffic filtering:

http://www.zonelabs.com/store/content/company/products/znalm/freeDownload.jsp?dc=12bms&ctry=US&lang=en
0
 
LVL 9

Author Comment

by:jhshukla
ID: 17956031
dude, thanks for the info but i do not dare to try to install ZA once more.
I installed ZA and stopped the process for some reason. when I rebooted, I simply could not log on "Insufficient Disk Space". WTF? System restore didn't work either. I booted to backup OS on separate partition, deleted all ZA related files. Now I could log on but lots of services wouldn't start. I spent 5-6 hours and finally decided that I needed to reinstall the OS.

I do not mean to prove anyone wrong here and I have seen it being used a quite a few places but I guess it is not for me. Do not want to go through that nightmare again. Do you have another solution?
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 7

Accepted Solution

by:
dttri earned 50 total points
ID: 17957024
OK,
Please check a guide on personal firewalls:

http://www.firewallguide.com/software.htm
0
 
LVL 9

Author Comment

by:jhshukla
ID: 17958957
0
 
LVL 7

Expert Comment

by:dttri
ID: 17962251
:-)
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question