Secure the Computer from the Black Hat Hacker

Secure the Computer from the Black Hat Hacker

Secure the Computer from the Black Hat Hacker

1: Go to the Windows Defender Firewall with Advanced Security.

Secure the Computer from the Black Hat Hacker 1

2: Open the Inbound Rules.

3: Create the New Rule.

4: Go to the custom rule.

Secure the Computer from the Black Hat Hacker 2

5: Next to the All programs.

Secure the Computer from the Black Hat Hacker 3

6: What is ICMP?

Answer: The Internet Control Message Protocol (ICMP) is a protocol that devices within a network use to communicate problems with data transmission.

7: Select the ICMPv6 Protocol.

Secure the Computer from the Black Hat Hacker 4

8: Follow the instructions.

Secure the Computer from the Black Hat Hacker 5

9: Block the connection.

Secure the Computer from the Black Hat Hacker 6

7: Apply rules to all.

8: Give the rule name.

Secure the Computer from the Black Hat Hacker 7

9: Ping your computer IP Address in the Command Prompt.

Command: ping 192.168.43.126

10: Know its work.

Secure the Computer from the Black Hat Hacker 8

Kakar Security Edition 1

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top