DESKTOP

Filtering Out Evil with Firewalls (part 2)

10/11/2011 9:13:06 AM

Letting a Program Poke through Windows Vista's Firewall

Although firewalls offer protection, they can be as annoying as an airport security scan. In their zest for security, firewalls sometimes go overboard, stopping programs from working the way they should.

You might try to run a new program, for example, only to be greeted with the window in Figure 2 . If you spot that window and you haven't tried to run a program, click the Keep Blocking button: You've effectively stopped what could be a rogue program from connecting with the Internet.

Figure 2: Windows firewall lets you know when it's stopped a program from connecting with the Internet.


But if you want the program to run, click the Unblock button instead. The firewall adds that program to its Exceptions list and no longer bugs you about it.

On a few conditions, however, you'll need to delve deeper into the firewall's settings:

  • Manually add a program to the Exceptions list.

  • Change how the firewall blocks a particular program.

  • Unblock a program you've blocked by mistake.

To do any of those three things, follow these steps:

  1. Choose Control Panel from the Start menu.

    The Control Panel appears, listing its categories.

  2. In the Security category, choose Allow a Program Through Windows Firewall.

    The Windows Firewall Settings window opens to its Exceptions tab, as shown in Figure 3 . Here, Windows Firewall lists the programs it recognizes. Programs with a checked box are able to accept incoming connections through the firewall. No check mark in a program's box? Then that program is blocked.

    Figure 3: Programs with a check mark may accept incoming Internet connections; programs without a check mark have those connections blocked by Windows firewall.

    From this window, you can take any of the following actions:

    • Add a program to the Exceptions list. Don't see your program on the Exceptions list? Click the Add Program button, and the Add a Program window lists all your known programs. Click the program's name and click OK to put it on the Exceptions list.

    • Unblock a program. Unblock any mistakenly blocked program by putting a check mark in its adjacent box and clicking Apply.

    • Block a program. Block any suspicious program from accepting Internet connections by removing the check mark from its box and clicking Apply.

    • Delete a program's name. If you've uninstalled a program but it still appears on the list, click its name and click Delete to remove its entry.

  3. Click OK to save your changes.

    The firewall saves your work and closes the window.

These tips help you wring the most work out of your firewall:

  • Want more information about a program listed in the firewall? Click that program's name and click the Properties button. (Refer to Figure 18-1 .) A window appears, explaining the program's purpose.

  • Think you've messed up your firewall settings? Click the Advanced tab and click Restore Defaults. That removes any changes you've made to the firewall, leaving it set up the way it was when first installed. (Clicking Restore Defaults might also keep some programs from working until you add them to the Exceptions list again.)

  • Don't want the firewall to monitor one of your network connections — your FireWire or Bluetooth connection, for example? Click the Advanced tab and remove the check mark from that particular connection's name.

The difference between hardware and software firewalls

Like antivirus programs, firewalls usually butt heads: You don't want to install two firewalls on the same PC. The exception comes with hardware firewalls. Most routers come with a built‐in hardware firewall that manages the traffic flow between the Internet and your network or PC. Hardware firewalls don't conflict with software firewalls, like the ones built into Vista and Windows XP. Feel free to run them both, and they'll both get along fine.

In fact, the software firewall does something extra that the hardware firewall can't: It manages traffic between the PCs on your network. If an evil program infects a PC on your network, the software firewall can help stop that PC from infecting the other PCs on your network.

Other  
  •  Windows 7 : Windows Driver Foundation Architecture (part 4) - Tools for Development and Testing
  •  Windows 7 : Windows Driver Foundation Architecture (part 3) - Driver Frameworks
  •  Windows 7 : Windows Driver Foundation Architecture (part 2) - Integrated I/O Queuing and Cancellation
  •  Windows 7 : Windows Driver Foundation Architecture (part 1)
  •  Windows 7 : Using Advanced Security Options (part 2) - Configuring Windows Defender
  •  Windows 7 : Using Advanced Security Options (part 1) - Configuring the Action Center & Performing a Manual Scan
  •  Windows 7 : Configuring User Account Control
  •  Windows 7 : Managing and Applying LGPOs (part 3) - Using Local Policies
  •  Windows 7 : Managing and Applying LGPOs (part 2) - Using Account Policies
  •  Windows 7 : Managing and Applying LGPOs (part 1) - Configuring Local Security Policies
  •  Windows 7 : Managing Security
  •  Windows 7 : Creating and Managing Groups
  •  Windows 7 : Managing User Properties
  •  Windows 7 : Working with User Accounts (part 2)
  •  Windows 7 : Working with User Accounts (part 1)
  •  Windows Server : Designing a Software Update Infrastructure (part 2)
  •  Windows Server : Designing a Software Update Infrastructure (part 1)
  •  Securing Windows Server 2008 in the Branch Office
  •  Windows 7 : Configuring Network Connectivity - Configuring DirectAccess
  •  Windows 7 : Configuring Network Connectivity - Understanding BranchCache
  •  
    Top 10
    A New Lick Of CSS For Old Websites
    The Terminator, Apple And Six Months Into Your Future
    Make Great Movies On Your Mobile
    In Car Android : Easy access, The Car Home app
    Get The Most From Your Android's Browser
    Inkjet All In One Shootout - Going With Ink (Part 3) - Specifications - Brother MFC – J825DW, Canon Pixma MX897, Epson workforce pro WP – 4521, HP Officejet 6700 premium
    Inkjet All In One Shootout - Going With Ink (Part 2) - Performance - Brother MFC – J825DW, Canon Pixma MX897, Epson workforce pro WP – 4521, HP Officejet 6700 premium
    Inkjet All In One Shootout - Going With Ink (Part 1) - Design & Handling - Brother MFC – J825DW, Canon Pixma MX897, Epson workforce pro WP – 4521, HP Officejet 6700 premium
    Ipad : Using iTap VNC
    Linking PCs with a Network : Connecting to and Sharing Files with Other PCs on Your Network, Sharing a Printer on the Network
    Most View
    SharePoint 2010 : SharePoint Fundamentals (part 1) - Sites and Site Collections
    Upgrading to Windows Server 2003 : Switching Forest and Domain Functional Levels
    WCF Services : Data Contract - Attributes
    Security Report – June 2012 : Trojan Horses At The Gates Of OSX, Android Fortified, Picture Imperfect & LulzSec Beheaded
    The Three-Step Approach to Security
    Touch and Go (Part 1)
    The golden age of computer mags (Part 1)
    Getting the Most Out of the Microsoft Outlook Client : Deploying Outlook 2007
    Garmin Nuvi 50LM - nuviGating Our Way
    Collaborating via Web-Based Communication Tools : Evaluating Instant Messaging Services
    Windows Server 2008 : Understanding the Identity Management for UNIX Components
    SharePoint 2010 : Cataloging the Best Scripts to Automate SharePoint Administration
    Programming the iPhone : Tables and Embedded Controls
    Customizing Hardware Device Settings
    Incorporate Server Core Changes in Windows Server 2008 R2
    Plantronics Gamecom 780
    Managing SharePoint Data : Creating Site Columns and Content Types in Code
    Nikon J2 With Metal Case And Cheaper Price Than J1
    Brother DCP-J140W
    Windows 7 : Configuring Network Connectivity - Configuring DirectAccess