Could someone give me a step by step guide for using my windows firewall (or something that will do the job) to block certain programs from transferring and receiving data across the web?

1 Answer

Answer :

Download and install comodo internet security After installation, open it, go to the “firewall” tab, click “define new blocked application”, select -> browse, then select the executable file you want to block, -> click “apply” -> done

Related questions

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : In B2B e-Commerce (i) Co-operating Business should give an EDI standard to be used (ii) Programs must be developed to translate EDI forms to a form accepted by application program (iii) Method of transmitting/receiving data should be ... . i, ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Last Answer : To cross 10 MB dial * 141 & 612 * 11 * to whom you want to send mobile number # => To cross 25 MB dial * 141 & 812 * 9 * to whom you want to send mobile Number # => To cross 80 MB dial * 141 & 612 * 4 * Mobile number of the person you want to send # => to know more * 141 * 1 #

Description : Free/cheap VNC programs for windows vista that WON'T change my theme?

Last Answer : answer:the reason it changes the background is to speed up the connection since doesn't have to process all the colors. in my experience, it uses the background color as set by the user. I ... a password for the computer and 3, the connection to your computer is secured with 256-bit encryption.

Description : Should I put my Xbox in the DMZ, or entirely behind the firewall, or does it make no difference at all?

Last Answer : I DMZ my Xbox to connect to my friends, although from what I hear, it’s not exactly a good thing to do. It’s the only solution that I’m smart enough to figure out. I tried port forwarding but had no idea what I was doing. Then again, I’m not a network guru or anything…

Description : What is Firewall ?

Last Answer : Every computer or network has its own security system. No one can break through this wall. This invisible wall of security is called fire wall.

Description : Is it possible to block all traffic on a certain port except to two IP addresses?

Last Answer : It depends upon how flexible your router is. Use the router firmware to set this up. If your firmware isn’t sophisticated enough, try to find something like DWT or another good third-party router firmware program to update the one you have.

Description : How do countries, like China, block web sites that they feel are not appropriate?

Last Answer : I’m not quite sure, but it seems to me that the IP addresses are specific to people in certain countries. The Governmnet regulates the internet in the certain country, and if an IP that is in that country tries to access a blocked site, they are denied access.

Description : Router based web redirect rather than block?

Last Answer : answer:Hey the easiest way to do this is to change your dns server to opendns.com and block the types of sites (or individual sites) on a strict dns level. I assume you're using dhcp. If you are ... *also you'll make a personalized account on opendns.com and you'll have a dashboard you can look at.

Description : A firewall may be implemented in a. routers which connect intranet to internet b. bridges used in an intranet c. expensive modem d. user’s application programs

Last Answer : a. routers which connect intranet to internet 

Description : Pick up the correct statement from the following: (A) The roof slabs of multi-storeyed buildings are constructed monolithically to carry the various floor loads (B) The beams of multi-storeyed ... slab is spanned across the secondary beams provided between the main beams (D) All of these

Last Answer : Answer: Option D

Description : I found this in the Package Rules menu:

Last Answer : answer:

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : The process of a computer receiving information from a server via Internet is known as:  (A) Uploading (B) Retrieving (C) Downloading (D) All of the above

Last Answer : The process of a computer receiving information from a server via Internet is known as: Downloading 

Description : Pick up the incorrect statement from the following: (A) The width of the wall is constructed thicker at the base in a stepped fashion (B) A long vertical load transferring concrete structure is ... ) The pile which transfers the load to a hard rock bed at certain depth is called load bearing

Last Answer : Answer: Option D

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : Transferring Files From Windows To UNIX Server?

Last Answer : Many companies are switching to a different platform because ofthe many issues they have with Windows. UNIX is one of the mostpopular choices, but often requires that employees be trained. Thissystem is difficult ... to a Windows server.The transfer process is simple, but may take some time. It is

Description : What is the best starter's guide for affiliate marketing?

Last Answer : http://www.cj.com/get-smart

Description : Does anyone have a link to a really good CSS reference guide?

Last Answer : http://reference.sitepoint.com/css

Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These

Last Answer : a) Firewall

Description : The purple box ad just recently appeared on my Yahoo email account page. Is there a way to block or cancel it, using Firefox?

Last Answer : Try this trick, Yahoo purple box block.

Description : If my DDWRT SPI firewall is enabled on the router, do I need to also engage the Windows (or another) firewall?

Last Answer : Here’s good article on this topic why you need separate firewall on how to geek

Description : Windows XP firewall won't turn on?

Last Answer : Bazooooooooooooooooooooooooooooooooooooooooooooooka to M$ should help with things .

Description : Or is it good to install another one? I'm sorry, but it's my first computer, so I'm asking.

Last Answer : FireWall is not an antivirus. Download and install a real antivirus - I use Avast! free version (http://www.avast.com/cs-cz/download-thank-you.php?product=FAV-ONLINE&locale=cs-cz), but you will definitely get recommendations for others ...: o

Description : Easiest ways to find someone using the web?

Last Answer : answer:Have you tried Pipl.com? I can find almost anyone on Pipl

Description : I would love my webpage to show up on google searches when using a certain keyword (not in the advertisement space), but i also don't want to change anything visible on the page. is there anything i can do?

Last Answer : meta tags, give this a read: http://www.google.com/support/webmasters/bin/answer.py?hl=en&answer=79812

Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP

Last Answer : c. TCP

Last Answer : Windows 3 Of Operating System At Windows 10 Of From A little Easy. But I Windows Seven, Windows 10 Both Usage By I saw it According to Windows 3 So A little Easy. But Windows 10 Tao Good. Since You ... Therefore You Windows 10 This Use To do You can. But You If you want In Windows 7 To go Can.

Description : Window delivery tickets are meant for receiving a) Regd/Unregistered mail at the window of the PO b) Fully prepaid unregistered mails for the addressee across the window c) Fully prepaid unregistered mail in a locked bag d) All the above

Last Answer : c) Fully prepaid unregistered mail in a locked bag

Description : What is used in most programs that are part of a program and guide the user to specific steps ?

Last Answer : Most programs use a wizard that is part of a program and guides the user through specific steps.

Description : What are the drawbacks for Layers? a) It is often necessary to pass data through many layers, which can slow performance significantly b) Layers support information hiding c) Multi-layered programs ... tend to be implemented through a series of calls across layers d) None of the mentioned

Last Answer : Multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers

Description : Is there a way to block all Facebook users, for example who work in X, and I don't want them to find me in search or even see my user account?

Last Answer : I know you can make it so that no one can find you in a search and that you can block individual people, but I don't think you can block a whole group (of people that aren't your friends) ... something like that). If they aren't your friend, I think you would have to block each person individually.

Description : App to share live audio across devices (like a tour guide speaking to a group)?

Last Answer : answer:I believe this is called a phone…~ Ok, seriously though. Other than just doing a conference call through something like Uber Conference, how about something like google hangouts?

Description : At what frequency compared to the cutoff frequency of a waveguide will the wavefronts be reflected back and forth across the guide (setting up standing waves) and no energy

Last Answer : UHF receiving antenna

Description : Trouble transferring data between external drives - shrinking file size?

Last Answer : Hopefully you get someone to answer here. I was curious about this, so I started googling. These are my results. http://support.apple.com/kb/HT2355 Journaling doesn't seem to have any meta-data. ... the file system knows what files might be out-of-date without going through the entire file system.

Description : What is a good way of transferring a large amount of data from one computer to another?

Last Answer : A external hard drive. You can get a 500gb external for under a hundred bucks. Quick and easy.

Description : _____________is a feature of an operating system that allows a computer to compensate for shortages of physical memory by temporarily transferring pages of data from RAM to disk storage. A. Flash memory B. Virtual memory C. Buffer D. None of the Above

Last Answer : B. Virtual memory

Description : __________ an external bus standard used for transferring data to and from digital devices. A. Serial Port B. Firewire C. Parallel Port D. USB

Last Answer : D. USB

Description : What is the data link protocol that is used in asynchronous transmission for transferring files from one computer to another? A. A modem B. X modem C. B modem D. C modem

Last Answer : B. X modem

Description : What is the data link protocol that is used in asynchronous transmission for transferring files from one computer to another? A. A modem B. X modem C. B modem

Last Answer : B. X modem

Description : Protocols are? A. Agreements on how communication components and DTE's are to communicate. B. Logical communication channels for transferring data C. Physical communication channels sued for transferring data D. None of above

Last Answer : A. Agreements on how communication components and DTE's are to communicate.

Description : How many ways of transferring data between the microprocessor and a physical I/O device: a. 2 b. 3 c. 4 d. 5

Last Answer : b. 3

Description : From the following for which process ‘Archive Manager tool ‘ is used ? a) For transferring the data of file and directory b) For place compression on the file and directory c) For altering the form of file and directory d) For data compression on file and directory

Last Answer : d) For data compression on file and directory

Description : Have you ever said something to someone if they were sending and receiving texts while you were trying to have a conversation with them?

Last Answer : I tell them when they’re done we can resume our conversation and walk away. They got miffed, but didn’t do it again.

Description : Are there any programs out there similar to these?

Last Answer : answer:Those two examples are created with Javascript. You could create something similar in Flash with Actionscript 2 or 3.

Description : How do I make programs think there is no proxy?

Last Answer : I don't know the specifics, but you may try running your software through an emulated LAN connection. I know that there are programs available that allow you to simulate a LAN. If you can trick the ... may be able to fool it into thinking that it is running on a direct connection. Do you follow?

Description : Programs Of composition Most Tough Language Which one ?

Last Answer : Programs Of composition Most Tough Language Machine Language.

Description : Do Fitbit and the Apple Watch (or other, similar personal step and heartbeat tracking devices) report their results to the NSA and CIA?

Last Answer : Most likely, if they want the info. I used to care and I probably should but I don’t anymore. It’s nearly impossible to secure all of the little gadgets that we have which reveal info like this. We have the right to privacy but it’s just getting much harder to tend to that right.