| |||
|
* This page is made by "machine translation" program from Japanese to English.
They are Windows 2000 and Windows XP all over August, 2003 and the world. The things where a computer repeated shutdown of a system freely occurred. What was then raged is "MS blast." (MSBALST, a %(%`%(%9 blast, Love Sun, Lovsan, Lovesan, Blaster, Blaster, Poza) $d, The derivation kind of "Welchia" (Welchia, Sachi, Satie, Welchi, a Welch, Nazi, Nachi, Nachi-A, Nachi.A, the MS blast D, MSBLAST.D, Lovsan.D) In addition to this (MS blast .B, MSBLAST.B, Blaster.B, Blaster.B, Poza.C, Lovsan.c, Lovesan, Blaster.C, Blaster.C, Blaster-B, Poza.B, MSBLAST.E, BlasterE, Blaster.E, Blaster-E, MSBLAST.F, BlasterF, Blaster.F, Blaster-F) It came out and carried out. These are not infected by . mail which invades into a computer from the port (entrance) of No. 135 freely, seizes on, the weak point MS, i.e., fault, 03-026 of Windows, and does mischief. These are classified into a worm type program. (Bad program . of Tati who does self-multiplication not trying to regard the significance of a basis as a worm (worm) .) Furthermore, another weak point MS 03-039 of Windows "a code is executed by buffer overrun of RPCSS service (824146)" became clear on September 11. Therefore, it invades from somewhere in ports of 135, 137, 138, 139, 445, and 593. Sasser (it Worm(s) Sasser, WORM_SASSER.A, WORM_SASSER.B, and W32.Sasser. --) W32.Sasser.B.Worm, W32-/Sasser.worm, and W32-/Sasser.worm.b -- the brittleness of Windows -- "MS 04-011" is abused and it says from TCP port 445 Port (port) $H$O -- it is like the "haven" which a "ship" called the packet which comes to the "state" of your computer from network "sea" frequents Packet (packet) It is the module of the data which flow the $O Internet. A port is 0, 1, and 2 as a function of operating system, such as Windows. It is managed for -- and the integer 65535. A port is also in your computer also as one set. each port is opened -- $F$$ (open) -- it is in one of those closed (close) conditions From the port of a serial number where the transmission side computer was decided, various network serviceses, such as HTTP and FTP, send a packet to the port of a serial number where the reception side computer was decided, and are communicating. a packet is sent from the computer of the assailant whose worm is also a transmitting agency, and a victim's computer which was infected and was made a steppingstone -- if it can do . transshipment -- a packet -- " -- riding -- " -- it comes and badness is committed using the function and weak point inside a computer If the receiving port has closed, transshipment will fail [ a refusal response ] in a transmitting agency on the contrary.
Then, although it is required as countermeasures, such as a worm like MS blast, to correct an internal weak point (fault), of course, the technique of intercepting the packet passing through the port which you are not using on the way is also effective. that is, . (the below-mentioned stealth condition) which can be prevented from answering for every port even if it provides the filter which intercepts a packet between a network and a computer (block), a packet comes and it requires transshipment -- since it is visible to the condition same with not existing in this case, it is optimum for fending off the repeated attack of a malicious program . which is also in that which enables a bad program to open other ports from inside by oneself, and for him to communicate outside from inside, or to communicate from outside once a worm invades into a computer from some port -- if it becomes like this, the kitchen also tends to carry out transfer of a file also by the monitor of an operation Also about the transmission to an outer network from the program inside a computer, if it intercepts for every port, the transmission which is not meant can be stopped. Of course, if a port is all intercepted, does normal communication also become impossible entirely? Then, it is that you yourself set up the conditions extracted to the minimum "you may transmit/receive from the port of what No. from an application program called what in the port of what No.", and security is planned. Let's see the advantage of this technique, and application. : (1) Port scan (Scan with attack .scan which finds out one after another which port is vacant, attaches it to a weak point, and is said) It does not $b
Then, the procedure to recommend is as follows. :
With this article SPF I introduce the method of intercepting the port which is not used by installing the software to say in its own computer. It is Personal Firewall (personal fire wall) of Sygate (Sygate) which it abbreviated to SPF here and was written. If . literal translation of is done, it will be "a personal fire wall." Since Windows XP and Windows 2003 build in the "Internet fire wall function", it can also be used without using SPF. -> procedure details which verify the fire wall function of WindowsXP (ITmedia) (Microsoft Corp.) In addition, in the software of a fire wall, it is also everything but SPF.
etc. -- it is variously It is that the . feature the fire wall apparatus of hardware is also characteristic does not not much have the reaction of a communication performance or the performance on a computer, and that a fire wall cannot be easily broken by the malicious program. Probably, cautions will be required since I hear that it does not work unless there is also a merchandise with which the fire wall function is a setup which is not fully committed at the time of a factory shipment and it reads and sets up a covering letter, although there are some which carried the fire wall function with the router. Although SPF, of course, also has a weak point on account of software, freight free (in the case of non-business utilization) is charm. .OS with convenient it being easy to use also for an unskilled operator, and a blockage and an allowance being finely specified as an old hand Windows 95 besides Windows 2000 Professional, Windows XP Professional, and Home Edition (OSR2 & OSR2.5), 98, 98SE, Me, NT4.0 (SP4 or subsequent ones), NT 4.0 Terminal Server (SP4.0 or subsequent ones), Windows 2000 Server, Advanced Server, and Data Center are also supported. [Attention] When a plurality of network pro %H%3%m%k drivers are installed in the computer, it is explained by the Readme file that SPF may be conspicuous and may do the reaction of a performance depression. It is a line-speed observation site after an induction ( speed.rbbtoday.com etc.), and the direction which line speed worries is (1). The case where SPF is ordinarily used, and (2) Closure ("File" => "Exit Firewall") It comes out with the case where it carries out. effective transmission speed probably, it will be good to scale . -- Norton once The fire wall function of Internet Security (NIS)2002 the sharp transmission-speed depression of 2.5Mbps(es) in 4Mbps(es), 1.2Mbps->0.4 - 0.8Mbps, or 8Mbps(es) by the Windows Me user The crab in which also has those how many indication and the communication of a fire wall generally is not late according to conditions of having caused is . (in addition, this question) which will need to be warned. In cancellation of the fire wall function of NIS, although not repaired, it has improved by uninstallation (article No.579), and the information (article No.570) that it had improved by re-installation of Internet Explorer appeared. [Attention] I found a problem that the amount of the used RAM memory increases more and more while SPF is running. It is peevish without "structure" of this point and SPF being good.Hereafter, I explain the method of the blockage using SPF of a port. Even if he understands well neither English nor a network term nor the term of Windows, I want to explain this article carefully also including an example so that a setup of SPF can be performed simply.
(1) The case in the condition that your computer can be infected with MS blast, Welchia, etc. has risk of being infected also with the time (it being grade for 20 minutes - for 70 minutes in 56 or less Kbps of line speed) connected with the network for download. Probably, it will be safer to download a spf.exe file in the procedure from the following term, to copy to a memory medium by computer [ finishing / the countermeasure of the computer, company, or friend with whom those worms, such as Windows 95, 98, and Me, are not infected / if you want to also prevent it ], and to execute by its own computer. .MO which is not simply settled in one ordinary floppy disk since there are about 6 MBs (Magneto-optical disc) Probably, it will be OK if it is a $d flash memory. (2) It connects with the site of Sygate and SPF is downloaded. First, a lower link is clicked and a page is displayed. (3) since the page of download and purchase is displayed -- " Sygate Personal Firewall " -- " Free Download " (free download) -- : to click Since it is thought that the server of Sygate has stopped when the error of a transshipment time-out etc. takes place and is not displayed, even if it clicks, I feel that it has stopped in . U.S. time which sets time and does it again by maintenance in the night on Sunday.(4) "Download Now" as which the download page of SPF is displayed is clicked. If it goes to the next screen, when . which specifies suitably the place which downloads spf.exe and clicks O.K. will also have stopped by carrying out, "here" of "click here" of a screen is clicked. : (5) Although it is next installation since download finished, please wait just for a moment. Let me surely finish other applications before installation. Please give. Especially Computer virus countermeasure software, other fire wall software, packet capture software, etc. $O -- please let me end without forgetting by any means Otherwise, transmission and reception completely become impossible. Since the danger of suiting a fault [ like ] will seemingly be high .... Related information (Mr. SalB) (If the closure method has "a closure (exit)" in the menu which measure right-clicks on an icon with each software, and comes out, it will carry out the left click of it)
(6) The spf.exe file copied to download or the medium is double-clicked and executed. Then, installation of SPF starts. The rest follows the indication of a screen. If the reboot of Windows is directed, it will save, if there is a file under work by other programs, and Windows will be rebooted. (7) The middle, . name and the e-mail address out of which the screen of user's registration (Registration) comes are written without using the kanji, and it pushes "registering immediately now (Register Now)." for the time being -- "registering later (Register Later)" -- even if -- OK . . which the direction of it does not become puzzling and is recommendation (. which chooses :"9g$$ which SPF has heard at its own discretion after a setup all finishes, connects a circuit, and inputs and registers a user name and a mail address (Register Now))
* The starting method of SPF "Start" =>"program" => "Sygate Personal Firewall" => "Sygate Personal Firewall" The window of a main screen is also opened. It is the icon of SPF to a task tray. It comes out. * How to erase the window of SPF the window upper right -- " " button is clicked. or "File" => "Close" is clicked on the main screen of SPF. This also resides in memory permanently and SPF is executing the surveillance, the blockage, etc. of a port for it. * How to take out the window of SPF (1) When SPF is executed, It is the icon of SPF to a task tray. since it is -- its right-click => "Sygate Personal Firewall" -- a left click (2) When SPF is not executed, perform the above-mentioned starting procedure. * The closure method of SPF The icon of SPF of a task tray right-click => "Sygate Personal Firewall" -- a left click or "File" => "Exit Firewall" is clicked on the main screen of SPF. * The forced-termination method of SPF If OSs are Windows NT, 2000, XP, 2003, etc. when it cannot end by the method [ ordinarily ], it can be made to force by the following method to terminate. : the process tab of the task manager which pushes Shift-Contol-Esc simultaneously and of which => starting is done -- a click => image name -- Smc.exe -- a click -- the caution of a reversal => "the closure (E) of process" => task manager -- "-- yes, (Y)" is answered * Supplement If it carries out (Although a security engine becomes a cancellation after terminating SPF, may I end truly?) $H -- since he asks -- "-- yes, (Y)" is clicked - Also when starting Windows, SPF is set up in the above-mentioned procedure so that it may start automatically. - Even if it starts SPF . which clicks cancellation (although a dialog disappears in fixed time and starting dispensation is finished even if it does not click), and is again started when $N2hLL can come out and cannot start -- if useless, . SPF which can offer re-installation of .SPF in which installation has probably failed is still uninstalled
SPF
If it comes out and starts, the following main screens will appear. : Here, if Security is pointed at, the menu of the following three conditions will come out. This significance,
If this is known, it will be useful in case of emergency.
then, . which should carry out an option setup of SPF simply -- here is material selection of whether what we do with how to protect security It is the main screen of SPF. It clicks. ("-- in Sygate personal fire wall PRO in which the function which can be used no longer here also won the prize, and ICSA certification has also received it, for continuing the Tel Me More button, please push the O.K. button seeing . detailed information that it gets used to utilization -- the advertisement .") If $NLd9g$; comes out, a check will be put into "Remember my answer and and do not show this message again (a reply is memorized and it does not display from next time)", and "O.K." will be clicked. And the following examples of a setting are set as a reference on all tab screens, and "O.K." is clicked. probably, you may set up as the screen of each following example without, reading a fine setup which wrote to below first of all, if it is a house and is the case where LAN is not being used, either . -- it is unexpectedly easy * General (across the board) tab : * Netwark Neighborhood (network computer) tab : * Security (secret) tab : * E-Mail Nortification (action of E-mail) tab : * Log (log) tab : * Updates (renewal) tab :
Although an option setup of SPF was finished above Please once terminate SPF and start. This is . which is because there is a fault with which the configuration file of SPF disappears to the timing of a Windows closure occasionally. -- Related information (Mr. SalB) " The program (Smc.exe) of SPF continues moving only by a window closing, even if it clicks" button. . In Order to Terminate SPF, Click "File(File)" => "Exit Firewall (SPF Program is Ended)." the time of having asked whether I may end truly -- "-- yes, (Y)" is answered In order to start SPF, "start" => "program" =>"Sygate Personal Firewall" => "Sygate Personal Firewall" is clicked.
Here, let's all intercept transmission and reception per application about the following application programs.
If this is carried out, all port transmission and reception will be intercepted, but since the conditions to which transmission and reception are permitted with the above-mentioned rule are specified exceptionally in the case of a browser, it can communicate. (1) Although a Hide (it hides) check box is in the upper right of the front portion of a SPF main screen, the display of a part of application is made not to be hidden by turning OFF, while carrying out the following setup during execution. The check of the upper check box is removed. (2) If the program of relevance is started, it will appear in Running Application (under execution application) of the lower part of the main screen of SPF. (3) A browser, above-mentioned LSA--, . that right-clicks and checks "Block (it intercepts)" by each icon of Task--, then an icon become the mark of DO NOT ENTER. . which will come to ask [ which intercepts each time whenever there is communication / or or ] whether to carry out carriage if "Ask (it asks)" is checked -- it becomes a question mark at this time It becomes that intercepting by this method is reasonable for the program (Apache etc.) to, for example, the web servers installed on their own computer, to make it access, and the thing considered to others, and quite safe. In addition, since that is right, transmission and reception of the following application are made into the thing which need to allow and which is not intercepted. :
(4) if it sets up -- the window of SPF -- " " button or "File" A rule setup which may be closed by => "Close" and which it. Continues and is explained below can also be carried out.
It is the main screen of SPF. . out of which the following screens will come if it clicks -- this is empty at first We recommend you to all set up these seven rules (Add). . correction added with the Add button is made with the Edit button, and the Remove button performs suppression. If the Add button is clicked, the next screen will come out. : The bottom box is sorry about being . English which is the thing which an interesting function explains by making into a text a setup carried out now. In "application" tab described later, the program currently exactly executed at the time of a setup and the communication program which SPF has recognized in the past come out as alternative as follows, as it has come. : Then, before performing Add, All the browsers used usually are started. . There are Internet Explorer, Netscape, Opera, Mozilla, RealOne Player, and others in a browser. Both will be started if a plurality of versions are used. The rule will be added, if it sets up about the screen of each five tabs and "O.K." is finally clicked. Hereafter, since I carry the example of a setting of each seven rule, let's set this as a reference. You may not perform a setup at once.
(1) Pop-up of new application recognition If it is made to run SPF and Windows is used, the following dialogs may sometimes come out in the center of a screen. :
I hear that this tended to execute communication and the software of relevance is caught in the check of SPF. If the conditions set as "Ask (it asks)" with the rule of SPF are matched, this inquiry will come out. . which may be the bad pro GUM's having communicated with the exterior, and having made information flow out, or having just caught the moment of downloading the main part of a bad program when there was no memory -- you become it tense and answer "No" When a permission may be granted, it carries out whether it carries out whether a check box is checked by whether you want me to ask after that, and "Yes" is answered. Does the significance which put in SPF thin, if "Yes" is answered without considering anything? Intelligence agent wear and Trojan horse will miss at the moment of leaking reservation outside. Therefore, when it does not understand Don't answer "Yes" easily. Let's make "No" into the custom which answers. Since it is also clear . that you receive reaction when required communication is intercepted even if it calls it .... Don't answer "No" easily, either. . It is "wanting-, as for this application, to really carry out communication [ what ] by which request kana ?." It is important to plot the head for a moment and to infer what is said. Software is communicating not only at when you click a link but at the various times. For example, they are a time of software, such as MediaPlayer, RealPlayer, QuickTime, Winamp, and AcobatReader, coming that it is also from a server about the newest information, a time of the advertisement included in the web page tying with the server, when virus countermeasure software downloads a virus definition file and %O!<%\%C%H (homepage robot which Sony has distributed) communicates with a server, etc. please observe "No" carefully tensely in the phenomenon which happens immediately after answering . . which it will mean had attained the purpose if I hear that a bad program sinks into silence and it is -- that is not right and you do -- a way When the work which was being done has gone wrong, please make "Yes" answer and do the work again the . next time which will have apologized for and intercepted communication required for the work. In this way, SPF gains experience together with you and becomes wiser and wiser. the rule for every application accumulated in this dialog pushes and looks at the "Applications" button of a SPF main screen -- it can change (2) Caution pop-up that the program changed Such cautions may come out in the center of a screen.
Since the icon displayed is not the icon of SPF but an icon of an applicable program, be careful not to have misunderstanding as the applicable program has said some. This caution is the "checksum" of SPF. (check sum) It happens for a comparison function. It is comparing whether it has changed, when the file of the application program transmitted and received was changed by computer virus etc., and $i$l$F also calculates the checksum which is the data which can calculate SPF uniquely from a program, it memorizes and there is a startup again. It can detect, when it is many, although it is not perfect when somewhere in programs part change. If you update the application, since the reason has clarified, "Yes" will be answered (substitution to a high version, application of a patch, etc.). "No" will be answered if doubtful. (3) Pop-up of having intercepted automatically If it has set up with the General (across the board) tab of an option, the message of a purport with transmission and reception which SPF intercepts appears in the window of a light green color near the system tray, and does not need to put in . check as which it is displayed for several seconds.
fastidious -- having -- since . showing the condition of having just received the attack, however access are intercepted, they are safe for the time being Opening which can intercept the attack which stemmed from an e-mail access, a chat, a web access, an advertising access, program installation, execution, etc., and started, thanks to SPF, and can see it by the pop-up caution is obtained. When feeling the quote that it is likely to spread, it is vicious or changing to Block All (all blockages) immediately, and investigating each log and last-known computer virus information on SPF. The icon of SPF which an attack is detected, and a color changes and glitters It clicks and SPF is started. Details are known if a security log and a traffic log are seen. . which can be specified since the first dispatch yuan will come out to the lowest stage, if back trace (Back trace) is right-clicked and carried out in a differential row in a log -- if the "whois (who)" button is pushed there, that fellow will really [ "] be the computer which who [ what ] has managed -- there is what ?" understands In the upper example, . back trace which is the example to which the worm of the name of Code Red has attacked in the port of TCP by the security log was carried out, and the sending agency was found. . he is not necessarily the assailant who merely scattered the worm just because it was the dispatch yuan of malicious access . out of which the provider whom the assailant has only entered may have come -- it does not caution telephone again by . stepping out of the ring unintentionally which may be the computer of the victim in accordance with a worm -- like . Possibly, when a caution comes out, the things where your computer is already captured, is made a "steppingstone" and is just going to deliver an indiscriminate attack of the others have not happened, either. Also although it is called SPF, all future vicious programs cannot be prevented 100% now. There are some fellows who poke the imperfection of your rule setup and work. (For example, . via the Internet Explorer to which bad DLL trusts you which can carry out bad access when the check is not contained in SPF main screen =>"Tools(tool)" =>"Options(option)" =>"Security (secret) tab" => "Enable DLL authentication (certification of a dynamic link library is confirmed)")
In the above setup, it may not be able to do by intercepting transmission and reception of e-mail. Then, the mail for a test which is not troubled even if a transmission goes wrong is transmitted to its addressing to a mail address, and it receives. . which will put in a check and will answer "yes" if the caution pop-up explained for the antecedent party comes out -- the communication allowance of related application is registered into SPF by this, and the e-mail transmission on and after next time comes to pass by it . thank you for everything which can use SPF now by the preliminaries so far Finally, a SPF program is started and a window is closed (above-mentioned starting of SPF, and the method of a closure ).
I hear that mischief is not done only by offering communication even if diagnosis is called . attack delivered by delivering a false attack from a site which can trust it besides your computer. In the case of the computer which is not using LAN at a house, either, it is the fire wall and proxy which were installed there in LAN, such as . which is the thing as which this is sufficient however CATV, and an enterprise. nud The relay computer which is installed for the purpose of security and increase in efficiency, serves as proxy of the computer host inside an organization, and communicates with the Internet The said composition may be taken between $,.It diagnoses as follows using a diagnostic site "a Shields rise". : (1) shields Up A site is displayed. Click the 'Proceed' button. (2) The middle of a page, "ShieldsUP!! The box of Services" (service) appears. : Henceforth, if this button is pushed and diagnosed, it progresses to the next diagnosis with the button of the same box which comes out to that result. . which a Shields rise is a famous diagnostic site and is not independently what does mischief -- the address of your computer is recognized and a message is sent During diagnosis, SPF detects that there was an attack and records the phenomenon on a security log. Moreover, the picture display which expresses under an attack to a task tray if specified by option setup of SPF It carries out and a pop-up message is sent several seconds near the task tray. (3) First, "File Sharing" (file sharing) is pushed. Then, it will become a diagnostic screen and a result will gather in several seconds. "Attempting connection to your computer ..." of Mull 1 (It is going to connect with your computer) It seems that a $N message is good without caring, since he has no =P$C$Q even if diagnosis finishes. Under it, "(-) Your Internet port 139 does not appear to exist"! (Your Internet port 139 seems not to exist from outside) If it has come out, it will OK first. Under it, "(-) Unable to connect with NetBIOS to your computer." (It is not connectable with your computer by network BIOS) If it has come out and you will not have coped with success ., either, a caution will come out that it was connectable. (4) Next, "Common Ports" (often used port) is clicked with the box of a lower button. Then, it will become a diagnostic screen and a diagnostic result will come out in several seconds. It is red as a general comment at the beginning. A (failure) and green One of the "stamps" of (success) is pushed with a pompon. (Since success/failure is not the things for . worm which is a thing for you, it advises) The table under it expresses the condition of each port. It is red. It is open at $,=P$F$$$k and the time and risk of a worm inroad is just going to be. It is blue. It has closed at $N=P$F$$$k and the time, and first, although it is OK, since subsistence is in sight from the network, there is concern tried (involved). MS blast Isn't No. 135 which a worm pokes open? Green . which is not understood [ whether it is open by my hearing subsistence of a (stealth) not being visible to a network, and ] whether have closed or not -- it is success if all ports are this (5) Next, "All service Ports" (all service ports) is clicked with the box of a lower button. then, it will become a diagnostic screen, and will come out just for a moment for 1 minute, and the diagnostic result to a port 1055 will come out from a port 0 Red, blue, and green are the same significance as the above. If it clicks, the representation of the port will come out. If there is no red, it is safe once, but it will be success if all become green. (6) Next, click the Messenger Spam button in the button box at the bottom of the page. it is (troublesome messenger cable) in the box of a lower button. Change some input boxes on the button to a adequate message (Japanese is also possible), and click a button. (SPAM of what was written here is carried out to me) This diagnosis should observe the signs besides . that a result is not notified on that screen. If not intercepted by SPF, it is Windows like the following example. A messenger cable's (Windows Messenger) pop-up window comes out. When it has come out, since the above-mentioned setup of SPF is not corrected, it is thought that the port 135 of UDP is vacant. On the other hand, if intercepted by SPF, when [ which is success ] . blockage of is done, according to the above-mentioned option setup, the window of having intercepted near the task tray will become whether nothing is displayed or comes out for several seconds. Since it is forecasted since it is communication of the type which disappears simply when there is an error in the middle of a network, and several copies are sent, if it does not appear in that it should come out by carrying out . which may come out repeatedly, please try once again. there is a company which abuses this although not used in a messenger cable function, and sends advertising advertisement to it indiscriminately . -- it will become quiet now yes and the above -- Shields . the diagnosis by rise is [ . ] finally -- it is pleasant if it succeeds it is not surprised to forget that it was the false attack by itself when a log is seen later -- as -- pleasing . In addition, it is the main screen of .SPF which can also be diagnosed with "Sygate online service (SOS)." "Tools" => "Test Your Firewall" A click displays the page S.O.S. , by the browser. then, if the "Scan Now" button is pushed, by mist [ this ] beam false attack, .SPF to which diagnosis is performed will recognize it as there having been a port scan attack, and will record . kept waiting before or after . 10 seconds per minute [ about ] -- : which will be a success if displayed as follows (. which cannot detect service at all during . execution which your computer name does not understand) In addition, each diagnosis of the menu on the left of a page (a stealth scan, the Trojan horse scan, a TCP scan, an UDP scan, ICMP) can be tried. Or [ not becoming precocious as soon as it compares and cooks a result in the time of not considering as the time of defending by SPF ] Let's change into "Allow All (all allowances)" a security setup of the SPF main screen described above temporarily, and scale by carrying out the above-mentioned diagnosis. However, it is because . short time which must not carry out such an allowance also has fear of infection when correction of material faults, such as MS blast, has not finished. He does not forget to reject to "Normal" later.
(1) The option of above SPF and a setup of a rule are improved. Readme has management in case "Enterasys Aurorean VPN", "DirectPC", and "Winpopup" do not move. (2) If required, a rule is added, and qualification is loosened. (3) If troubled, it will be made "Security(secret)" => "Allow All (all allowances)". [ of the main screen of SPF ] . which finds [ to which which application transmitted to a partner's port of what No. from the port of what No. by TCP/UDP/ICMP etc. by seeing Traffic Log (transceiver log) when it passed / or or ] . to see, then whether reception was carried out -- it It changes into the rule to allow and the mode is rejected by "Security(secret)" => "Normal (usually)." For example, when it was going to download key information by software called SmartCert (Sm@rtCert) during SPF operation, after Sm@rtCert tended to communicate for 1 to 2 minutes, an error indication called circuit confusion and a host down was given.(4) as the information on other -- [FAQ] the network communication after installation -- it cannot do -- having become (Mr. SalB) -- it may be help (5) and also it is in a Readme file about other trouble solution and limitations -- the support page (English) of Sygate -- a case can be read especially by the support forum (English), or a question can be asked (6) In order to stop starting of SPF, the check of "Tools(tool)" =>"Options(option)" => "General (across the board)" tab [ of a main screen ] => "Automatically load Sygate Personal Firewall service at startup (SPF is automatically loaded at the time of Windows starting)" is removed. And "File (file) . which clicks => "Exit Firewall (a SPF program is ended)"" It does not end, although a window disappears with" button.
The time of not moving well and the re-installation method when downloading the version with which SPF was upgraded from Sygate are as follows. (1) The application (computer virus countermeasure software, other fire wall software, packet capture software, in addition to this) of SPF and others is terminated. (2) If spf.exe is double-clicked and opened, re-installation will start. (3) Soon (Is . upgrade in which the old version of SPF was found continued?) . which comes out -- although it is strange that this message comes also out of the same version, since it seems that it will come out if it comes to be uninstalled, "O.K." is answered (4) To a degree (Does it use continuing an old setup?) $H -- since it comes out -- usually -- "-- yes, it is answered as (Y)" No, if it is answered as (N), since a setup of an option, an application rule, and application etc. will disappear, it will become redo from $$$A. (. which can be ready for the discommodity and can also try "no" when trying on re-installation however, since SPF causes an error) (5) Re-installation finishes for a short time, and comes out with Maintenance Complete (the completion of maintenance). : (6) In order to carry out an identification of operation readily, a check is put into "Launch Sygete Personal Firewall (SPF is started)." (7) if it was upgrade, a check is put into "View Sygate Personal Filrewall ReadMe (please read first , is seen)" (8) An installer will be ended if "Finish (completion)" is pushed. (9) (to fault prevention sake) Probably, it will be good to once reboot Windows here. (10) (a setup -- measure) . (setup -- measure) task tray by which SPF is started automatically -- the icon of SPF Since it comes out, it checks. (11) If the "Application (application)" button was pushed and the contents are contained, it will be O.K. first. (12) Here, probably, an identification of operation may be carried out. (13) started SPF -- " " button is clicked and a window is closed. * When it does not move well and is troubled, to re-install can also be attempted after uninstalling. . to which I do not know whether it is that a setup already carried out and the log accumulated in the past will disappear if it uninstalls . which those files have in the folder in which you installed SPF -- it is usually ""C:\Program Files\Sygate\SPF\""
The uninstallation method is as follows. (1) SPF is terminated first (reference: starting of the above-mentioned SPF, and the method of a closure ). (2) other programs -- please especially stop virus countermeasure software and a packet blockage program surely . -- the unexpected fault which is not as if may be suited (3) After 2 minutes or more pass since SPF discontinuance, it progresses to a degree. (4) "Start" =>"program" => "Sygate Personal Firewall" It will be uninstalled if => "Uninstall Sygate Personal Firewall" is clicked. It is [FAQ] when not uninstallable. Perfect uninstallation (Mr. SalB) by manual operation is consulted. [Trademark] Proper nouns, such as a merchandise name and a corporate name, may be the trademarks or registered marks of each company. |
* A reference and related link
allowed to make it a reference -- I do . gratitude * Talk of spam eaten in fact ( Miyazaki Toyohisa Mr. ton %G%b%$%s%?!<%M%C%H museum ) .... Pleasant origin-of-a-word . SPAM was a special hum from the first. * Page explaining security: Personal Firewall Review (Mr. SalB) .... The very detailed review article of "Sygate Personal Firewall 5.0 index" and the collection of PF rule introductory notes which can be used also for SPF are especially connected with this article. * Fire wall ( Mr. All About Japan Internet security . guide Nakatsuma ) .... . volume article which is the precious link collection of a fire wall was also carried. * Sygate Personal Firewall ( Sygate ) ( online help ) (English) * Link collection for SE ( Mr. H&Y ) .... A diagnostic site and the link to a personal fire wall are abundant. * Fire wall (recruit company key %^%s%: network system network foundation and review important E5) * Get to know about a fire wall . ( Microsoft ) * Plague category ( PestPatrol and %"!<%/%s ) .... A worm is begun and about 60 kinds of network inaccurate programs are looked through. * PORT NUMBERS (semantic sight of a port number ) ( The Internet Assigned Numbers Authority (English)) * Port number (semantic sight ) ( Mr. Koara ) |