Technology content trusted in North America and globally since 1999
8,162 Reviews & Articles | 61,648 News Posts

Internet Security & Firewalls Guide

The Internet. It's something you depend on, something which you use as a hobby, something you use as a job or just something you use for leisure. But, how secure is your Internet connection against hackers and spyware? Maybe you need a software or hardware firewall? Listen up as Sevan tells us everything we need to know about this very issue!
By: TweakTown Staff | Guides | Posted: Aug 22, 2001 4:00 am



When the Internet was created, there actually weren't as many active hackers as there were today. And the reason for this? Simple: Software development and rush to get out software, that has not been completed yet fully. Example? Any Windows operating system.


Some and actually many people really don't have the need for a firewall. Those type of users are home users mostly, and even some business users. This rule has generally changed, these days, as software development is jumping up and down with the market in the rush to make money without the worry about customer satisfaction. Actually, what do those big companies or individuals want from you? Ever heard about SPYWARE? What is spyware you ask?


Spyware is ANY SOFTWARE which employs a user's Internet connection in the background without their knowledge or permission.


Silently it sends or/and receives data without the user knowing what it is, or where it is going.


ANY SOFTWARE communicating across the Internet absent these elements is guilty of information theft and is properly and rightfully termed: Spyware.


Preparing Firewall


By reading this article, you will find out which software or hardware firewall you will need to be secure on the Internet. You will need a firewall if you:


1. Your computer's files need to be accessed remotely across the Internet.


2. You are operating any sort of Internet server such as Personal Web Server.


3. You use any sort of Internet-based remote control or remote access program such as PC Anywhere, Laplink, or Wingate.


4. You want to properly and safely monitor your Internet connection for intrusion attempts.


5. You want to preemptively protect yourself from compromise by "inside the wall" Trojan horse programs like NetBus and Back Orifice.


Step 1) The first screenshot shows the single most important setting you will need to adjust before anything else. Go to your network settings by right clicking on your network neighborhood and selecting properties. Then, click on TCP/IP and go to the properties. Switch to the "bindings" tab and UNCHECK anything you see in there. You may be asked a question and you will need to select NO and click OK twice. Now go ahead and restart.



Step 2) After you are done with that and restarted, you will need to make sure that NetBIOS is not being used for TCP/IP. Uncheck the option you see below.



Step 3) Now you will need to do the same for ever other computer on your network. Skip to next step if you aren't on a network. Now we will need to test your computer to see how secure you are. Know that every security scan test always looks for the first IP address on a network to scan (example:, so if you do plan on installing a software firewall, which I recommend strongly, install it on the first computer. For a very good and simple to understand test, go to:




Below is a screenshot of the results you want after installing a firewall which I will discuss later on. A 'stealth' result means no respond at all from a port on an ip address. An 'closed' result means that the ip address received the packet but did not send a notification back. An 'open' result means the ip address received the packet and send it back, meaning you are in big danger.



    PRICING: You can find products similar to this one for sale below.

    United States: Find other tech and computer products like this over at Amazon's website.

    United Kingdom: Find other tech and computer products like this over at Amazon UK's website.

    Canada: Find other tech and computer products like this over at Amazon Canada's website.

    We at TweakTown openly invite the companies who provide us with review samples / who are mentioned or discussed to express their opinion of our content. If any company representative wishes to respond, we will publish the response here.